3,034 research outputs found

    Evaluation of EPIM III: Emerging Insights From the Evaluation So Far

    Get PDF
    This report sets out some emerging insights from the ongoing evaluation of the European Programme for Integration and Migration (EPIM) 2012-2015 programme. The activities of EPIM and this evaluation lie at the very heart of EPIM's efforts to strengthen the capacity of NGOs active in migration and integration issues, to engage with and influence decision-making at EU and Member state levels, and to do so by drawing on a rigorous evidence base, and through a pragmatic approach. Founded in 2005 as an activity of the Network of European Foundations (NEF) in a unique effort to fund European migration and integration organisations, EPIM's activities include strategic grant-making as well as networking, capacity-building, supporting advocacy and policy work. The Programme has now disbursed over 3m to more than 24 grantee organisations. Drawing on experience and learning from previous phases, EPIM's current three core areas of focus are asylum seekers, undocumented migrants, and equality, integration and social inclusion of vulnerable migrants. Recognising the importance of the role played by civil society, one of EPIM's key goals is to strengthen the advocacy capacities of NGOs at the European level. This goal reflects the fact that over the past decade the EU has become an important actor in the field of immigration and asylum, as well as that the majority of countries face some challenges in this area

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA

    Voice and Video Capacity of a Secure Wireless System

    Get PDF
    Improving the security and availability of secure wireless multimedia systems is the purpose of this thesis. Specifically, this thesis answered research questions about the capacity of wireless multimedia systems and how three variables relate to this capacity. The effects of securing the voice signal, real-time traffic originating foreign to a wireless local area network and use of an audio-only signal compared with a combined signal were all studied. The research questions were answered through a comprehensive literature review in addition to an experiment which had thirty-six subjects using a secure wireless multimedia system which was developed as part of this thesis effort. Additionally, questions related to the techniques for deploying wireless multimedia system including the maturity and security of the technology were answered. The research identified weaknesses in existing analytical and computer models and the need for a concise and realistic model of wireless multimedia systems. The culmination of this effort was the integration of an audio-video system with an existing research platform which is actively collecting data for the Logistics Readiness Branch of the Air Force Research Laboratory

    Securing our future : using our resources well : a discussion paper on the better use of resources in schools

    Get PDF

    Developing Best Practices for Securing VoIP Communication for a non-profit Organization

    Get PDF
    Voice over Internet Protocol (VoIP) is the most widely used service around the world. The proficiency of it utilizing the web has increased awesome ubiquity in the current years. With this notoriety, there is expanding worry about the wellbeing of the system. The robbery or loss of the information being exchanged is great concern. For example, a basic problem for researchers who are developing safeguards for VoIP systems is the level of threats and other issues experienced by the non-profit organizations while implementing VoIP communication. This problem originated when non-profits received pressure from their donors not to implement VoIP communication because it will record important and valuable information of their bank account, including their bank balance, and consequently, exposing them to the public. Other dangers include safeguarding secrecy, respectability, and accessibility of the system, known as CIA. dangers. To battle these dangers, some security conventions and calculations have been produced. For example, the H.235 has been investigated, their calculations updated, and it is currently regarded as the most recent and effective system for security of the VoIP system. Another method for battling issues and concerns, and one that is the most proficient due to bigger budgets than non-profits, is VoIP being utilized in new structures and the IT work force. Fortunately, the expanding interest of VoIP has guaranteed and emphasized the requirement for more research to build up the effective security structures and countermeasures of CIA threats. This investigation examines the methods by which such security issues concerning VoIP can be set out to give an appropriate, secure and effective method for correspondence and data trade. In this postulation, the analyst will profoundly examine the relief of VoIP security issues

    Subjective Audio Quality over a Secure IEEE 802.11n Draft 2.0 Wireless Local Area Network

    Get PDF
    This thesis investigates the quality of audio generated by a G.711 codec and transmission over an IEEE 802.11n draft 2.0 wireless local area network (WLAN). Decline in audio quality due to additional calls or by securing the WLAN with transport mode Internet Protocol Security (IPsec) is quantified. Audio quality over an IEEE 802.11n draft 2.0 WLAN is also compared to that of IEEE 802.11b and IEEE 802.11g WLANs under the same conditions. Audio quality is evaluated by following International Telecommunication Union Telecommunication Standardization Sector (ITU-T) Recommendation P.800, where human subjects rate audio clips recorded during various WLAN configurations. The Mean Opinion Score (MOS) is calculated as the average audio quality score given for each WLAN configuration. An 85% confidence interval is calculated for each MOS. Results suggest that audio quality over an IEEE 802.11n draft 2.0 WLAN is not higher than over an IEEE 802.11b WLAN when up to 10 simultaneous G.711 calls occur. A linear regression of the subjective scores also suggest that an IEEE 802.11n draft 2.0 WLAN can sustain an MOS greater than 3.0 (fair quality) for up to 75 simultaneous G.711 calls secured with WPA2, or up to 40 calls secured with both WPA2 and transport mode IPsec. The data strongly suggest that toll quality audio (MOS ≥ 4.0) is not currently practical over IEEE 802.11 WLANs secured with WPA2, even with the G.711 codec

    Network Security - Is IP Telephony helping the cause?

    Get PDF
    The major players in the Public Branch Exchange (PBX) market are moving rapidly towards the implementation of IP Telephony. What will be the effect on network security overall? Will the push to IP Telephony damage the good work already devoted to security networks? As more doorways open up on our networks there is an increased chance we have opened another unseen vector for hackers and other malicious organisation or individuals to access the data stored on server and users workstations, corrupting that data or destroying it. Is it better from a security perspective to have IP telephony only between PBX equipment – a significant saving in itself or is it imperative that an organisation have IP telephony to the desktop? Is there any real difference, once IP Telephony is past the network boundary does it matter if it also appears at the desktop? What about the future with collaboration and unified collaboration? This paper will discuss a number of implementations and attempt to understand the pros and cons of each. No one solution is going to fit all networks but hopefully this paper will be able to increase our understanding of the dangers and therefore allow for the development of robust solutions
    • …
    corecore