International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 243

Research Paper | Information Technology | Kenya | Volume 4 Issue 3, March 2015 | Popularity: 6.8 / 10


     

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi


Abstract: Network hardware devices are currently becoming very expensive due to high market demand. As a result, they are at a great risk of theft. Securing or recovering a stolen or lost device is a great challenge in the modern world. Every networked computer device has a Network Interface Card (NIC). An NIC has a unique identifier code prominently known as the (media access control) MAC address that uniquely identifies the device under use over the network. It is therefore possible to use a MAC address as a security measure for devices that can operate within a network. Using a database system, users (network security managers) can identify the computer owners using their computer MAC and in case of a reported theft occurrence, it is possible to identify and locate the device. This work therefore, specifically focuses on how to track lost network devices that are still under operation using their MAC addresses.


Keywords: MAC, address, NIC and network


Edition: Volume 4 Issue 3, March 2015


Pages: 349 - 351



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Emmilly Mbichi Mwangi, "An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 349-351, https://www.ijsr.net/getabstract.php?paperid=SUB151940



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 1313 - 1318

Automation in Daily Life & It's Impact on Individuals & Society

Hemant Gautam Bodhare

Share this Article

Downloads: 0

Research Paper, Information Technology, United States of America, Volume 12 Issue 12, December 2023

Pages: 1398 - 1400

How to use Artificial Intelligence to View the List of Top Recommended Candidates for Open Job Requisitions using Advanced Algorithms and Machine Learning Models using Oracle AI

Sai Raj Kondogi Shiridi

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 619 - 622

Property Future Price Estimation Using ML, Power BI Time Series Analysis and Forecasting

Aravinthan B.

Share this Article

Downloads: 0

Informative Article, Information Technology, India, Volume 10 Issue 11, November 2021

Pages: 1522 - 1525

Optimizing Project Fund Tracking: Addressing the Challenges of Inaccurate Hour Reporting in Information Technology Projects

Vaijinath Susuruth Narayana Saker

Share this Article

Downloads: 0

Informative Article, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 2010 - 2013

Navigating High Availability and Disaster Recovery Challenges in AWS Environments

Sri Harsha Vardhan Sanne

Share this Article



Top