Downloads: 129 | Views: 243
Research Paper | Information Technology | Kenya | Volume 4 Issue 3, March 2015 | Popularity: 6.8 / 10
An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address
Emmilly Mbichi Mwangi
Abstract: Network hardware devices are currently becoming very expensive due to high market demand. As a result, they are at a great risk of theft. Securing or recovering a stolen or lost device is a great challenge in the modern world. Every networked computer device has a Network Interface Card (NIC). An NIC has a unique identifier code prominently known as the (media access control) MAC address that uniquely identifies the device under use over the network. It is therefore possible to use a MAC address as a security measure for devices that can operate within a network. Using a database system, users (network security managers) can identify the computer owners using their computer MAC and in case of a reported theft occurrence, it is possible to identify and locate the device. This work therefore, specifically focuses on how to track lost network devices that are still under operation using their MAC addresses.
Keywords: MAC, address, NIC and network
Edition: Volume 4 Issue 3, March 2015
Pages: 349 - 351
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021
Pages: 1313 - 1318Automation in Daily Life & It's Impact on Individuals & Society
Hemant Gautam Bodhare
Downloads: 0
Research Paper, Information Technology, United States of America, Volume 12 Issue 12, December 2023
Pages: 1398 - 1400How to use Artificial Intelligence to View the List of Top Recommended Candidates for Open Job Requisitions using Advanced Algorithms and Machine Learning Models using Oracle AI
Sai Raj Kondogi Shiridi
Downloads: 0
Research Paper, Information Technology, India, Volume 13 Issue 4, April 2024
Pages: 619 - 622Property Future Price Estimation Using ML, Power BI Time Series Analysis and Forecasting
Aravinthan B.
Downloads: 0
Informative Article, Information Technology, India, Volume 10 Issue 11, November 2021
Pages: 1522 - 1525Optimizing Project Fund Tracking: Addressing the Challenges of Inaccurate Hour Reporting in Information Technology Projects
Vaijinath Susuruth Narayana Saker
Downloads: 0
Informative Article, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 2010 - 2013Navigating High Availability and Disaster Recovery Challenges in AWS Environments
Sri Harsha Vardhan Sanne