5,566 research outputs found

    The cyber security learning and research environment

    Get PDF
    This report outlines the design and configuration of the Cyber Security Learning and Research Environment (CLARE). It explains how such a system can be implemented with minimal hardware either on a single machine or across multiple machines. Moreover, details of the design of the components that constitute the environment are provided alongside sufficient implementation and configuration documentation to allow for replication of the environment

    Design and deployment of real scenarios of TCP/IP networking and it security for software defined networks with next generation tools

    Get PDF
    This thesis is about NSX, a Software Defined tool provided by VMware, to deploy and design virtual networks. The recent growth in the marked pushed companies to invest and use this kind of technology. This thesis explains three main NSX concepts and the basis to perform some deployments. Some use cases regarding networking and security are included in this document. The purpose of these use cases is to use them in real scenarios, which is the main purpose of the thesis. The budget to deploy these use cases is included as an estimation about how much a project like this would cost for the company. Finally, there are some conclusions and tips for best practices

    Deep Space Network information system architecture study

    Get PDF
    The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies, such as the following: computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control

    Laboratory information management system study & development of LIMS web platform application for CTCV - Coimbra

    Get PDF
    The World Wide Web not only changes the process but also improves the user experience. Also, it dramatically changes how the computer software is built. This profound evolution of software development has caused developers in the software industry to change their way of developing software. In this project, the Laboratory Information Management System (LIMS) for Staff and Users of small business have been designed and developed using Throwaway Prototyping methodology with the web architecture. Different types of development platforms are available in the market to develop this application, but as per the company requirements, this application was developed with the .net framework. This web application allows us to access application data on different devices like a tablet, a desktop, a smartphone from the remote location all over the world. The main feature of this application offers to monitor the application activity like which activity was performed by the user with the corresponding date, time and short description. Therefore, this software uses an industry standard relational database management system (RDBMS) combined with a platform-independent web browser interface for data entry and the retrieval. (The 3-tier technology) The laboratory workflow steps facilitate the management and tracking of all test and test results, which ensures that the right information is available at the right time to a right person. This system will produce an efficient process in the laboratory which leads to faster work, fewer errors, and smoother workflow for an organization. Keywords IndustryN/

    Design of a Passive RFID System for Asset Tracking

    Get PDF
    This project focuses on the feasibility of utilizing the lower cost passive RFID technology to track electronic test equipment for Raytheon Company. Although developed for a specific storeroom at Raytheon Company’s Network Centric Division’s (NCD) laboratory in Goleta, California, the project concepts and design are applicable to many portal-based asset tracking systems. The first part of the project consisted of experimentally evaluating the reliability of passive versus active technologies and selecting the best commercially available hardware offering when applied to asset tracking. The second part of the project consisted of developing a complete asset tracking system. The primary goals of the project were to reduce efforts spent on paper-based processes and gain a better view of asset movement for a significantly lower cost than another division’s current active RFID system

    Architecture and Information Requirements to Assess and Predict Flight Safety Risks During Highly Autonomous Urban Flight Operations

    Get PDF
    As aviation adopts new and increasingly complex operational paradigms, vehicle types, and technologies to broaden airspace capability and efficiency, maintaining a safe system will require recognition and timely mitigation of new safety issues as they emerge and before significant consequences occur. A shift toward a more predictive risk mitigation capability becomes critical to meet this challenge. In-time safety assurance comprises monitoring, assessment, and mitigation functions that proactively reduce risk in complex operational environments where the interplay of hazards may not be known (and therefore not accounted for) during design. These functions can also help to understand and predict emergent effects caused by the increased use of automation or autonomous functions that may exhibit unexpected non-deterministic behaviors. The envisioned monitoring and assessment functions can look for precursors, anomalies, and trends (PATs) by applying model-based and data-driven methods. Outputs would then drive downstream mitigation(s) if needed to reduce risk. These mitigations may be accomplished using traditional design revision processes or via operational (and sometimes automated) mechanisms. The latter refers to the in-time aspect of the system concept. This report comprises architecture and information requirements and considerations toward enabling such a capability within the domain of low altitude highly autonomous urban flight operations. This domain may span, for example, public-use surveillance missions flown by small unmanned aircraft (e.g., infrastructure inspection, facility management, emergency response, law enforcement, and/or security) to transportation missions flown by larger aircraft that may carry passengers or deliver products. Caveat: Any stated requirements in this report should be considered initial requirements that are intended to drive research and development (R&D). These initial requirements are likely to evolve based on R&D findings, refinement of operational concepts, industry advances, and new industry or regulatory policies or standards related to safety assurance

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security

    Study of Desktop Computer Energy Waste at Worcester Polytechnic Institute

    Get PDF
    This IQP sought to improve sustainability at WPI by reducing the energy wasted by the university’s desktop computers. Energy waste was calculated by inventorying desktop computers, measuring their power draw, and estimating the ways in which they were used. It was found that the university’s desktop computers waste approximately 300,000 kWh of electricity annually; however, a policy of putting idle computers to sleep with Windows 7 Power Options could reduce this waste by 69%
    • …
    corecore