13,069 research outputs found

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Demystifying “Pornography”: Tailoring Special Release Conditions Concerning Pornography and Sexually Oriented Expression

    Get PDF
    [Excerpt] “This article examines the design of special release conditions and the problems that arise when such conditions do not comport with constitutional standards. Part I provides a general overview of the First Amendment issues that often arise with respect to special release conditions. Part II discusses the current state of the law and classifies the types of bans defendants have encountered in supervised release conditions. Part III explains the factors that are frequently considered in assessing the validity of special release conditions, and Part IV suggests a new approach for evaluating the constitutionality of special release conditions. The article concludes by endorsing constitutionally permissible tailoring for release conditions and by encouraging courts to interpret these conditions with careful attention to the individual defendant’s situation.

    Cyber Insurance, Data Security, and Blockchain in the Wake of the Equifax Breach

    Get PDF

    Globalisation : 'sceptical' notes on the 1999 Reith lectures

    Get PDF
    The contemporary debate concerning the limits of feasible public policy is invariably conducted in the somewhat sinister shadow cast by the image of globalisation. To have no opinion on globalisation is effectively to disqualify oneself from having anything to say about the way our world looks as we reach the millennium. The BBC’s recent Reith Lectures are therefore wholeheartedly to be welcomed for opening a public arena in which to conduct a debate whose significance could scarcely be overstated.1 In so doing, it offers the opportunity, if not to democratise globalisation, then at least to democratise the discussion of globalisation. Whether intentional or not, the BBC has made it possible to extend and refocus the debate beyond the narrow terms of political and academic reference in which it is so frequently cast, thereby rendering it accessible to those on whose futures it will impinge most directly. Moreover, in Anthony Giddens, the programmes’ producers could have made no better choice to lead the widening of the debate within the public domain

    Addressing the Node Discovery Problem in Fog Computing

    Get PDF
    In recent years, the Internet of Things (IoT) has gained a lot of attention due to connecting various sensor devices with the cloud, in order to enable smart applications such as: smart traffic management, smart houses, and smart grids, among others. Due to the growing popularity of the IoT, the number of Internet-connected devices has increased significantly. As a result, these devices generate a huge amount of network traffic which may lead to bottlenecks, and eventually increase the communication latency with the cloud. To cope with such issues, a new computing paradigm has emerged, namely: fog computing. Fog computing enables computing that spans from the cloud to the edge of the network in order to distribute the computations of the IoT data, and to reduce the communication latency. However, fog computing is still in its infancy, and there are still related open problems. In this paper, we focus on the node discovery problem, i.e., how to add new compute nodes to a fog computing system. Moreover, we discuss how addressing this problem can have a positive impact on various aspects of fog computing, such as fault tolerance, resource heterogeneity, proximity awareness, and scalability. Finally, based on the experimental results that we produce by simulating various distributed compute nodes, we show how addressing the node discovery problem can improve the fault tolerance of a fog computing system

    Governing, Exchanging, Securing: Big Data and the Production of Digital Knowledge

    Get PDF
    The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, and also diverged in ways, in the production of Big Data? Which sectors have stimulated the production and mining of this information? How have the various projects aligned or contradicted each other? In this paper, I begin to explore these questions along two dimensions. First, I sketch in broad strokes the historical development and growth of the digital realm. I offer some categories to understand the mass of data that surrounds us today, and lay some foundation for the notion of a digital knowledge. Then, I investigate the new political economy of data that has emerged, as a way to suggest some of the larger forces that are at play in our new digital age

    Demystifying Remote Research in Anthropology and Area Studies

    Get PDF
    Physically cut off from locations and archives central to our work due to restrictions in response to the global COVID-19 pandemic, area studies scholars must reimagine what constitutes rigorous and responsible research in their respective disciplines. The practice of remote research, however, is not a new one. Digital ethnography, an admittedly niche subdiscipline of anthropology, has long been grappling with the issues of how to value and conduct remote research. This essay explores a number of misconceptions regarding digital and remote research that may aid in contextualizing and coming to terms with the anxieties the broader scholarly community faces. I suggest that we strive in this moment not simply to adapt and adopt remote research as a temporary fix until we can resume business as usual, but to integrate it into our disciplinary frameworks as a legitimate and valuable mode of research
    • …
    corecore