Auswahl der wissenschaftlichen Literatur zum Thema „Internet – security measures. sears“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Internet – security measures. sears" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Internet – security measures. sears"

1

McCathie, Andy. „Internet security fears prompt IT security measures“. Network Security 2000, Nr. 5 (Mai 2000): 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zhou, Zhong Wei, und Lei Shi. „Security Research and Measures for the Internet of Things“. Advanced Materials Research 748 (August 2013): 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.

Der volle Inhalt der Quelle
Annotation:
With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Chen, Jing. „Analysis on Network Security and Corresponding Preventive Measures“. Applied Mechanics and Materials 241-244 (Dezember 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.

Der volle Inhalt der Quelle
Annotation:
Network security is one of the most important issues in the face of Internet development. Major researches are done on improving the current status of the security of internet. This article describes some major factors threatening internet, and analysis the latest security techniques. corresponding strategies are proposed to achieve a safe, worry-free environment online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Niu, Minghao, und Hong Dai. „Internet of Things Information Security and Preventive Measures“. Academic Journal of Science and Technology 4, Nr. 2 (04.01.2023): 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things is the third technological revolution of modern information technology. It is a high integration of various new technologies and concepts of modern information technology. It opens up the channel between the previously unrelated technologies such as electronic technology, automation technology, communication technology, biotechnology, mechanical technology and material technology, and makes these technologies truly integrate into a whole. The communication from person to person to object, object to object expansion is realized. The Internet of Things not only drives the development of emerging technologies, but also facilitates daily education and management. However, in the environment of the Internet of Things, there are still some problems of information security, information theft, information disclosure and other problems that must be solved in the application of the Internet of Things technology. Based on the architecture, key technologies and applications of the Internet of Things, this paper explores the security problems existing in the Internet of Things environment and puts forward reasonable preventive measures.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gupta, Sanjay Kumar, und Sandeep Vanjale. „Cyber Security Measures for Internet of Things Devices“. International Journal of Engineering Research and Technology 13, Nr. 8 (31.08.2020): 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Wang, Hongqiao. „On Computer Communication Network Security Maintenance Measures“. Studies in Social Science Research 4, Nr. 3 (24.07.2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.

Der volle Inhalt der Quelle
Annotation:
With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases the chances of using the network to commit crimes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sang, Yun Chang, und Xin Gao. „Security Issues and Protective Measures of the Internet of Things Architecture“. Advanced Materials Research 765-767 (September 2013): 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.

Der volle Inhalt der Quelle
Annotation:
With the development of technology and applications of the Internet of Things, Things technology and industry being the attention from the government to enterprises and research institutions at different levels. The guarantee of Things safety is an important prerequisite to promote the healthy development of the Internet of Things. Articles oriented networking current mainstream architecture research from the three levels of perception layer, transport layer and application layer, the security threat of the Internet of Things, and appropriate security measures, provided for the establishment of the security architecture of the Internet of Things theoretical reference.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Минаев, В. А., Б. А. Швырев und Т. Р. Ромашкин. „INTERNET OF THINGS SECURITY: KEY SOLUTIONS“. ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, Nr. 2(-) (30.06.2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Der volle Inhalt der Quelle
Annotation:
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современные устройства IoT имеют доступ к персональной и конфиденциальной информации, нарушения их информационной безопасности могут иметь весьма серьезные последствия, поэтому крайне важно обосновать и реализовать надежные меры безопасности для их защиты от компьютерных атак. Проводится сравнительный анализ основных сетевых протоколов IoT. Выделяются наиболее вероятные компьютерные атаки на устройства IoT: нарушение безопасности сети, нарушение безопасности устройства, физический доступ к устройству, сбои в работе устройства, технологии социальной инженерии. Рассматриваются следующие меры для обеспечения безопасности устройств IoT: совершенствование нормативно-правовой базы; обучение и повышение квалификации сотрудников; развитие взаимодействия с производителями IoT; улучшение мониторинга IoT-устройств; улучшение методов анализа данных, связанных с функционированием IoT. Для реализации предложенных мер приводятся программные и аппаратные решения задач безопасности IoT-устройств. One of the main problems in ensuring the security of the Internet of Things (IoT) is, on the one hand, a huge number of devices that scale the threats and security risks of their use, and on the other hand, weak development or even lack of standardized security protocols. Often, IoT devices have limited computing power and memory for the sake of price and commercial benefits, which makes it difficult to implement reliable security measures. The expansion of IoT has reached critical infrastructure - healthcare, transport and other particularly important areas. Since modern IoT devices have access to personal and confidential information, violations of their information security can have very serious consequences, therefore it is extremely important to justify and implement reliable security measures to protect them from computer attacks. A comparative analysis of the main IoT network protocols is carried out. The most likely computer attacks on IoT devices are highlighted: network security violation, device security violation, physical access to the device, device malfunctions, social engineering technologies. The following measures to ensure the security of IoT devices are considered: improvement of the regulatory and legal framework; training and professional development of employees; development of interaction with IoT manufacturers; improvement of monitoring of IoT devices; improvement of data analysis methods related to the functioning of IoT. To implement the proposed measures, software and hardware solutions to the security problems of IoT devices are provided.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

He, Beige. „The Advance of Internet of Things Security Threats and Possible Measures“. Highlights in Science, Engineering and Technology 68 (09.10.2023): 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.

Der volle Inhalt der Quelle
Annotation:
The Internet of Things (IoT) is a new stage of human informatization development after the Internet. With the IoT, physical devices can seamlessly exchange and process data with each other, further improving the human ability to process information. However, Internet of Things security research is still preliminary despite frequent data breaches and security incidents. This paper starts with the introduction of the IoT and introduces its definition, technical characteristics, and hierarchical architecture of the IoT. After that, the security threats that may be encountered at each layer are discussed, and finally, the ways to enhance the security of IoT. This paper aims to examine the security issues that arise in the IoT system and investigate the security measures that can be employed to serve as security technology guidelines for constructing secure IoT systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Gomes, Leandre, Abhinav Deshmukh und Nilesh Anute. „Cyber Security and Internet Banking: Issues and Preventive Measures“. Journal of Information Technology and Sciences 8, Nr. 2 (14.07.2022): 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.

Der volle Inhalt der Quelle
Annotation:
The internet brought a new revolution to the financial sector and it has changed the way of operations in the last two decades. Now, people have the option to carry out banking transactions from a place of their choice without having to go to a nearby bank office. E-banking has become an integral part of the banking system and has become a popular method of transaction for the majority of people. A user has a wide range of options for managing his money through numerous internet banking methods. While internet banking is an aid for customers, they still have to be vigilant to keep their accounts safe from cybercriminals and hackers, as everything on the internet is prone to security threats. Internet security measures followed by the majority of the bank sites to protect their information are not up-to-date as compared to the dynamic cyber threats. Such problems have made it easy for confidential financial information to fall into the hands of third parties and cybercriminals. Although there are several security measures to stop data breaches, there are still flaws in these systems. The goal of this study article is to look at the number of cyber security issues in internet banking in India and the consumer’s awareness of these issues and preventive measures used by them. Our research is particularly based on primary data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Internet – security measures. sears"

1

King-Lacroix, Justin. „Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems“. Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.

Der volle Inhalt der Quelle
Annotation:
The phrase 'Internet of Things' refers to the pervasive instrumentation of physical objects with sensors and actuators, and the connection of those sensors and actuators to the Internet. These sensors and actuators are generally based on similar hardware as, and have similar capabilities to, wireless sensor network nodes. However, they operate in a completely different network environment: wireless sensor network nodes all generally belong to a single entity, whereas Internet of Things endpoints can belong to different, even competing, ones. This difference has profound implications for the design of security mechanisms in these environments. Wireless sensor network security is generally focused on defence against attack by external parties. On the Internet of Things, such an insider/outsider distinction is impossible; every entity is both an endpoint for legitimate communications, and a possible source of attack. We argue that that under such conditions, the centralised models that underpin current networking standards and protocols for embedded systems are simply not appropriate, because they require such an insider/outsider distinction. This thesis serves as an exposition in the design of decentralised security mechanisms, applied both to applications, which must perform access control, and networks, which must guarantee communications security. It contains three main contributions. The first is a threat model for Internet of Things networks. The second is BottleCap, a capability-based access control module, and an exemplar of decentralised security architecture at the application layer. The third is StarfishNet, a network-layer protocol for Internet of Things wireless networks, and a similar exemplar of decentralised security architecture at the network layer. Both are evaluated with microbenchmarks on prototype implementations; StarfishNet's association protocol is additionally validated using formal verification in the protocol verification tool Tamarin.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Naude, Kevin Alexander. „Assessing program code through static structural similarity“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.

Der volle Inhalt der Quelle
Annotation:
Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been important in supporting large classes at universities. The main approaches to the problem are dynamic analysis (testing student programs for expected output) and static analysis (direct analysis of the program code). The former is very sensitive to all kinds of errors in student programs, while the latter has traditionally only been used to assess quality, and not correctness. This research focusses on the application of static analysis, particularly structural similarity, to marking student programs. Existing traditional measures of similarity are limiting in that they are usually only effective on tree structures. In this regard they do not easily support dependencies in program code. Contemporary measures of structural similarity, such as similarity flooding, usually rely on an internal normalisation of scores. The effect is that the scores only have relative meaning, and cannot be interpreted in isolation, ie. they are not meaningful for assessment. The SimRank measure is shown to have the same problem, but not because of normalisation. The problem with the SimRank measure arises from the fact that its scores depend on all possible mappings between the children of vertices being compared. The main contribution of this research is a novel graph similarity measure, the Weighted Assignment Similarity measure. It is related to SimRank, but derives propagation scores from only the locally optimal mapping between child vertices. The resulting similarity scores may be regarded as the percentage of mutual coverage between graphs. The measure is proven to converge for all directed acyclic graphs, and an efficient implementation is outlined for this case. Attributes on graph vertices and edges are often used to capture domain specific information which is not structural in nature. It has been suggested that these should influence the similarity propagation, but no clear method for doing this has been reported. The second important contribution of this research is a general method for incorporating these local attribute similarities into the larger similarity propagation method. An example of attributes in program graphs are identifier names. The choice of identifiers in programs is arbitrary as they are purely symbolic. A problem facing any comparison between programs is that they are unlikely to use the same set of identifiers. This problem indicates that a mapping between the identifier sets is required. The third contribution of this research is a method for applying the structural similarity measure in a two step process to find an optimal identifier mapping. This approach is both novel and valuable as it cleverly reuses the similarity measure as an existing resource. In general, programming assignments allow a large variety of solutions. Assessing student programs through structural similarity is only feasible if the diversity in the solution space can be addressed. This study narrows program diversity through a set of semantic preserving program transformations that convert programs into a normal form. The application of the Weighted Assignment Similarity measure to marking student programs is investigated, and strong correlations are found with the human marker. It is shown that the most accurate assessment requires that programs not only be compared with a set of good solutions, but rather a mixed set of programs of varying levels of correctness. This research represents the first documented successful application of structural similarity to the marking of student programs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Yu, Kin-ying, und 余見英. „Efficient schemes for anonymous credential with reputation support“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48330012.

Der volle Inhalt der Quelle
Annotation:
Anonymous credential is an important tool to protect the identity of users in the Internet for various reasons (e.g. free open speech) even when a service provider (SP) requires user authentication. Yet, misbehaving users may use anonymity for malicious purposes and SP would have no way to refrain these users from creating further damages. Revocable anonymous credential allows SP to revoke a particular anonymous user based on the observed behavior of a session the user conducted. However, such kind of all-or-nothing revocation does not work well with the “Web 2.0” applications because it does not give a user a second chance to remedy a misconduct, nor rewards for positive behaviors. Reputation support is vital for these platforms. In this thesis, we propose two schemes with different strengths that solve this privacy and reputation dilemma. Our first scheme, PE(AR)2, aims to empower anonymous credential based authentication with revocation and rewarding support. The scheme is efficient, outperforms PEREA which was the most efficient solution to this problem, with an authentication time complexity O(1) as compared with other related works that has dependency on either the user side storage or the blacklist size. PEREA has a few drawbacks that make it vulnerable and not practical enough. Our scheme fixes PEREA's vulnerability together with efficiency improvement. Our benchmark on PE(AR)2 shows that an SP can handle over 160 requests/second when the credentials store 1000 single-use tickets, which outperforms PEREA with a 460 fold efficiency improvement. Our second scheme, SAC, aims to provide a revocation and full reputation support over anonymous credential based authentication system. With a small efficiency trade-o_ as compared with PE(AR)2, the scheme now supports both positive and negative scores. The scoring mechanism is now much more flexible, that SP could modify the rated score of any active sessions, or declare that no more rating should be given to it and mark it as finalized. SAC provides a much more elastic user side credential storage, there is no practical limit on the number of authentication sessions associated with a credential. Unlike other schemes, SAC make use of a combined membership proof instead of multiple non-membership proofs to distinguish if a session is active, finalized, or blacklisted. This special consideration has contributed to the reduction of efficiency-flexibility trade-off from PE(AR)2, making the scheme stay practical in terms of authentication time. Our benchmark on SAC shows that an SP can handle over 2.9 requests/second when the credentials store 10000 active sessions, which outperforms BLACR-Express (a related work based on pairing cryptography with full reputation support) with a 131 fold efficiency improvement. Then we analyze the potential difficulties for adopting the solutions to any existing web applications. We present a plugin based approach such that our solutions could run on a user web browser directly, and how a service provider could instruct the plugin to communicate using our protocol in HTML context. We conclude our thesis stating the solutions are practical, efficient and easy to integrate in real world scenario, and discuss potential future works.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Sato, Keiko. „Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet“. Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.

Der volle Inhalt der Quelle
Annotation:
The popularity of the Internet has been dramatically increased over recent years. The rapid growth of this technology and its international use has made it almost impossible to regulate the internet. As a result, the Internet has certainly provided freedoms to people and it has led to some abusing systems. Privacy is one of the major issues in the development of Electronic Commerce using the Internet. As an enormous amount of personal information is transmitted to several hosts connecting to the Internet, the information can be accessed by both authorised and unauthorised people. Although it is certain that there are several existing problems of using the Internet for business activities, many organisations have already started using it. It is believed that the Internet provides efficiency and effectiveness for various activities Although much research has been described the business use of the Internet in many countries, these studies have not specifically investigated Australian organisations. Therefore, this research investigates the current use of the Internet by Australian organisations and their associated privacy policies, as a means of seeking their privacy concerns. Using a benchmark provided by Australian privacy commissioners, it evaluates their privacy policies to see how well they are established to protect privacy of users. The study utilises the top 100 Australian large private sector organisations as the sample. The current practice of the sample organisations on the Internet was observed by exploring their Web sites. Privacy policies were also collected from their Web sites. Moreover, a letter requesting corporate privacy policy was sent to each organisation that collects personal information on the Internet. The result showed that the majority of Australian organisations were using the Internet today, but a surprisingly few organisations showed their privacy policy on the Internet. Also, this research showed that many organisations did not actually have a corporate privacy policy. Many organisations are using the Internet without apparent concern for customers' privacy. The organisations proactively involved in the Internet Commerce are more concerned about security side of the Internet. Hence, they appear to believe that the technology itself protects information sent on the Internet. It has become clear that technology by itself does not provide the security needed for users of the Internet as unethical act of authorised parties could harm privacy of individuals. There is an argument that the Internet needs to be regulated. However, the process of international regulation on the Internet has not been started. Thus, it is ideal that organisations proactively protect clients' personal information accessible by the use of the Internet technology. This study looks at the methods of obtaining privacy of individuals and suggests the ideal conduct of organisations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Rutherford, Andrew. „Introducing hippocratic log files for personal privacy control“. Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.

Der volle Inhalt der Quelle
Annotation:
The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information they release. Hippocratic databases, designed by Agrawal, Kiernan, Srikant, and Xu (2002), aim to give users greater control over information stored in a data- base. Their design was inspired by the medical Hippocratic oath, and makes data privacy protection a fundamental responsibility of the database itself. To achieve the privacy of data, Hippocratic databases are governed by 10 key privacy principles. This dissertation argues, that asides from a few challenges, the 10 prin- ciples of Hippocratic databases can be applied to log ¯les. This argument is supported by presenting a high-level functional view of a Hippocratic log file architecture. This architecture focuses on issues that highlight the con- trol users gain over their personal information that is collected in log files. By presenting a layered view of the aforementioned architecture, it was, fur- thermore, possible to provide greater insight into the major processes that would be at work in a Hippocratic log file implementation. An exploratory prototype served to understand and demonstrate certain of the architectural components of Hippocratic log files. This dissertation, thus, makes a contribution to the ideal of providing users with greater control over their personal information, by proposing the use of Hippocratic logfiles.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Marais, Terrence K. „Electronic payment and security on the Internet“. Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.

Der volle Inhalt der Quelle
Annotation:
Thesis (MBA)--Stellenbosch University, 2002.
ENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Nagarle, Shivashankarappa A. „Novel framework to support information security audit in virtual environment“. Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1.

Der volle Inhalt der Quelle
Annotation:
Over the years, the focus of information security has evolved from technical issue to business issue. Heightened competition from globalization compounded by emerging technologies such as cloud computing has given rise to new threats and vulnerabilities which are not only complex but unpredictable. However, there are enormous opportunities which can bring value to business and enhance stakeholders’ wealth. Enterprises in Oman are compelled to embark e-Oman strategy which invariably increases the complexity due to integration of heterogeneous systems and outsourcing with external business partners. This implies that there is a need for a comprehensive model that integrates people, processes and technology and provides enterprise information security focusing on organizational transparency and enhancing business value. It was evident through interviews with security practitioners that existing security models and frameworks are inadequate to meet the dynamic nature of threats and challenges inherent in virtualization technology which is a catalyst to cloud computing. Hence the intent of this research is to evaluate enterprise information security in Oman and explore the potential of building a balanced model that aligns governance, risk management and compliance with emphasis to auditing in virtual environment. An integrated enterprise governance, risk and compliance model was developed where enterprise risk management acts as a platform, both mitigating risk on one hand and as a framework for defining cost controls and quantifying revenue opportunities on the other. Further, security standards and frameworks were evaluated and some limitations were identified. A framework for implementing IT governance focusing on critical success factors was developed after analysing and mapping the four domains of COBIT with various best practices. Server virtualization using bare metal architecture was practically tested which provides fault-tolerance and automated load balancing with enhanced security. Taxonomy of risks inherent in virtual environments was identified and an audit process flow was devised that provides insight to auditors to assess the adequacy of controls in a virtual environment. A novel framework for a successful audit in virtual environment is the contribution of this research that has changed some of the security assumptions and audit controls in virtual environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

De, Villiers R. R. (Raoul Reenen). „The role of risk perception in Internet purchasing behaviour and intention“. Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.

Der volle Inhalt der Quelle
Annotation:
Thesis (MComm.)--Stellenbosch University, 2001.
ENGLISH ABSTRACT: In recent years the importance and number of users of electronic commerce and its medium, the Internet, have grown substantially. Despite this, the Business-to- Consumer sector has shown slow expansion and limited growth, with the majority of consumers slow to adopt the Internet as a medium for purchase. A probable factor affecting the purchasing behaviour of individuals is the perception of risk of a breach in (credit card) security and/or a violation of privacy. The research discussed here indicates that two closely related constructs, namely perceived privacy risk and perceived security risk exerts an influence on the Internet purchasing behaviour of Internet users, and more importantly, the intention to purchase. In addition, the role of social pressures regarding the provision of personal and credit card information is indicated to be of considerable importance.
AFRIKAANSE OPSOMMING: Die afgelope aantal jare het die belangrikheid en gebruik van eletroniese handel en die Internet aansienlik toegeneem. Ongeag hierdie groei het die sektor gemoeid met die handel tussen besighede en verbruikers egter beperkte groei getoon. 'n Waarskynlike rede vir die tendens in Internet aankoop gedrag is die persepsie dat daar 'n risiko is van misbruik van 'n krediet kaart sowel as misbruik en skending van privaatheid. Die studie wat hier bespreek word toon aan dat twee nou verwante kostrukte, naamlik persepsie van sekuriteits- en persepsie van privaatheidsrisiko 'n rol speel in die bepaling van Internet aankoop gedrag, sowel as die intensie om te koop. Verder is die rol van sosiale druk rakende die verskaffing van persoonlike en krediet kaart inligting uitgelig as 'n faktor van uiterste belang.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Dacosta, Italo. „Practical authentication in large-scale internet applications“. Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44863.

Der volle Inhalt der Quelle
Annotation:
Due to their massive user base and request load, large-scale Internet applications have mainly focused on goals such as performance and scalability. As a result, many of these applications rely on weaker but more efficient and simpler authentication mechanisms. However, as recent incidents have demonstrated, powerful adversaries are exploiting the weaknesses in such mechanisms. While more robust authentication mechanisms exist, most of them fail to address the scale and security needs of these large-scale systems. In this dissertation we demonstrate that by taking into account the specific requirements and threat model of large-scale Internet applications, we can design authentication protocols for such applications that are not only more robust but also have low impact on performance, scalability and existing infrastructure. In particular, we show that there is no inherent conflict between stronger authentication and other system goals. For this purpose, we have designed, implemented and experimentally evaluated three robust authentication protocols: Proxychain, for SIP-based VoIP authentication; One-Time Cookies (OTC), for Web session authentication; and Direct Validation of SSL/TLS Certificates (DVCert), for server-side SSL/TLS authentication. These protocols not only offer better security guarantees, but they also have low performance overheads and do not require additional infrastructure. In so doing, we provide robust and practical authentication mechanisms that can improve the overall security of large-scale VoIP and Web applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Clayton, Bradley. „Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost“. Thesis, Rhodes University, 2007. http://eprints.ru.ac.za/851/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Internet – security measures. sears"

1

Vacca, John R. Internet security SECRETS. Foster City, CA: IDG Books Worldwide, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

J, Cooper Frederic, Hrsg. Implementing Internet security. Indianapolis, Ind: New Riders Pub., 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

P, Cavanagh James, Hrsg. Internet and internetworking security. Boston, MA: Auerbach, 1997.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Levine, John R. Internet privacy for dummies. New York, N.Y: Wiley Pub, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hare, Chris. Internet firewallsand network security. 2. Aufl. Indianapolis, Ind: New Riders Publishing, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Stallings, William. Mecklermedia's official Internet World internet security handbook. London: Internet World, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Stallings, William. Mecklermedia's official Internet world Internet security handbook. Foster City, CA: IDG Books, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Holden, Greg. Internet security in easy steps. Southam: Computer Step, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zwicky, Elizabeth D. Building Internet Firewalls: Internet and Web security. 2. Aufl. Beijing: O'Reilly, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Phoha, Vir V. A dictionary of Internet security. Berlin: Springer-Verlag, 2002.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Internet – security measures. sears"

1

Vetrivel, S. C., R. Maheswari und T. P. Saravanan. „Industrial IOT: Security Threats and Counter Measures“. In Internet of Things, 403–25. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0052-3_20.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wu, Chuan-Kun. „A Comprehensive Set of Security Measures for IoT“. In Internet of Things Security, 199–245. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Emran, Nurul A. „Data Completeness Measures“. In Pattern Analysis, Intelligent Security and the Internet of Things, 117–30. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17398-6_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kumhar, Dharamdas, Anil Kewat und Avanish Kumar. „Internet Security: Threats and Its Preventive Measures“. In Lecture Notes in Electrical Engineering, 753–66. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2631-0_65.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Goud, Teena, und Ajay Dureja. „Security Measures in Internet of Things (IoT) Systems Using Machine and Deep Learning Techniques“. In Internet of Things, 195–209. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63937-2_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Paul, Bonani. „Internet of Things (IoT), Three-Layer Architecture, Security Issues and Counter Measures“. In ICT Analysis and Applications, 23–34. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5655-2_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zheng, Changliang. „Computer Network Security and Effective Measures for the Era of Big Data“. In Application of Big Data, Blockchain, and Internet of Things for Education Informatization, 521–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87903-7_64.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Jeremiah, Premylla, Ganthan Narayana Samy, Bharanidharan Shanmugam, Kannan Ponkoodalingam und Sundresan Perumal. „Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things“. In Advances in Intelligent Systems and Computing, 726–35. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99007-1_67.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Velmurugan, S., G. Shanthi, L. Raja und D. Subitha. „Threat Analysis and Security Measures for the Internet of Medical Things (IoMT): A Study“. In Computational Intelligence and Blockchain in Biomedical and Health Informatics, 229–42. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003459347-16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ndaw, Marie, Gervais Mendy, Samuel Ouya und Diaraf Seck. „Quantify the Maturity of Internet Banking Security Measures in WAEMU (West African Economic and Monetary Union) Banks“. In Innovation and Interdisciplinary Solutions for Underserved Areas, 125–30. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72965-7_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Internet – security measures. sears"

1

Wu, Yuhong, und Xiangdong Hu. „Many Measures to Solve Industrial Internet Security Problems“. In 2019 2nd International Conference on Safety Produce Informatization (IICSPI). IEEE, 2019. http://dx.doi.org/10.1109/iicspi48186.2019.9095906.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Niraja, K. S., und Sabbineni Srinivasa Rao. „Security Challenges and Counter Measures in Internet of Things“. In 2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2020. http://dx.doi.org/10.1109/iccci48352.2020.9104159.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Lykou, Georgia, Argiro Anagnostopoulou und Dimitris Gritzalis. „Implementing Cyber-Security Measures in Airports to Improve Cyber-Resilience“. In 2018 Global Internet of Things Summit (GIoTS). IEEE, 2018. http://dx.doi.org/10.1109/giots.2018.8534523.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

„ESTABLISHING CYBERSECURITY AWARENESS OF TECHNICAL SECURITY MEASURES THROUGH A SERIOUS GAME“. In Applied Computing 2022 and WWW/Internet 2022. IADIS Press, 2022. http://dx.doi.org/10.33965/ac_icwi2022_202208c030.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

R, Omshith, Vemisetti Pavan Balaji, Rayapudi Venkata Rahul und Kumaran U. „Enhanced Security Measures for Image Privacy: Encryption Perspectives“. In 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2024. http://dx.doi.org/10.1109/idciot59759.2024.10467544.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ye, Chenghao, Praburam Prabhakar Indra und David Aspinall. „Retrofitting Security and Privacy Measures to Smart Home Devices“. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939272.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Verma, Vidushi, und Munish Bhatia. „Analysis of Security Measures on the Internet of Things based Applications“. In 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2022. http://dx.doi.org/10.1109/icosec54921.2022.9951914.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mahmoud, Rwan, Tasneem Yousuf, Fadi Aloul und Imran Zualkernan. „Internet of things (IoT) security: Current status, challenges and prospective measures“. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2015. http://dx.doi.org/10.1109/icitst.2015.7412116.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Verma, Hanisha, und Kaur Chahal. „A review on security problems and measures of Internet of Things“. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2017. http://dx.doi.org/10.1109/iccons.2017.8250560.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Amel, Gherbia, und Zehani Soraya. „Enhancing Security and Privacy Measures in Internet of Things (IoT) Implementations“. In 2024 8th International Conference on Image and Signal Processing and their Applications (ISPA). IEEE, 2024. http://dx.doi.org/10.1109/ispa59904.2024.10536814.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Internet – security measures. sears"

1

Payment Systems Report - June of 2021. Banco de la República, Februar 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.

Der volle Inhalt der Quelle
Annotation:
Banco de la República provides a comprehensive overview of Colombia’s finan¬cial infrastructure in its Payment Systems Report, which is an important product of the work it does to oversee that infrastructure. The figures published in this edition of the report are for the year 2020, a pandemic period in which the con¬tainment measures designed and adopted to alleviate the strain on the health system led to a sharp reduction in economic activity and consumption in Colom¬bia, as was the case in most countries. At the start of the pandemic, the Board of Directors of Banco de la República adopted decisions that were necessary to supply the market with ample liquid¬ity in pesos and US dollars to guarantee market stability, protect the payment system and preserve the supply of credit. The pronounced growth in mone¬tary aggregates reflected an increased preference for liquidity, which Banco de la República addressed at the right time. These decisions were implemented through operations that were cleared and settled via the financial infrastructure. The second section of this report, following the introduction, offers an analysis of how the various financial infrastructures in Colombia have evolved and per¬formed. One of the highlights is the large-value payment system (CUD), which registered more momentum in 2020 than during the previous year, mainly be¬cause of an increase in average daily remunerated deposits made with Banco de la República by the General Directorate of Public Credit and the National Treasury (DGCPTN), as well as more activity in the sell/buy-back market with sovereign debt. Consequently, with more activity in the CUD, the Central Securi¬ties Depository (DCV) experienced an added impetus sparked by an increase in the money market for bonds and securities placed on the primary market by the national government. The value of operations cleared and settled through the Colombian Central Counterparty (CRCC) continues to grow, propelled largely by peso/dollar non-deliverable forward (NDF) contracts. With respect to the CRCC, it is important to note this clearing house has been in charge of managing risks and clearing and settling operations in the peso/dollar spot market since the end of last year, following its merger with the Foreign Exchange Clearing House of Colombia (CCDC). Since the final quarter of 2020, the CRCC has also been re¬sponsible for clearing and settlement in the equities market, which was former¬ly done by the Colombian Stock Exchange (BVC). The third section of this report provides an all-inclusive view of payments in the market for goods and services; namely, transactions carried out by members of the public and non-financial institutions. During the pandemic, inter- and intra-bank electronic funds transfers, which originate mostly with companies, increased in both the number and value of transactions with respect to 2019. However, debit and credit card payments, which are made largely by private citizens, declined compared to 2019. The incidence of payment by check contin¬ue to drop, exhibiting quite a pronounced downward trend during the past last year. To supplement to the information on electronic funds transfers, section three includes a segment (Box 4) characterizing the population with savings and checking accounts, based on data from a survey by Banco de la República con-cerning the perception of the use of payment instruments in 2019. There also is segment (Box 2) on the growth in transactions with a mobile wallet provided by a company specialized in electronic deposits and payments (Sedpe). It shows the number of users and the value of their transactions have increased since the wallet was introduced in late 2017, particularly during the pandemic. In addition, there is a diagnosis of the effects of the pandemic on the payment patterns of the population, based on data related to the use of cash in circu¬lation, payments with electronic instruments, and consumption and consumer confidence. The conclusion is that the collapse in the consumer confidence in¬dex and the drop in private consumption led to changes in the public’s pay¬ment patterns. Credit and debit card purchases were down, while payments for goods and services through electronic funds transfers increased. These findings, coupled with the considerable increase in cash in circulation, might indicate a possible precautionary cash hoarding by individuals and more use of cash as a payment instrument. There is also a segment (in Focus 3) on the major changes introduced in regulations on the retail-value payment system in Colombia, as provided for in Decree 1692 of December 2020. The fourth section of this report refers to the important innovations and tech¬nological changes that have occurred in the retail-value payment system. Four themes are highlighted in this respect. The first is a key point in building the financial infrastructure for instant payments. It involves of the design and im¬plementation of overlay schemes, a technological development that allows the various participants in the payment chain to communicate openly. The result is a high degree of interoperability among the different payment service providers. The second topic explores developments in the international debate on central bank digital currency (CBDC). The purpose is to understand how it could impact the retail-value payment system and the use of cash if it were to be issued. The third topic is related to new forms of payment initiation, such as QR codes, bio¬metrics or near field communication (NFC) technology. These seemingly small changes can have a major impact on the user’s experience with the retail-value payment system. The fourth theme is the growth in payments via mobile tele¬phone and the internet. The report ends in section five with a review of two papers on applied research done at Banco de la República in 2020. The first analyzes the extent of the CRCC’s capital, acknowledging the relevant role this infrastructure has acquired in pro¬viding clearing and settlement services for various financial markets in Colom¬bia. The capital requirements defined for central counterparties in some jurisdic¬tions are explored, and the risks to be hedged are identified from the standpoint of the service these type of institutions offer to the market and those associated with their corporate activity. The CRCC’s capital levels are analyzed in light of what has been observed in the European Union’s regulations, and the conclusion is that the CRCC has a scheme of security rings very similar to those applied internationally and the extent of its capital exceeds what is stipulated in Colombian regulations, being sufficient to hedge other risks. The second study presents an algorithm used to identify and quantify the liquidity sources that CUD’s participants use under normal conditions to meet their daily obligations in the local financial market. This algorithm can be used as a tool to monitor intraday liquidity. Leonardo Villar Gómez Governor
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie