Australian Journal of Wireless Technologies, Mobility and Security 2022-12-20T05:27:16+00:00 Dr Pritam Gajkumar Shah Open Journal Systems <p>Wireless technologies are constantly evolving, and there are always new developments to keep up with. As a result, it can be difficult to keep up with all the latest news and information. However, Ausjournal (<a href=""></a> )can be a great way to stay informed about wireless technologies. Ausjournal can provide in-depth coverage of specific topics, and they can be a great way to learn about new developments in the field. In addition, Ausjournal can be a great resource for keeping up with the latest trends in wireless technologies.</p> <p>Ausjournal covers all aspects of computer sciences and engineering with emphasis on cyber security, digital forensic, artificial intelligence, cryptography, mobile communication, cloud, block chain technology, internet of things, wireless network security.</p> <div class="flex-1 overflow-hidden"> <div class="react-scroll-to-bottom--css-vkduq-79elbk h-full dark:bg-gray-800"> <div class="react-scroll-to-bottom--css-vkduq-1n7m0yu"> <div class="flex flex-col items-center text-sm h-full dark:bg-gray-800"> <div class="w-full border-b border-black/10 dark:border-gray-900/50 text-gray-800 dark:text-gray-100 group bg-gray-50 dark:bg-[#444654]"> <div class="text-base gap-4 md:gap-6 m-auto md:max-w-2xl lg:max-w-2xl xl:max-w-3xl p-4 md:py-6 flex lg:px-0"> <div class="relative flex w-[calc(100%-50px)] md:flex-col lg:w-[calc(100%-115px)]"> <div class="flex flex-grow flex-col gap-3"> <div class="min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap"> <div class="markdown prose w-full break-words dark:prose-invert light"> <p>Australian Journal of Wireless Technologies, Mobility and Security is a peer-reviewed academic journal that focuses on the latest developments and research in the field of wireless technologies, mobility and security in Australia and internationally. The journal covers a wide range of topics including 5G networks, Internet of Things, artificial intelligence, machine learning, and their applications in various domains such as healthcare, education, and critical infrastructure.</p> <p>The editorial team of the journal consists of the following members:</p> <p>Editor-in-Chief: Dr. Pritam Gajkumar Shah</p> <p>Managing Editor: Khyati M</p> <p>The journal is published by SISTMR Australia and is committed to promoting the highest standards of scholarship and research in the field. The editorial team and the board members are experts in their field and work diligently to ensure that the journal publishes high-quality and relevant research.</p> <p>We welcome submissions from researchers, academics, and practitioners in the field and look forward to receiving contributions that will further our understanding of wireless technologies, mobility and security.</p> </div> </div> </div> <div class="text-gray-400 flex self-end lg:self-center justify-center mt-2 gap-4 lg:gap-1 lg:absolute lg:top-0 lg:translate-x-full lg:right-0 lg:mt-0 lg:pl-2 visible"> </div> </div> </div> </div> <div class="w-full h-48 flex-shrink-0"> </div> </div> <button class="cursor-pointer absolute right-6 bottom-[124px] md:bottom-[120px] z-10 rounded-full border border-gray-200 bg-gray-50 text-gray-600 dark:border-white/10 dark:bg-white/10 dark:text-gray-200"></button></div> </div> </div> <div class="absolute bottom-0 left-0 w-full border-t md:border-t-0 dark:border-white/20 md:border-transparent md:dark:border-transparent md:bg-vert-light-gradient bg-white dark:bg-gray-800 md:!bg-transparent dark:md:bg-vert-dark-gradient"> <div class="relative flex h-full flex-1 md:flex-col"> <div class="ml-1 mt-1.5 md:w-full md:m-auto md:flex md:mb-2 gap-2 justify-center"> </div> <div class="flex flex-col w-full py-2 flex-grow md:py-3 md:pl-4 relative border border-black/10 bg-white dark:border-gray-900/50 dark:text-white dark:bg-gray-700 rounded-md shadow-[0_0_10px_rgba(0,0,0,0.10)] dark:shadow-[0_0_15px_rgba(0,0,0,0.10)]"> </div> </div> </div> Cybersecurity And Governance, Risk And Compliance (GRC) 2022-12-13T03:06:14+00:00 Ishwor Thapa Chhetri <p>When it comes to <em>cybersecurity</em>, different frameworks, best practices, and standards are used by organization. And these <em>governance </em>documents are most often chosen in accordance with corporate governance requirements or legislative requirements. Controls, cyber breaches history and finances are typically prescribed in governance documents, including technical controls, administrative controls, and physical controls. There are also a number of documents that describe specific capabilities that businesses must develop to secure their cyberspace.i So, from threats to SQL Injection Attacks to Cloud computing, Load balancing and Internet of things that needs cyber protection and the framework that GRC provides for it are all needs to be included with <em>GRC framework </em>while informing about the GRC business benefit to organisation. Thus, the results in this paper should be understanding and evaluating <em>IT GRC </em>implementation to reduce mismanagement and risk and ensure adherance in organizations and it can be only achieved by mitigating outside risks like cyber and network attacks by using means of Application Security, Internet of Things Security, Network Security, Infrastructure security and limiting access to sensitive information, showing the, <em>interrelation of GRC with Cyber security</em></p> 2022-12-13T00:00:00+00:00 Copyright (c) 2022 Australian Journal of Wireless Technologies, Mobility and Security COBIT5 FRAMEWORK AND ECOMMERCE 2022-12-12T14:10:05+00:00 Sabin Subedi <p style="text-align: justify;"><span style="font-family: 'TimesNewRomanPSMT',serif;">Ecommerce business has been rising as one of the most effective means of carrying out online business, where the primary customers act as the business drivers hoping to get the required product delivered at their home through a few simple steps (Tsagkias, 2021). However, there is a primary requirement of managing the governance of the Ecommerce business structure, which will allow with smoother transition of all the business-related operations in specific terms. As a reason to this, the following document has been prepared in particular to ensure a better understanding of a chosen framework integrated into the Ecommerce business that exists in the modern world. </span></p> <p style="text-align: justify;"><span style="font-family: 'TimesNewRomanPSMT',serif;">COBIT5 is a framework that has been effectively chosen for the following discussion, which is to primarily allow with a better understanding of the required business structure that needs to be followed to put forward a better service delivered to every individual customer in specific terms. This stands for Control Objectives for Information Technology and is directly aimed at governance procedures that need to be followed at a specific business. </span></p> <p style="text-align: justify;"><span style="font-family: 'TimesNewRomanPSMT',serif;">With respect to this, the following discussion has been carried out to ensure a better understanding of the Governance and Management structures to be implemented at the Ecommerce business with the help of COBIT5 management framework (Soni, 2020). The framework has been applied to every individual section of the chosen business and their likely impact upon the daily business operations carried out in specific terms. </span></p> 2022-12-12T00:00:00+00:00 Copyright (c) 2022 Australian Journal of Wireless Technologies, Mobility and Security IT Governance, Risk and Compliance 2022-12-20T05:27:16+00:00 Sabin Subedi <p>Computerized technology and the Advent of Technology have a significant role in the way we reside and operate. The corporate world is undergoing enormous massive reforms due to technological advancements, rising separation of business, increasing need for useful techniques, and evolving workforce. Innovation, automation, and robotics aim to develop professionally, raise productive capacity, and produce substantial employment offering substantial solvent and social prospects in the IT industry. A GRC framework is a useful endeavor that enables firms to connect their it and mission statement with company objectives, efficiently mitigate risks, and satisfy legal responsibilities successfully.</p> 2022-12-20T00:00:00+00:00 Copyright (c) 2022 Australian Journal of Wireless Technologies, Mobility and Security Optus Data Breach Australia Year 2022 – Case Study 2022-12-12T14:33:58+00:00 Pritam Gajkumar Shah <p>In September 2022, Optus Australia was shaken by cyber-attack which resulted in the disclosure of customer’s valuable personal data and information. This case study will investigate ‘modus of operandi’ of hackers and will suggest mitigation strategies to avoid these kind of attacks in the future. Most probably hackers may have used <em>SQL injection attack and/or Brute force attack </em>to enumerate the Optus users details. This paper will also demonstrate one example of SQL injection attack along with the counter measures. Author has also recommended COBIT5 framework to manage risk in cyber security for companies like Optus in this paper.</p> 2022-12-12T00:00:00+00:00 Copyright (c) 2022 Australian Journal of Wireless Technologies, Mobility and Security Role of GRC In the Information Governance for IT Organizations 2022-12-12T14:02:57+00:00 Aakash Neupane <p>The focus on <em>Governance, Risk and Compliance (GRC) </em>is steadily increasing as IT companies are facing increased risk and a growing number of legal, regulatory compliances. Big IT giants like Google, Facebook already initiated to ‘emphasise’ the integration of GRC activities in order to efficiently manage data governance. This paper analyses need of GRC and its integration particularly for <em>data governance </em>in IT organization. Even though integrated GRC is potential candidate for <em>storage and safe handling of user data</em>, many companies are unsure about the importance of an integration of GRC. As per recent findings, many organisations in Australia have deployed integrated GRC software that helps underlining the benefits of GRC. Still integration of GRC is having few challenges at the moment as stakeholders are unsatisfied with the present state of integration. In this paper, author recommends few solutions to overcome challenges of integration of GRC particularly for <em>data handling </em>with reference to <em>COBIT 5 framework.</em></p> 2022-12-12T00:00:00+00:00 Copyright (c) 2022 Australian Journal of Wireless Technologies, Mobility and Security