To see the other types of publications on this topic, follow the link: Computer networks – Security measures – Zimbabwe.

Journal articles on the topic 'Computer networks – Security measures – Zimbabwe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks – Security measures – Zimbabwe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO, and other styles
3

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
5

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mtengwa, Bonnie Batsirai, Agripah Kandiero, and Stanislas Bigirimana. "Drivers of Mobile Money Services Development in Zimbabwe." International Journal of E-Business Research 17, no. 1 (January 2021): 42–64. http://dx.doi.org/10.4018/ijebr.2021010104.

Full text
Abstract:
This study sought to identify the drivers of mobile money services development in Zimbabwe using Ecocash as a case study. Through purposive sampling, respondents were selected from financial institutions, regulatory bodies, customers, and agents. The research showed that in Zimbabwe the development of mobile money services is influenced by several factors such as a high mobile telephone penetration rate, a high number of unbanked people owing to poor access to traditional banking services, a lower level of internet penetration levels, customer awareness of the service because of aggressive branding, security and ease of use, and a dense networks of agents. Fast technology diffusion was also a factor that influenced the fast adoption of mobile money services in Zimbabwe. More research is needed to assess the impediments in countries where the adoption of mobile money services has not been as spectacular as in Zimbabwe or Kenya.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Full text
Abstract:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO, and other styles
10

Kounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
12

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
13

Peng, Yu, Xinrong Liu, Ming Li, Zheng Li, Tao Hu, Yangjun Xiao, Sheng Zhang, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Full text
Abstract:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware platform that provides the resources required for safety as well as security applications and is able to run these applications of mixed-criticality (safety-critical applications and other applications run on the same device). To achieve this, we apply the MILS approach, a separation-based high-assurance security architecture to simplify the safety case and security case of our approach. We describe the assurance requirements of the separation kernel subcomponent, which represents the key component of the MILS architecture. We further discuss the security measures of our architecture that are included to protect the safety-critical application from cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
15

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (July 2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (January 2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Sheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (April 2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.

Full text
Abstract:
Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.
APA, Harvard, Vancouver, ISO, and other styles
18

Ouyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.

Full text
Abstract:
Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.
APA, Harvard, Vancouver, ISO, and other styles
19

Nazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (October 2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.

Full text
Abstract:
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security.
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (September 1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO, and other styles
22

Feng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.

Full text
Abstract:
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. First, considering the need for antivirus measures in reality, an optimal control problem is introduced, and then a controlled computer virus spread model in point-to-group information networks is established. Second, the optimal control measure is formulated by making a tradeoff between control cost and network loss caused by virus intrusion. Third, optimal control strategies are theoretically investigated by Pontryagin’s maximum principle and the Hamiltonian function. Finally, through numerical simulations, effective measures for controlling virus spread in point-to-group information networks are proposed.
APA, Harvard, Vancouver, ISO, and other styles
23

Samreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (July 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.

Full text
Abstract:
The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.
APA, Harvard, Vancouver, ISO, and other styles
24

Das, Amit, and Habib Ullah Khan. "Security behaviors of smartphone users." Information & Computer Security 24, no. 1 (March 14, 2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.

Full text
Abstract:
Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East. Design/methodology/approach – A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems. Findings – The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft. Research limitations/implications – Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future. Practical implications – Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement. Social implications – Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk. Originality/value – The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.
APA, Harvard, Vancouver, ISO, and other styles
25

Safavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.

Full text
Abstract:
Moving target defense (MTD) strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
26

Safi, Roozmehr, Glenn J. Browne, and Azadeh Jalali Naini. "Mis-spending on information security measures: Theory and experimental evidence." International Journal of Information Management 57 (April 2021): 102291. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Liang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.

Full text
Abstract:
With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). And, three types of attacks that the target suffered are defined on the basis of “on” and “off” modes for control. Then, the controllable load was maliciously controlled as the research object, and a suitable scenario is selected. The impact of malicious control of the controllable load on the power supply reliability and power quality of the distribution networks are simulated and analyzed, and risk consequences for different types of attacks are provided.
APA, Harvard, Vancouver, ISO, and other styles
28

A. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (February 15, 2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.

Full text
Abstract:
So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.
APA, Harvard, Vancouver, ISO, and other styles
29

Sharma, Tanusree, Hunter A. Dyer, and Masooda Bashir. "Enabling User-centered Privacy Controls for Mobile Applications." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–24. http://dx.doi.org/10.1145/3434777.

Full text
Abstract:
Mobile apps have transformed many aspects of clinical practice and are becoming a commonplace in healthcare settings. The recent COVID-19 pandemic has provided the opportunity for such apps to play an important role in reducing the spread of the virus. Several types of COVID-19 apps have enabled healthcare professionals and governments to communicate with the public regarding the pandemic spread, coronavirus awareness, and self-quarantine measures. While these apps provide immense benefits for the containment of the spread, privacy and security of these digital tracing apps are at the center of public debate. To address this gap, we conducted an online survey of a midwestern region in the United State to assess people’s attitudes toward such apps and to examine their privacy and security concerns and preferences. Survey results from 1,550 participants indicate that privacy/security protections and trust play a vital role in people’s adoption of such apps. Furthermore, results reflect users’ preferences wanting to have control over their personal information and transparency on how their data is handled. In addition, personal data protection priorities selected by the participants were surprising and yet revealing of the disconnect between technologists and users. In this article, we present our detailed survey results as well as design guidelines for app developers to develop innovative human-centered technologies that are not only functional but also respectful of social norms and protections of civil liberties. Our study examines users’ preferences for COVID-19 apps and integrates important factors of trust, willingness, and preferences in the context of app development. Through our research findings, we suggest mechanisms for designing inclusive apps’ privacy and security measures that can be put into practice for healthcare-related apps, so that timely adoption is made possible.
APA, Harvard, Vancouver, ISO, and other styles
30

Shabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.

Full text
Abstract:
Lifeblood of every organization is its confidential information. The accentuation on cybersecurity has expanded considerably in the course of the last few years because of the expanded number in attacks at the individual and organization and even at the state level. One specific zone of consideration is the assurance of the security of nuclear information. This may relate to both Instrumentation and Control (I&C) and Information Technology (IT). The present security measures are insufficient for nuclear information because of their lack of identification, classification, and securing measures (because of their multifaceted nature). With the increasing trends of data storage and management with the assistance of cloud, data confidentiality threats are immensely increasing. As there is no such safeguard that can make our systems a hundred percent secure, the best approach is to provide security at distinct layers. The basic purpose of layered security is to have the benefit that if one layer fails or compromised, the other layer compensates or maintains that confidentiality with the access control in the owner’s hand. In this paper, we have proposed a multilevel approach with protection-based computing by using Modular Encryption Standard (MES). We proposed a cloud framework as well to further enhance its security by utilizing a multicloud and modular approach. By performing simulations, the obtained results depicted that our proposed scheme works efficiently than other commonly used schemes.
APA, Harvard, Vancouver, ISO, and other styles
31

Ahmad, Bilal, Wang Jian, and Zain Anwar Ali. "Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions." Journal of Computer Networks and Communications 2018 (July 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.

Full text
Abstract:
As time progresses with vast development of information technology, a large number of industries are more dependent on network connections for sensitive business trading and security matters. Communications and networks are highly vulnerable to threats because of increase in hacking. Personnel, governments, and armed classified networks are more exposed to difficulties, so the need of the hour is to install safety measures for network to prevent illegal modification, damage, or leakage of serious information. Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. This study highlights the developing research about the application of machine learning and data mining in Internet security. We provide background, enthusiasm, discussion of challenges, and recommendations for the application of ML/DM in the field of intrusion detection.
APA, Harvard, Vancouver, ISO, and other styles
32

Iqbal, Sohail, Shahzad Farooq, Khuram Shahzad, Asad Waqar Malik, Mian M. Hamayun, and Osman Hasan. "SecureSurgiNET: A framework for ensuring security in telesurgery." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987381. http://dx.doi.org/10.1177/1550147719873811.

Full text
Abstract:
The notion of surgical robotics is actively being extended to enable telesurgery, where both the surgeon and patient are remotely located and connected via a public network, which leads to many security risks. Being a safety-critical application, it is highly important to make telesurgery robust and secure against active and passive attacks. In this article, we propose the first complete framework, called SecureSurgiNET, for ensuring security in telesurgery environments. SecureSurgiNET is primarily based on a set of well-established protocols to provide a fool-proof telesurgical robotic system. For increasing the efficiency of secured telesurgery environments, the idea of a telesurgical authority is introduced that ensures the integrity, identity management, authentication policy implementation, and postoperative data security. An analysis is provided describing the security and throughput of Advanced Encryption Standard during the intraoperative phase of SecureSurgiNET. Moreover, we have tabulated the possible attacks on SecureSurgiNET along with the devised defensive measures. Finally, we also present a time complexity analysis of the SecureSurgiNET through simulations.
APA, Harvard, Vancouver, ISO, and other styles
33

Niveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.

Full text
Abstract:
Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating environment, ROM size, etc. that have compelled IoT to utilize conventional measures of security. These technologies require greater data speeds, high throughput, expanded power, lower bandwidth, and high efficiency. In addition, IoT has transformed the world in light of these new ideas by offering smooth communication between heterogeneous networks (HetNets).
APA, Harvard, Vancouver, ISO, and other styles
34

Tang, Zhenjun, Shaopeng Zhang, Zhenhai Chen, and Xianquan Zhang. "Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures." Security and Communication Networks 2021 (April 30, 2021): 1–11. http://dx.doi.org/10.1155/2021/9930673.

Full text
Abstract:
Multimedia hashing is a useful technology of multimedia management, e.g., multimedia search and multimedia security. This paper proposes a robust multimedia hashing for processing videos. The proposed video hashing constructs a high-dimensional matrix via gradient features in the discrete wavelet transform (DWT) domain of preprocessed video, learns low-dimensional features from high-dimensional matrix via multidimensional scaling, and calculates video hash by ordinal measures of the learned low-dimensional features. Extensive experiments on 8300 videos are performed to examine the proposed video hashing. Performance comparisons reveal that the proposed scheme is better than several state-of-the-art schemes in balancing the performances of robustness and discrimination.
APA, Harvard, Vancouver, ISO, and other styles
35

Zurek, Tomasz, Michail Mokkas, and Bogdan Ksiezopolski. "On the Modelling of Context-Aware Security for Mobile Devices." Mobile Information Systems 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/8743504.

Full text
Abstract:
Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.
APA, Harvard, Vancouver, ISO, and other styles
36

Sheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.

Full text
Abstract:
Recently, vehicular ad hoc networks (VANETs) embark a great deal of attention in the area of wireless and communication technology and are becoming one of the prominent research areas in the intelligent transportation system (ITS) because they provide safety and precautionary measures to the drivers and passengers, respectively. VANETs are quite different from the mobile ad hoc networks (MANETs) in terms of characteristics, challenges, system architecture, and their application. In this paper, we summarize the recent state-of-the-art methods of VANETs by discussing their architecture, security, and challenges. Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs. Then, we comprehensively cover the authentication schemes, which is able to protect the vehicular network from malicious nodes and fake messages. Thus, it provides security in VANETs. Thirdly, we cover the mobility and network simulators, as well as other simulation tools, followed by the performance of authentication schemes. Finally, we discuss the comfort and safety applications of VANETs. In sum, this paper comprehensively covers the entire VANET system and its applications by filling the gaps of existing surveys and incorporating the latest trends in VANETs.
APA, Harvard, Vancouver, ISO, and other styles
37

Qadri, Yazdan Ahmad, Rashid Ali, Arslan Musaddiq, Fadi Al-Turjman, Dae Wan Kim, and Sung Won Kim. "The limitations in the state-of-the-art counter-measures against the security threats in H-IoT." Cluster Computing 23, no. 3 (January 1, 2020): 2047–65. http://dx.doi.org/10.1007/s10586-019-03036-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Aziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (June 20, 2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.

Full text
Abstract:
Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagrams, and codes has been done as applicable.
APA, Harvard, Vancouver, ISO, and other styles
39

Rietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Full text
Abstract:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted attacks, run always over the network. Security measures against such internal network attacks require a comprehensive monitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security concept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for centralizing the related network decisions in a central authority—the SDN controller—that manages all network connections and hence the associated data flows.
APA, Harvard, Vancouver, ISO, and other styles
40

Roy Sarkar, Kuheli. "Assessing insider threats to information security using technical, behavioural and organisational measures." Information Security Technical Report 15, no. 3 (August 2010): 112–33. http://dx.doi.org/10.1016/j.istr.2010.11.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Tosun, Nilgün. "Social Networks as a Learning and Teaching Environment and Security in Social Networks." Journal of Education and Training Studies 6, no. 11a (November 29, 2018): 194. http://dx.doi.org/10.11114/jets.v6i11a.3817.

Full text
Abstract:
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also causes changes and transformations in these areas. Education is one of these areas, perhaps the most important, that technology affects. The hunter society, written with nails, made an important step with the paper's invention, and the written documents were moved from the stones to the books. The invention of computers and the internet has also opened an important milestone in human history and education. In the beginning, the course contents loaded on storage units such as floppy disks, CDs, DVDs were used by the students and teachers, computers were included in the education systems. During periods when we have not yet met with the internet, computer-assisted education has found a large place in many educational institutions and in the curriculum of education level. The development of information Technologies led to widespread use of the internet over time, and shortly thereafter examples of use in education began to increase. Computer-assisted education has also led to the rapid transition of education through internet-supported education, along with the different demands of the network society's individuals. Users are not satisfied with the internet environments where only reading authority is available, and more and more active and interacting requests have come to the agenda. Beyond reading, social networks that make it possible to comment, create content, upload/share/view images, upload video/audio files, and make video, text and voice calls have become popular for users. Social networking platforms where users interact with the environment or with other users in the environment have been attracted by the diversity of user profiles, the usage rates and durations, and the easy and versatility of accessibility. Because of these features, studies on the use of social networks in the field of education to support learning and teaching have also been accelerated and diversified. Social networks can also contain some security issues because they are huge platforms where billions of users are together. Having information about security issues as little as possible, what to do when they are encountered is important for the continuity of learning and teaching. The aim of this study is to demonstrate the importance of social networks, education, learning and teaching influences, possible security threats to be encountered in social networks, and measures to be taken. It is hoped that working in this context will shed light on the work of learners, teachers and decision makers on the subject.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhu, Qianxiang, Yuanqing Qin, Yue Zhao, and Zhou Chunjie. "A hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures." International Journal of Distributed Sensor Networks 16, no. 1 (January 2020): 155014771988980. http://dx.doi.org/10.1177/1550147719889808.

Full text
Abstract:
Critical infrastructures are essential for national security, economy, and public safety. As an important part of security protection, response strategy making provides useful countermeasures to reduce the impacts of cyberattacks. However, there have been few researches in this domain that investigate the cyberattack propagation within a station and the incident spreading process in the critical infrastructure network simultaneously, let along analyzing the relationships between security strategy making for a station and scheduling strategy for the critical infrastructure network. To tackle this problem, a hierarchical colored Petri net–based cyberattacks response strategy making approach for critical infrastructures is presented. In this approach, the relationships among cyberattacks, security measures, devices, functions, and station capacity are analyzed and described in a hierarchical way, and the system loss is calculated with the input of abnormal station capacities. Then, based on the above model, the security strategy making for a station and the scheduling strategy making for the critical infrastructure network are investigated in depth. Finally, the effectiveness of the proposed approach is demonstrated on a simulated water supply system.
APA, Harvard, Vancouver, ISO, and other styles
43

TANNIAN, MARK F., CHRISTINA SCHWEIKERT, and YING LIU. "A Systems Security Analysis of Issuance and Verification of Birth Documents Enhanced with DNA Profiles." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740003. http://dx.doi.org/10.1142/s0219265917400035.

Full text
Abstract:
The use of biometrics to enhance identification has been explored and utilized to various extents. DNA is the most reliable and stable biometric that remains unchanged throughout an individual’s lifetime. Advancements in DNA analysis, in terms of reduced cost and faster processing times, make the use of DNA as a biometric more feasible over time. Since DNA data is of a sensitive nature, privacy and ethical concerns would have to be carefully considered before large-scale adoption for use in identity documents. Birth certificates are a fundamental document used by a person for identification. However, it does not contain any means of authentication beyond possession of the document. This paper examines the security measures that would be required if birth certificates were embedded with DNA profile information. The U.S. FBI CODIS approach is referred to, being an established standard for human DNA profiling and identification. Effects on the issuance and verification network for birth certificate documents are explored, in addition to the security threats.
APA, Harvard, Vancouver, ISO, and other styles
44

Ozcan, Alper, and Sule Gunduz Oguducu. "Multivariate Time Series Link Prediction for Evolving Heterogeneous Network." International Journal of Information Technology & Decision Making 18, no. 01 (January 2019): 241–86. http://dx.doi.org/10.1142/s0219622018500530.

Full text
Abstract:
Link prediction is considered as one of the key tasks in various data mining applications for recommendation systems, bioinformatics, security and worldwide web. The majority of previous works in link prediction mainly focus on the homogeneous networks which only consider one type of node and link. However, real-world networks have heterogeneous interactions and complicated dynamic structure, which make link prediction a more challenging task. In this paper, we have studied the problem of link prediction in the dynamic, undirected, weighted/unweighted, heterogeneous social networks which are composed of multiple types of nodes and links that change over time. We propose a novel method, called Multivariate Time Series Link Prediction for evolving heterogeneous networks that incorporate (1) temporal evolution of the network; (2) correlations between link evolution and multi-typed relationships; (3) local and global similarity measures; and (4) node connectivity information. Our proposed method and the previously proposed time series methods are evaluated experimentally on a real-world bibliographic network (DBLP) and a social bookmarking network (Delicious). Experimental results show that the proposed method outperforms the previous methods in terms of AUC measures in different test cases.
APA, Harvard, Vancouver, ISO, and other styles
45

Aljably, Randa, Yuan Tian, and Mznah Al-Rodhaan. "Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection." Security and Communication Networks 2020 (July 20, 2020): 1–14. http://dx.doi.org/10.1155/2020/5874935.

Full text
Abstract:
Nowadays, user’s privacy is a critical matter in multimedia social networks. However, traditional machine learning anomaly detection techniques that rely on user’s log files and behavioral patterns are not sufficient to preserve it. Hence, the social network security should have multiple security measures to take into account additional information to protect user’s data. More precisely, access control models could complement machine learning algorithms in the process of privacy preservation. The models could use further information derived from the user’s profiles to detect anomalous users. In this paper, we implement a privacy preservation algorithm that incorporates supervised and unsupervised machine learning anomaly detection techniques with access control models. Due to the rich and fine-grained policies, our control model continuously updates the list of attributes used to classify users. It has been successfully tested on real datasets, with over 95% accuracy using Bayesian classifier, and 95.53% on receiver operating characteristic curve using deep neural networks and long short-term memory recurrent neural network classifiers. Experimental results show that this approach outperforms other detection techniques such as support vector machine, isolation forest, principal component analysis, and Kolmogorov–Smirnov test.
APA, Harvard, Vancouver, ISO, and other styles
46

Rani, Sita, Aman Kataria, Vishal Sharma, Smarajit Ghosh, Vinod Karar, Kyungroul Lee, and Chang Choi. "Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey." Wireless Communications and Mobile Computing 2021 (April 26, 2021): 1–30. http://dx.doi.org/10.1155/2021/5579148.

Full text
Abstract:
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality and comfort. IoT has contributed significantly to numerous application areas. The stormy expansion of smart devices and their credence for data transfer using wireless mechanics boost their susceptibility to cyberattacks. Consequently, the cybercrime rate is increasing day by day. Hence, the study of IoT security threats and possible corrective measures can benefit researchers in identifying appropriate solutions to deal with various challenges in cybercrime investigation. IoT forensics plays a vital role in cybercrime investigations. This review paper presents an overview of the IoT framework consisting of IoT architecture, protocols, and technologies. Various security issues at each layer and corrective measures are also discussed in detail. This paper also presents the role of IoT forensics in cybercrime investigation in various domains like smart homes, smart cities, automated vehicles, and healthcare. The role of advanced technologies like artificial intelligence, machine learning, cloud computing, edge computing, fog computing, and blockchain technology in cybercrime investigation is also discussed. Lastly, various open research challenges in IoT to assist cybercrime investigation are explained to provide a new direction for further research.
APA, Harvard, Vancouver, ISO, and other styles
47

Feng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.

Full text
Abstract:
Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intrusion are increasingly difficult. Motivated by the fact that the attackers usually penetrate the social network to either propagate malwares or collect sensitive information, we propose a method to assess the security risk of the user being attacked so that we can take defensive measures such as security education, training, and awareness before users are attacked. In this paper, we propose a novel user analysis model to find potential victims by analyzing a large number of users’ personal information and social behaviors in social networks. For each user, we extract three kinds of features, i.e., statistical features, social-graph features, and semantic features. These features will become the input of our user analysis model, and the security risk score will be calculated. The users with high security risk score will be alarmed so that the risk of being attacked can be reduced. We have implemented an effective user analysis model and evaluated it on a real-world dataset collected from a social network, namely, Sina Weibo (Weibo). The results show that our model can effectively assess the risk of users’ activities in social networks with a high area under the ROC curve of 0.9607.
APA, Harvard, Vancouver, ISO, and other styles
48

Bihl, Trevor J., Todd J. Paciencia, Kenneth W. Bauer, and Michael A. Temple. "Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization." Security and Communication Networks 2020 (February 24, 2020): 1–12. http://dx.doi.org/10.1155/2020/3909763.

Full text
Abstract:
Radio frequency (RF) fingerprinting extracts fingerprint features from RF signals to protect against masquerade attacks by enabling reliable authentication of communication devices at the “serial number” level. Facilitating the reliable authentication of communication devices are machine learning (ML) algorithms which find meaningful statistical differences between measured data. The Generalized Relevance Learning Vector Quantization-Improved (GRLVQI) classifier is one ML algorithm which has shown efficacy for RF fingerprinting device discrimination. GRLVQI extends the Learning Vector Quantization (LVQ) family of “winner take all” classifiers that develop prototype vectors (PVs) which represent data. In LVQ algorithms, distances are computed between exemplars and PVs, and PVs are iteratively moved to accurately represent the data. GRLVQI extends LVQ with a sigmoidal cost function, relevance learning, and PV update logic improvements. However, both LVQ and GRLVQI are limited due to a reliance on squared Euclidean distance measures and a seemingly complex algorithm structure if changes are made to the underlying distance measure. Herein, the authors (1) develop GRLVQI-D (distance), an extension of GRLVQI to consider alternative distance measures and (2) present the Cosine GRLVQI classifier using this framework. To evaluate this framework, the authors consider experimentally collected Z-wave RF signals and develop RF fingerprints to identify devices. Z-wave devices are low-cost, low-power communication technologies seen increasingly in critical infrastructure. Both classification and verification, claimed identity, and performance comparisons are made with the new Cosine GRLVQI algorithm. The results show more robust performance when using the Cosine GRLVQI algorithm when compared with four algorithms in the literature. Additionally, the methodology used to create Cosine GRLVQI is generalizable to alternative measures.
APA, Harvard, Vancouver, ISO, and other styles
49

Villegas-Ch., William, Ivan Ortiz-Garces, and Santiago Sánchez-Viteri. "Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus." Computers 10, no. 8 (August 19, 2021): 102. http://dx.doi.org/10.3390/computers10080102.

Full text
Abstract:
Currently, society is going through a health event with devastating results. In their desire to control the 2019 coronavirus disease, large organizations have turned over the execution of their activities to the use of information technology. These tools, adapted to the use of the Internet, have been presented as an effective solution to the measures implemented by the majority of nations where quarantines are generalized. However, the solution given by information technologies has several disadvantages that must be solved. The most important in this regard is with the serious security incidents that exist, where many organizations have been compromised and their data has been exposed. As a solution, this work proposes the design of a guide that allows for the implementation of a computer incident response team on a university campus. Universities are optimal environments for the generation of new technologies; they also serve as the ideal test bed for the generation of security policies and new treatments for incidents in an organization. In addition, with the implementation of the computer incident response team in a university, it is proposed to be part of a response group to any security incident at the national level.
APA, Harvard, Vancouver, ISO, and other styles
50

Gowthami K. "Security Issues on IoT Environment In Wireless Network Communications." International Journal of Wireless Networks and Broadband Technologies 8, no. 2 (July 2019): 31–46. http://dx.doi.org/10.4018/ijwnbt.2019070104.

Full text
Abstract:
The Internet of Things (IoT) integrates a giant range of physical objects that measures items that are unambiguously known, ubiquitously interconnected and accessible through the web. IoT aims to remodel any object within the real-world into a computer that has sensing, communication, and management capabilities. There is a growing range of IoT devices associated degree applications, and this results in an increase within the range, and quality of malicious attacks. It is necessary to guard IoT systems against malicious attacks, particularly to stop attackers from getting management over the devices. The common place web security protocols square measure recognized as unsuitable in these varieties of networks, significantly because of some categories of IOT devices with unnatural resources.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography