1,538 research outputs found

    A distributed cyber-security framework for heterogeneous environments

    Get PDF
    Evolving business models, computing paradigms, and management practices are rapidly re-shaping the usage models of ICT infrastructures, and demanding for more flexibility and dynamicity in enterprise security, beyond the traditional "security perimeter" approach. Since valuable ICT assets cannot be easily enclosed within a trusted physical sandbox any more, there is an increasing need for a new generation of pervasive and capillary cyber-security paradigms over distributed and geographically-scattered systems. Following the generalized trend towards virtualization, automation, software-definition, and hardware/software disaggregation, in this paper we elaborate on a multi-tier architecture made of a common, programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms. Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments, including legacy enterprise networks, IoT installations, and virtual resources deployed in the cloud

    A secure cloud storage scheme on fog computing- −, − and operation

    Get PDF
    Fog server based three-layer design has been introduced for secure storage employing multiple clouds. The fundamental methods utilized are Hash-Solomon code and redid hash algorithm so as to achieve the objective. However, it brought about loss of littler part of data to cloud servers and neglected to give better change location and data recoverability. It proposes a novel haze driven secure cloud storage plan to ensure data against unapproved access, alteration, and obliteration. To forestall ill-conceived get to, the proposed plot utilizes another system − to cover data. Also, block management outsources the results of − to forestall pernicious recovery and to guarantee better recoverability if there should arise an occurrence of data misfortune. At the same time, we propose a procedure dependent on hash algorithm so as to encourage alteration detection with higher probability

    Cyber Security and Critical Infrastructures

    Get PDF
    This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues

    Assessing Security Risks with the Internet of Things

    Get PDF
    For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers to keep the security, confidentiality, and availability of data in the right hands

    The law of cyber targeting

    Get PDF
    Cyber technology on the battlefield has outpaced the law, or at least full understanding of how extant law governs emerging capabilities—a strategically perilous state of affairs

    Constrained Cognition: Information Management and the Practical Limits of Nuclear Escalation Control

    Get PDF
    Nuclear escalation control theory rests on the idea that decision makers, in a limited nuclear war scenario, will choose their actions based on a rational assessment of the available information. That information essentially consists of intelligence reports about one\u27s adversary and information reporting the status of one\u27s own forces\u27 ability to execute offensive actions and the damage level of vital national targets. Yet the practical limits of managing the flow and quality of this information, coupled with the fog and friction inherent in human analyses, significantly affect the decision-making process vis-à-vis nuclear escalation. Hence, these limitations cast a pall over any military doctrine that relies heavily on the assumption that nuclear escalation can be controlled with precision. Examining information management during the Cuban Missile Crisis shows the practical limits of managing this information flow, which in turn limits the ability of national leaders to make such decisions properly
    • …
    corecore