DDoS: Literary Reviews

Text: Security Engineering Second Edition by Ross Anderson, Chapter 21(Network Attack and Defense) This week, we continue our study of Distributed Denial of Service (DDoS). I took the initiative to review Ross Anderson’s work on concepts of Security with a concentration on DDoS.  Anderson talks about varieties of network attacks. Many of them include vulnerabilities in network protocols, […]

DDoS: Game Design (001)

We have begun to work on the second project game’s designs. The project is about Distributed Denial of Service (DDoS). We’re in the process of brainstorming the ideal structure to implement. Below are references to videos which contain the layouts of DDoS attacks. Types of DDoS Attacks   How to Prevent DDoS Attacks   DDoS […]

TEXT TO SPEECH SIMULATION

This week, I was tasked with creating a text to speech practice simulator for using Unity. In order to accomplish this, I successfully downloaded an asset from Unity Asset Store which I used its functions. The text to Speech Asset works for Andriod and IOS devices. I was able to create a semi-functional scene to show the […]

Game Testing

This week, we have completed the final testing of the game. So far we have completed about 6 tests. We now have sufficient among of data from our progress of testing. The evaluation progress is on the way as well as the beginning of the next stage of our next project. The next project is to […]

Deploying and Testing Game

This Week has been a busy week. We have begun on the second testing of our game. The game is been test using Android devices. Previous, we tested the PC version of the game. It went well. So far, we have done two tests with the android version, and our final testing will be done […]

Literary Reviews_07

Title: Countering Phishing from Brands’ Vantage Point Authors: Vlad Bulakh Indiana University, Bloomington, IN, USA Minaxi Gupta Edmodo Inc., San Mateo, CA, USA Reference: Open Site Summary The authors emphasized on the many ways phishers mislead internet users into providing personal information. In my previous blogs, I have reviewed other journals that point out the same […]