Littérature scientifique sur le sujet « Internet – security measures. sears »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Internet – security measures. sears ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Internet – security measures. sears"

1

McCathie, Andy. « Internet security fears prompt IT security measures ». Network Security 2000, no 5 (mai 2000) : 3. http://dx.doi.org/10.1016/s1353-4858(00)05005-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Zhou, Zhong Wei, et Lei Shi. « Security Research and Measures for the Internet of Things ». Advanced Materials Research 748 (août 2013) : 910–14. http://dx.doi.org/10.4028/www.scientific.net/amr.748.910.

Texte intégral
Résumé :
With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Chen, Jing. « Analysis on Network Security and Corresponding Preventive Measures ». Applied Mechanics and Materials 241-244 (décembre 2012) : 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.

Texte intégral
Résumé :
Network security is one of the most important issues in the face of Internet development. Major researches are done on improving the current status of the security of internet. This article describes some major factors threatening internet, and analysis the latest security techniques. corresponding strategies are proposed to achieve a safe, worry-free environment online.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Niu, Minghao, et Hong Dai. « Internet of Things Information Security and Preventive Measures ». Academic Journal of Science and Technology 4, no 2 (4 janvier 2023) : 93–96. http://dx.doi.org/10.54097/ajst.v4i2.3977.

Texte intégral
Résumé :
The Internet of Things is the third technological revolution of modern information technology. It is a high integration of various new technologies and concepts of modern information technology. It opens up the channel between the previously unrelated technologies such as electronic technology, automation technology, communication technology, biotechnology, mechanical technology and material technology, and makes these technologies truly integrate into a whole. The communication from person to person to object, object to object expansion is realized. The Internet of Things not only drives the development of emerging technologies, but also facilitates daily education and management. However, in the environment of the Internet of Things, there are still some problems of information security, information theft, information disclosure and other problems that must be solved in the application of the Internet of Things technology. Based on the architecture, key technologies and applications of the Internet of Things, this paper explores the security problems existing in the Internet of Things environment and puts forward reasonable preventive measures.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Gupta, Sanjay Kumar, et Sandeep Vanjale. « Cyber Security Measures for Internet of Things Devices ». International Journal of Engineering Research and Technology 13, no 8 (31 août 2020) : 1830. http://dx.doi.org/10.37624/ijert/13.8.2020.1830-1839.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Wang, Hongqiao. « On Computer Communication Network Security Maintenance Measures ». Studies in Social Science Research 4, no 3 (24 juillet 2023) : p134. http://dx.doi.org/10.22158/sssr.v4n3p134.

Texte intégral
Résumé :
With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases the chances of using the network to commit crimes.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Sang, Yun Chang, et Xin Gao. « Security Issues and Protective Measures of the Internet of Things Architecture ». Advanced Materials Research 765-767 (septembre 2013) : 1007–10. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1007.

Texte intégral
Résumé :
With the development of technology and applications of the Internet of Things, Things technology and industry being the attention from the government to enterprises and research institutions at different levels. The guarantee of Things safety is an important prerequisite to promote the healthy development of the Internet of Things. Articles oriented networking current mainstream architecture research from the three levels of perception layer, transport layer and application layer, the security threat of the Internet of Things, and appropriate security measures, provided for the establishment of the security architecture of the Internet of Things theoretical reference.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Минаев, В. А., Б. А. Швырев et Т. Р. Ромашкин. « INTERNET OF THINGS SECURITY : KEY SOLUTIONS ». ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no 2(-) (30 juin 2023) : 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Texte intégral
Résumé :
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современные устройства IoT имеют доступ к персональной и конфиденциальной информации, нарушения их информационной безопасности могут иметь весьма серьезные последствия, поэтому крайне важно обосновать и реализовать надежные меры безопасности для их защиты от компьютерных атак. Проводится сравнительный анализ основных сетевых протоколов IoT. Выделяются наиболее вероятные компьютерные атаки на устройства IoT: нарушение безопасности сети, нарушение безопасности устройства, физический доступ к устройству, сбои в работе устройства, технологии социальной инженерии. Рассматриваются следующие меры для обеспечения безопасности устройств IoT: совершенствование нормативно-правовой базы; обучение и повышение квалификации сотрудников; развитие взаимодействия с производителями IoT; улучшение мониторинга IoT-устройств; улучшение методов анализа данных, связанных с функционированием IoT. Для реализации предложенных мер приводятся программные и аппаратные решения задач безопасности IoT-устройств. One of the main problems in ensuring the security of the Internet of Things (IoT) is, on the one hand, a huge number of devices that scale the threats and security risks of their use, and on the other hand, weak development or even lack of standardized security protocols. Often, IoT devices have limited computing power and memory for the sake of price and commercial benefits, which makes it difficult to implement reliable security measures. The expansion of IoT has reached critical infrastructure - healthcare, transport and other particularly important areas. Since modern IoT devices have access to personal and confidential information, violations of their information security can have very serious consequences, therefore it is extremely important to justify and implement reliable security measures to protect them from computer attacks. A comparative analysis of the main IoT network protocols is carried out. The most likely computer attacks on IoT devices are highlighted: network security violation, device security violation, physical access to the device, device malfunctions, social engineering technologies. The following measures to ensure the security of IoT devices are considered: improvement of the regulatory and legal framework; training and professional development of employees; development of interaction with IoT manufacturers; improvement of monitoring of IoT devices; improvement of data analysis methods related to the functioning of IoT. To implement the proposed measures, software and hardware solutions to the security problems of IoT devices are provided.
Styles APA, Harvard, Vancouver, ISO, etc.
9

He, Beige. « The Advance of Internet of Things Security Threats and Possible Measures ». Highlights in Science, Engineering and Technology 68 (9 octobre 2023) : 202–11. http://dx.doi.org/10.54097/hset.v68i.12067.

Texte intégral
Résumé :
The Internet of Things (IoT) is a new stage of human informatization development after the Internet. With the IoT, physical devices can seamlessly exchange and process data with each other, further improving the human ability to process information. However, Internet of Things security research is still preliminary despite frequent data breaches and security incidents. This paper starts with the introduction of the IoT and introduces its definition, technical characteristics, and hierarchical architecture of the IoT. After that, the security threats that may be encountered at each layer are discussed, and finally, the ways to enhance the security of IoT. This paper aims to examine the security issues that arise in the IoT system and investigate the security measures that can be employed to serve as security technology guidelines for constructing secure IoT systems.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gomes, Leandre, Abhinav Deshmukh et Nilesh Anute. « Cyber Security and Internet Banking : Issues and Preventive Measures ». Journal of Information Technology and Sciences 8, no 2 (14 juillet 2022) : 31–42. http://dx.doi.org/10.46610/joits.2022.v08i02.005.

Texte intégral
Résumé :
The internet brought a new revolution to the financial sector and it has changed the way of operations in the last two decades. Now, people have the option to carry out banking transactions from a place of their choice without having to go to a nearby bank office. E-banking has become an integral part of the banking system and has become a popular method of transaction for the majority of people. A user has a wide range of options for managing his money through numerous internet banking methods. While internet banking is an aid for customers, they still have to be vigilant to keep their accounts safe from cybercriminals and hackers, as everything on the internet is prone to security threats. Internet security measures followed by the majority of the bank sites to protect their information are not up-to-date as compared to the dynamic cyber threats. Such problems have made it easy for confidential financial information to fall into the hands of third parties and cybercriminals. Although there are several security measures to stop data breaches, there are still flaws in these systems. The goal of this study article is to look at the number of cyber security issues in internet banking in India and the consumer’s awareness of these issues and preventive measures used by them. Our research is particularly based on primary data.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Internet – security measures. sears"

1

King-Lacroix, Justin. « Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems ». Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.

Texte intégral
Résumé :
The phrase 'Internet of Things' refers to the pervasive instrumentation of physical objects with sensors and actuators, and the connection of those sensors and actuators to the Internet. These sensors and actuators are generally based on similar hardware as, and have similar capabilities to, wireless sensor network nodes. However, they operate in a completely different network environment: wireless sensor network nodes all generally belong to a single entity, whereas Internet of Things endpoints can belong to different, even competing, ones. This difference has profound implications for the design of security mechanisms in these environments. Wireless sensor network security is generally focused on defence against attack by external parties. On the Internet of Things, such an insider/outsider distinction is impossible; every entity is both an endpoint for legitimate communications, and a possible source of attack. We argue that that under such conditions, the centralised models that underpin current networking standards and protocols for embedded systems are simply not appropriate, because they require such an insider/outsider distinction. This thesis serves as an exposition in the design of decentralised security mechanisms, applied both to applications, which must perform access control, and networks, which must guarantee communications security. It contains three main contributions. The first is a threat model for Internet of Things networks. The second is BottleCap, a capability-based access control module, and an exemplar of decentralised security architecture at the application layer. The third is StarfishNet, a network-layer protocol for Internet of Things wireless networks, and a similar exemplar of decentralised security architecture at the network layer. Both are evaluated with microbenchmarks on prototype implementations; StarfishNet's association protocol is additionally validated using formal verification in the protocol verification tool Tamarin.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Naude, Kevin Alexander. « Assessing program code through static structural similarity ». Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.

Texte intégral
Résumé :
Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been important in supporting large classes at universities. The main approaches to the problem are dynamic analysis (testing student programs for expected output) and static analysis (direct analysis of the program code). The former is very sensitive to all kinds of errors in student programs, while the latter has traditionally only been used to assess quality, and not correctness. This research focusses on the application of static analysis, particularly structural similarity, to marking student programs. Existing traditional measures of similarity are limiting in that they are usually only effective on tree structures. In this regard they do not easily support dependencies in program code. Contemporary measures of structural similarity, such as similarity flooding, usually rely on an internal normalisation of scores. The effect is that the scores only have relative meaning, and cannot be interpreted in isolation, ie. they are not meaningful for assessment. The SimRank measure is shown to have the same problem, but not because of normalisation. The problem with the SimRank measure arises from the fact that its scores depend on all possible mappings between the children of vertices being compared. The main contribution of this research is a novel graph similarity measure, the Weighted Assignment Similarity measure. It is related to SimRank, but derives propagation scores from only the locally optimal mapping between child vertices. The resulting similarity scores may be regarded as the percentage of mutual coverage between graphs. The measure is proven to converge for all directed acyclic graphs, and an efficient implementation is outlined for this case. Attributes on graph vertices and edges are often used to capture domain specific information which is not structural in nature. It has been suggested that these should influence the similarity propagation, but no clear method for doing this has been reported. The second important contribution of this research is a general method for incorporating these local attribute similarities into the larger similarity propagation method. An example of attributes in program graphs are identifier names. The choice of identifiers in programs is arbitrary as they are purely symbolic. A problem facing any comparison between programs is that they are unlikely to use the same set of identifiers. This problem indicates that a mapping between the identifier sets is required. The third contribution of this research is a method for applying the structural similarity measure in a two step process to find an optimal identifier mapping. This approach is both novel and valuable as it cleverly reuses the similarity measure as an existing resource. In general, programming assignments allow a large variety of solutions. Assessing student programs through structural similarity is only feasible if the diversity in the solution space can be addressed. This study narrows program diversity through a set of semantic preserving program transformations that convert programs into a normal form. The application of the Weighted Assignment Similarity measure to marking student programs is investigated, and strong correlations are found with the human marker. It is shown that the most accurate assessment requires that programs not only be compared with a set of good solutions, but rather a mixed set of programs of varying levels of correctness. This research represents the first documented successful application of structural similarity to the marking of student programs.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Yu, Kin-ying, et 余見英. « Efficient schemes for anonymous credential with reputation support ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48330012.

Texte intégral
Résumé :
Anonymous credential is an important tool to protect the identity of users in the Internet for various reasons (e.g. free open speech) even when a service provider (SP) requires user authentication. Yet, misbehaving users may use anonymity for malicious purposes and SP would have no way to refrain these users from creating further damages. Revocable anonymous credential allows SP to revoke a particular anonymous user based on the observed behavior of a session the user conducted. However, such kind of all-or-nothing revocation does not work well with the “Web 2.0” applications because it does not give a user a second chance to remedy a misconduct, nor rewards for positive behaviors. Reputation support is vital for these platforms. In this thesis, we propose two schemes with different strengths that solve this privacy and reputation dilemma. Our first scheme, PE(AR)2, aims to empower anonymous credential based authentication with revocation and rewarding support. The scheme is efficient, outperforms PEREA which was the most efficient solution to this problem, with an authentication time complexity O(1) as compared with other related works that has dependency on either the user side storage or the blacklist size. PEREA has a few drawbacks that make it vulnerable and not practical enough. Our scheme fixes PEREA's vulnerability together with efficiency improvement. Our benchmark on PE(AR)2 shows that an SP can handle over 160 requests/second when the credentials store 1000 single-use tickets, which outperforms PEREA with a 460 fold efficiency improvement. Our second scheme, SAC, aims to provide a revocation and full reputation support over anonymous credential based authentication system. With a small efficiency trade-o_ as compared with PE(AR)2, the scheme now supports both positive and negative scores. The scoring mechanism is now much more flexible, that SP could modify the rated score of any active sessions, or declare that no more rating should be given to it and mark it as finalized. SAC provides a much more elastic user side credential storage, there is no practical limit on the number of authentication sessions associated with a credential. Unlike other schemes, SAC make use of a combined membership proof instead of multiple non-membership proofs to distinguish if a session is active, finalized, or blacklisted. This special consideration has contributed to the reduction of efficiency-flexibility trade-off from PE(AR)2, making the scheme stay practical in terms of authentication time. Our benchmark on SAC shows that an SP can handle over 2.9 requests/second when the credentials store 10000 active sessions, which outperforms BLACR-Express (a related work based on pairing cryptography with full reputation support) with a 131 fold efficiency improvement. Then we analyze the potential difficulties for adopting the solutions to any existing web applications. We present a plugin based approach such that our solutions could run on a user web browser directly, and how a service provider could instruct the plugin to communicate using our protocol in HTML context. We conclude our thesis stating the solutions are practical, efficient and easy to integrate in real world scenario, and discuss potential future works.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sato, Keiko. « Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet ». Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.

Texte intégral
Résumé :
The popularity of the Internet has been dramatically increased over recent years. The rapid growth of this technology and its international use has made it almost impossible to regulate the internet. As a result, the Internet has certainly provided freedoms to people and it has led to some abusing systems. Privacy is one of the major issues in the development of Electronic Commerce using the Internet. As an enormous amount of personal information is transmitted to several hosts connecting to the Internet, the information can be accessed by both authorised and unauthorised people. Although it is certain that there are several existing problems of using the Internet for business activities, many organisations have already started using it. It is believed that the Internet provides efficiency and effectiveness for various activities Although much research has been described the business use of the Internet in many countries, these studies have not specifically investigated Australian organisations. Therefore, this research investigates the current use of the Internet by Australian organisations and their associated privacy policies, as a means of seeking their privacy concerns. Using a benchmark provided by Australian privacy commissioners, it evaluates their privacy policies to see how well they are established to protect privacy of users. The study utilises the top 100 Australian large private sector organisations as the sample. The current practice of the sample organisations on the Internet was observed by exploring their Web sites. Privacy policies were also collected from their Web sites. Moreover, a letter requesting corporate privacy policy was sent to each organisation that collects personal information on the Internet. The result showed that the majority of Australian organisations were using the Internet today, but a surprisingly few organisations showed their privacy policy on the Internet. Also, this research showed that many organisations did not actually have a corporate privacy policy. Many organisations are using the Internet without apparent concern for customers' privacy. The organisations proactively involved in the Internet Commerce are more concerned about security side of the Internet. Hence, they appear to believe that the technology itself protects information sent on the Internet. It has become clear that technology by itself does not provide the security needed for users of the Internet as unethical act of authorised parties could harm privacy of individuals. There is an argument that the Internet needs to be regulated. However, the process of international regulation on the Internet has not been started. Thus, it is ideal that organisations proactively protect clients' personal information accessible by the use of the Internet technology. This study looks at the methods of obtaining privacy of individuals and suggests the ideal conduct of organisations.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Rutherford, Andrew. « Introducing hippocratic log files for personal privacy control ». Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.

Texte intégral
Résumé :
The rapid growth of the Internet has served to intensify existing privacy concerns of the individual, to the point that privacy is the number one concern amongst Internet users today. Tools exist that can provide users with a choice of anonymity or pseudonymity. However, many Web transactions require the release of personally identifying information, thus rendering such tools infeasible in many instances. Since it is then a given that users are often required to release personal information, which could be recorded, it follows that they require a greater degree of control over the information they release. Hippocratic databases, designed by Agrawal, Kiernan, Srikant, and Xu (2002), aim to give users greater control over information stored in a data- base. Their design was inspired by the medical Hippocratic oath, and makes data privacy protection a fundamental responsibility of the database itself. To achieve the privacy of data, Hippocratic databases are governed by 10 key privacy principles. This dissertation argues, that asides from a few challenges, the 10 prin- ciples of Hippocratic databases can be applied to log ¯les. This argument is supported by presenting a high-level functional view of a Hippocratic log file architecture. This architecture focuses on issues that highlight the con- trol users gain over their personal information that is collected in log files. By presenting a layered view of the aforementioned architecture, it was, fur- thermore, possible to provide greater insight into the major processes that would be at work in a Hippocratic log file implementation. An exploratory prototype served to understand and demonstrate certain of the architectural components of Hippocratic log files. This dissertation, thus, makes a contribution to the ideal of providing users with greater control over their personal information, by proposing the use of Hippocratic logfiles.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Marais, Terrence K. « Electronic payment and security on the Internet ». Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.

Texte intégral
Résumé :
Thesis (MBA)--Stellenbosch University, 2002.
ENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Nagarle, Shivashankarappa A. « Novel framework to support information security audit in virtual environment ». Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1.

Texte intégral
Résumé :
Over the years, the focus of information security has evolved from technical issue to business issue. Heightened competition from globalization compounded by emerging technologies such as cloud computing has given rise to new threats and vulnerabilities which are not only complex but unpredictable. However, there are enormous opportunities which can bring value to business and enhance stakeholders’ wealth. Enterprises in Oman are compelled to embark e-Oman strategy which invariably increases the complexity due to integration of heterogeneous systems and outsourcing with external business partners. This implies that there is a need for a comprehensive model that integrates people, processes and technology and provides enterprise information security focusing on organizational transparency and enhancing business value. It was evident through interviews with security practitioners that existing security models and frameworks are inadequate to meet the dynamic nature of threats and challenges inherent in virtualization technology which is a catalyst to cloud computing. Hence the intent of this research is to evaluate enterprise information security in Oman and explore the potential of building a balanced model that aligns governance, risk management and compliance with emphasis to auditing in virtual environment. An integrated enterprise governance, risk and compliance model was developed where enterprise risk management acts as a platform, both mitigating risk on one hand and as a framework for defining cost controls and quantifying revenue opportunities on the other. Further, security standards and frameworks were evaluated and some limitations were identified. A framework for implementing IT governance focusing on critical success factors was developed after analysing and mapping the four domains of COBIT with various best practices. Server virtualization using bare metal architecture was practically tested which provides fault-tolerance and automated load balancing with enhanced security. Taxonomy of risks inherent in virtual environments was identified and an audit process flow was devised that provides insight to auditors to assess the adequacy of controls in a virtual environment. A novel framework for a successful audit in virtual environment is the contribution of this research that has changed some of the security assumptions and audit controls in virtual environment.
Styles APA, Harvard, Vancouver, ISO, etc.
8

De, Villiers R. R. (Raoul Reenen). « The role of risk perception in Internet purchasing behaviour and intention ». Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.

Texte intégral
Résumé :
Thesis (MComm.)--Stellenbosch University, 2001.
ENGLISH ABSTRACT: In recent years the importance and number of users of electronic commerce and its medium, the Internet, have grown substantially. Despite this, the Business-to- Consumer sector has shown slow expansion and limited growth, with the majority of consumers slow to adopt the Internet as a medium for purchase. A probable factor affecting the purchasing behaviour of individuals is the perception of risk of a breach in (credit card) security and/or a violation of privacy. The research discussed here indicates that two closely related constructs, namely perceived privacy risk and perceived security risk exerts an influence on the Internet purchasing behaviour of Internet users, and more importantly, the intention to purchase. In addition, the role of social pressures regarding the provision of personal and credit card information is indicated to be of considerable importance.
AFRIKAANSE OPSOMMING: Die afgelope aantal jare het die belangrikheid en gebruik van eletroniese handel en die Internet aansienlik toegeneem. Ongeag hierdie groei het die sektor gemoeid met die handel tussen besighede en verbruikers egter beperkte groei getoon. 'n Waarskynlike rede vir die tendens in Internet aankoop gedrag is die persepsie dat daar 'n risiko is van misbruik van 'n krediet kaart sowel as misbruik en skending van privaatheid. Die studie wat hier bespreek word toon aan dat twee nou verwante kostrukte, naamlik persepsie van sekuriteits- en persepsie van privaatheidsrisiko 'n rol speel in die bepaling van Internet aankoop gedrag, sowel as die intensie om te koop. Verder is die rol van sosiale druk rakende die verskaffing van persoonlike en krediet kaart inligting uitgelig as 'n faktor van uiterste belang.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Dacosta, Italo. « Practical authentication in large-scale internet applications ». Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44863.

Texte intégral
Résumé :
Due to their massive user base and request load, large-scale Internet applications have mainly focused on goals such as performance and scalability. As a result, many of these applications rely on weaker but more efficient and simpler authentication mechanisms. However, as recent incidents have demonstrated, powerful adversaries are exploiting the weaknesses in such mechanisms. While more robust authentication mechanisms exist, most of them fail to address the scale and security needs of these large-scale systems. In this dissertation we demonstrate that by taking into account the specific requirements and threat model of large-scale Internet applications, we can design authentication protocols for such applications that are not only more robust but also have low impact on performance, scalability and existing infrastructure. In particular, we show that there is no inherent conflict between stronger authentication and other system goals. For this purpose, we have designed, implemented and experimentally evaluated three robust authentication protocols: Proxychain, for SIP-based VoIP authentication; One-Time Cookies (OTC), for Web session authentication; and Direct Validation of SSL/TLS Certificates (DVCert), for server-side SSL/TLS authentication. These protocols not only offer better security guarantees, but they also have low performance overheads and do not require additional infrastructure. In so doing, we provide robust and practical authentication mechanisms that can improve the overall security of large-scale VoIP and Web applications.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Clayton, Bradley. « Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost ». Thesis, Rhodes University, 2007. http://eprints.ru.ac.za/851/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Internet – security measures. sears"

1

Vacca, John R. Internet security SECRETS. Foster City, CA : IDG Books Worldwide, 1996.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

J, Cooper Frederic, dir. Implementing Internet security. Indianapolis, Ind : New Riders Pub., 1995.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

P, Cavanagh James, dir. Internet and internetworking security. Boston, MA : Auerbach, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Levine, John R. Internet privacy for dummies. New York, N.Y : Wiley Pub, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hare, Chris. Internet firewallsand network security. 2e éd. Indianapolis, Ind : New Riders Publishing, 1996.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Stallings, William. Mecklermedia's official Internet World internet security handbook. London : Internet World, 1996.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Stallings, William. Mecklermedia's official Internet world Internet security handbook. Foster City, CA : IDG Books, 1995.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Holden, Greg. Internet security in easy steps. Southam : Computer Step, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Zwicky, Elizabeth D. Building Internet Firewalls : Internet and Web security. 2e éd. Beijing : O'Reilly, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Phoha, Vir V. A dictionary of Internet security. Berlin : Springer-Verlag, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Internet – security measures. sears"

1

Vetrivel, S. C., R. Maheswari et T. P. Saravanan. « Industrial IOT : Security Threats and Counter Measures ». Dans Internet of Things, 403–25. Singapore : Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0052-3_20.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wu, Chuan-Kun. « A Comprehensive Set of Security Measures for IoT ». Dans Internet of Things Security, 199–245. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Emran, Nurul A. « Data Completeness Measures ». Dans Pattern Analysis, Intelligent Security and the Internet of Things, 117–30. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17398-6_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kumhar, Dharamdas, Anil Kewat et Avanish Kumar. « Internet Security : Threats and Its Preventive Measures ». Dans Lecture Notes in Electrical Engineering, 753–66. Singapore : Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2631-0_65.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Goud, Teena, et Ajay Dureja. « Security Measures in Internet of Things (IoT) Systems Using Machine and Deep Learning Techniques ». Dans Internet of Things, 195–209. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-63937-2_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Paul, Bonani. « Internet of Things (IoT), Three-Layer Architecture, Security Issues and Counter Measures ». Dans ICT Analysis and Applications, 23–34. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-5655-2_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zheng, Changliang. « Computer Network Security and Effective Measures for the Era of Big Data ». Dans Application of Big Data, Blockchain, and Internet of Things for Education Informatization, 521–29. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87903-7_64.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Jeremiah, Premylla, Ganthan Narayana Samy, Bharanidharan Shanmugam, Kannan Ponkoodalingam et Sundresan Perumal. « Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things ». Dans Advances in Intelligent Systems and Computing, 726–35. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99007-1_67.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Velmurugan, S., G. Shanthi, L. Raja et D. Subitha. « Threat Analysis and Security Measures for the Internet of Medical Things (IoMT) : A Study ». Dans Computational Intelligence and Blockchain in Biomedical and Health Informatics, 229–42. Boca Raton : CRC Press, 2024. http://dx.doi.org/10.1201/9781003459347-16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ndaw, Marie, Gervais Mendy, Samuel Ouya et Diaraf Seck. « Quantify the Maturity of Internet Banking Security Measures in WAEMU (West African Economic and Monetary Union) Banks ». Dans Innovation and Interdisciplinary Solutions for Underserved Areas, 125–30. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72965-7_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Internet – security measures. sears"

1

Wu, Yuhong, et Xiangdong Hu. « Many Measures to Solve Industrial Internet Security Problems ». Dans 2019 2nd International Conference on Safety Produce Informatization (IICSPI). IEEE, 2019. http://dx.doi.org/10.1109/iicspi48186.2019.9095906.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Niraja, K. S., et Sabbineni Srinivasa Rao. « Security Challenges and Counter Measures in Internet of Things ». Dans 2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2020. http://dx.doi.org/10.1109/iccci48352.2020.9104159.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Lykou, Georgia, Argiro Anagnostopoulou et Dimitris Gritzalis. « Implementing Cyber-Security Measures in Airports to Improve Cyber-Resilience ». Dans 2018 Global Internet of Things Summit (GIoTS). IEEE, 2018. http://dx.doi.org/10.1109/giots.2018.8534523.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

« ESTABLISHING CYBERSECURITY AWARENESS OF TECHNICAL SECURITY MEASURES THROUGH A SERIOUS GAME ». Dans Applied Computing 2022 and WWW/Internet 2022. IADIS Press, 2022. http://dx.doi.org/10.33965/ac_icwi2022_202208c030.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

R, Omshith, Vemisetti Pavan Balaji, Rayapudi Venkata Rahul et Kumaran U. « Enhanced Security Measures for Image Privacy : Encryption Perspectives ». Dans 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 2024. http://dx.doi.org/10.1109/idciot59759.2024.10467544.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ye, Chenghao, Praburam Prabhakar Indra et David Aspinall. « Retrofitting Security and Privacy Measures to Smart Home Devices ». Dans 2019 Sixth International Conference on Internet of Things : Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939272.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Verma, Vidushi, et Munish Bhatia. « Analysis of Security Measures on the Internet of Things based Applications ». Dans 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2022. http://dx.doi.org/10.1109/icosec54921.2022.9951914.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Mahmoud, Rwan, Tasneem Yousuf, Fadi Aloul et Imran Zualkernan. « Internet of things (IoT) security : Current status, challenges and prospective measures ». Dans 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2015. http://dx.doi.org/10.1109/icitst.2015.7412116.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Verma, Hanisha, et Kaur Chahal. « A review on security problems and measures of Internet of Things ». Dans 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2017. http://dx.doi.org/10.1109/iccons.2017.8250560.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Amel, Gherbia, et Zehani Soraya. « Enhancing Security and Privacy Measures in Internet of Things (IoT) Implementations ». Dans 2024 8th International Conference on Image and Signal Processing and their Applications (ISPA). IEEE, 2024. http://dx.doi.org/10.1109/ispa59904.2024.10536814.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Internet – security measures. sears"

1

Payment Systems Report - June of 2021. Banco de la República, février 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.

Texte intégral
Résumé :
Banco de la República provides a comprehensive overview of Colombia’s finan¬cial infrastructure in its Payment Systems Report, which is an important product of the work it does to oversee that infrastructure. The figures published in this edition of the report are for the year 2020, a pandemic period in which the con¬tainment measures designed and adopted to alleviate the strain on the health system led to a sharp reduction in economic activity and consumption in Colom¬bia, as was the case in most countries. At the start of the pandemic, the Board of Directors of Banco de la República adopted decisions that were necessary to supply the market with ample liquid¬ity in pesos and US dollars to guarantee market stability, protect the payment system and preserve the supply of credit. The pronounced growth in mone¬tary aggregates reflected an increased preference for liquidity, which Banco de la República addressed at the right time. These decisions were implemented through operations that were cleared and settled via the financial infrastructure. The second section of this report, following the introduction, offers an analysis of how the various financial infrastructures in Colombia have evolved and per¬formed. One of the highlights is the large-value payment system (CUD), which registered more momentum in 2020 than during the previous year, mainly be¬cause of an increase in average daily remunerated deposits made with Banco de la República by the General Directorate of Public Credit and the National Treasury (DGCPTN), as well as more activity in the sell/buy-back market with sovereign debt. Consequently, with more activity in the CUD, the Central Securi¬ties Depository (DCV) experienced an added impetus sparked by an increase in the money market for bonds and securities placed on the primary market by the national government. The value of operations cleared and settled through the Colombian Central Counterparty (CRCC) continues to grow, propelled largely by peso/dollar non-deliverable forward (NDF) contracts. With respect to the CRCC, it is important to note this clearing house has been in charge of managing risks and clearing and settling operations in the peso/dollar spot market since the end of last year, following its merger with the Foreign Exchange Clearing House of Colombia (CCDC). Since the final quarter of 2020, the CRCC has also been re¬sponsible for clearing and settlement in the equities market, which was former¬ly done by the Colombian Stock Exchange (BVC). The third section of this report provides an all-inclusive view of payments in the market for goods and services; namely, transactions carried out by members of the public and non-financial institutions. During the pandemic, inter- and intra-bank electronic funds transfers, which originate mostly with companies, increased in both the number and value of transactions with respect to 2019. However, debit and credit card payments, which are made largely by private citizens, declined compared to 2019. The incidence of payment by check contin¬ue to drop, exhibiting quite a pronounced downward trend during the past last year. To supplement to the information on electronic funds transfers, section three includes a segment (Box 4) characterizing the population with savings and checking accounts, based on data from a survey by Banco de la República con-cerning the perception of the use of payment instruments in 2019. There also is segment (Box 2) on the growth in transactions with a mobile wallet provided by a company specialized in electronic deposits and payments (Sedpe). It shows the number of users and the value of their transactions have increased since the wallet was introduced in late 2017, particularly during the pandemic. In addition, there is a diagnosis of the effects of the pandemic on the payment patterns of the population, based on data related to the use of cash in circu¬lation, payments with electronic instruments, and consumption and consumer confidence. The conclusion is that the collapse in the consumer confidence in¬dex and the drop in private consumption led to changes in the public’s pay¬ment patterns. Credit and debit card purchases were down, while payments for goods and services through electronic funds transfers increased. These findings, coupled with the considerable increase in cash in circulation, might indicate a possible precautionary cash hoarding by individuals and more use of cash as a payment instrument. There is also a segment (in Focus 3) on the major changes introduced in regulations on the retail-value payment system in Colombia, as provided for in Decree 1692 of December 2020. The fourth section of this report refers to the important innovations and tech¬nological changes that have occurred in the retail-value payment system. Four themes are highlighted in this respect. The first is a key point in building the financial infrastructure for instant payments. It involves of the design and im¬plementation of overlay schemes, a technological development that allows the various participants in the payment chain to communicate openly. The result is a high degree of interoperability among the different payment service providers. The second topic explores developments in the international debate on central bank digital currency (CBDC). The purpose is to understand how it could impact the retail-value payment system and the use of cash if it were to be issued. The third topic is related to new forms of payment initiation, such as QR codes, bio¬metrics or near field communication (NFC) technology. These seemingly small changes can have a major impact on the user’s experience with the retail-value payment system. The fourth theme is the growth in payments via mobile tele¬phone and the internet. The report ends in section five with a review of two papers on applied research done at Banco de la República in 2020. The first analyzes the extent of the CRCC’s capital, acknowledging the relevant role this infrastructure has acquired in pro¬viding clearing and settlement services for various financial markets in Colom¬bia. The capital requirements defined for central counterparties in some jurisdic¬tions are explored, and the risks to be hedged are identified from the standpoint of the service these type of institutions offer to the market and those associated with their corporate activity. The CRCC’s capital levels are analyzed in light of what has been observed in the European Union’s regulations, and the conclusion is that the CRCC has a scheme of security rings very similar to those applied internationally and the extent of its capital exceeds what is stipulated in Colombian regulations, being sufficient to hedge other risks. The second study presents an algorithm used to identify and quantify the liquidity sources that CUD’s participants use under normal conditions to meet their daily obligations in the local financial market. This algorithm can be used as a tool to monitor intraday liquidity. Leonardo Villar Gómez Governor
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie