279,484 research outputs found
IT Security in Hospital Management
Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in lost time and resources, legal repercussions, and damaged reputation. Despite warnings from a wealth of public breach notifications, many hospitals are inadequately prepared to deal with today's computer-based attacks. This research explores the root causes of hospital network and computer in security, and addresses these problems with methods implemented in actual hospitals. A lack of comprehension of methods to assess and implement security measures by hospital IT security employees can hinder network visibility and prevent their ability to stop threats. In addition, these same people are unable to express security concerns in terms management can understand, harming their credibility within the business as a whole. Without this sup- port, organizational change is impossible. By addressing these concerns with a combination of people, process, and tools, we can solve complex problems, protect patient data, and ensure IT operations so hospitals can serve their community and save lives
Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters
Most of the information is in the form of electronic data. A lot of
electronic data exchanged takes place through computer applications. Therefore
information exchange through these applications needs to be secure. Different
cryptographic algorithms are usually used to address these security concerns.
However, along with security there are other factors that need to be considered
for practical implementation of different cryptographic algorithms like
implementation cost and performance. This paper provides comparative analysis
of time taken for encryption by seven symmetric key cryptographic algorithms
(AES, DES, Triple DES, RC2, Skipjack, Blowfish and RC4) with variation of
parameters like different data types, data density, data size and key sizes.Comment: 8 pages, 4 figures, Fifth International Conference on Communications
Security & Information Assurance (CSIA 2014) May 24~25, 2014, Delhi, Indi
Ultrasonic Data Transmission and Steganography
This project discusses the feasibility of using ultrasound to transmit data between computer systems, particularly computer systems that have been intentionally cut off from traditional networks for increased security. The goal of this project is to provide a synthesis of the current research that has been done into the use of ultrasonic data transmission, and to conduct a series of tests determining the validity of certain claims made in regards to ultrasonic data transmission within the information security community. All research, experiments, results, and inferences have been discussed in the context of how they relate to the realm of information security. All security concerns discovered during the course of this project have been outlined at the end of this paper, and potential remediation strategies have been suggested
Password secured sites: stepping forward with keystroke dynamics
Computer Authentication is a critical component of
most computer systems – especially those used in e-
Commerce activities over the internet. Global access
to information makes security, namely the
authentication process, a critical design issue in these
systems. In what concerns to authentication, what is
required is a reliable, hardware independent and
efficient security system. In this paper, we propose an
extension to a keystroke dynamics based security
system. We provide evidence that completely software
based systems can be as effective as expensive and
cumbersome hardware based systems. Our system is a
behavioral based system that captures the normal
typing patterns of a user and uses that information, in
addition to standard login/password security to
provide a system that is user-friendly and very effective
at detecting imposters. The results provide a means of
dealing with enhanced security that is growing in
demand in web-based applications based on ECommerce
The 2010 Personal Firewall Robustness Evaluation
With the advent of cheaper Internet connections, the number of Internet connections among home users is on the rise. Generally, home users have little understanding of the security concerns associated with Internet connectivity. To protect against computer attacks, generally a home user may install a personal firewall on his/her computer. To determine the effectiveness of personal firewalls, evaluation tests were performed against the ten firewall products available to users at local electronic stores and listed on popular firewall security websites. The firewalls were tested in their default and maximum security mode. The investigation was carried out by performing a port scan and vulnerability scan attacks against a computer with no firewall protection and computers running personal firewalls. The results of the investigation established that the computers running the firewalls exhibited some or all of the vulnerabilities detected on a computer with no firewall protection
- …