240 research outputs found

    Structural Characteristic of the German-English Hybrids of the Information Security Sphere

    Get PDF
    The article describes the results of structural analysis of the German-English hybrid terms of the information security sphere. The obtained data testify to the serious impact of the English influence on German primarily in the peripheral sphere of the German language stock. The hybridity is stated as a result of aggregation of the literary German lexical system and language mixing owning to an invasive borrowing process

    Strafverfolgung im Internet

    Get PDF

    Complete Security Package for USB Thumb Drive

    Get PDF
    This paper is devoted to design and implement a complete security platform for USB flash disks due to the popularity of this device in exchanging data, it is a complete system security solution as it concerns the thumb drive due to the manipulation of I/O operation not the file system.  USB flash disks have been the major threat for computer system beside the internet threats where viruses can spread from computer to computer or from computer to network. USB complete security system presented by this paper is composed of three essential elements: kernel filter driver which will be installed in USB device driver stack to intercept all exchanged packets and send it to encryption unit, kernel level encryption/decryption unit and configuration unit. In contrary to most USB security modules the system presented by this paper will store only the round number of the key generator with the encrypted data. Round number will be coded using MD5 algorithm to increase the immunity of attacking data stored in the flash disks. Keywords: USB protection, kernel driver, device stack, encryption/decryption, filter driver, MD5.

    ORANGE 0115

    Get PDF
    Forschungsmagazin ORANGE für das Jahr 201

    Trusted Computing: eine universelle Sicherheitsplattform kann Marktzutritt beschränken

    Get PDF
    Unter dem Label Trusted Computing Group hat sich ein weltweites Konsortium von Unternehmen der Hard- und Softwareindustrie gebildet, das an einem universellen Standard für sichere Rechnersysteme einschließlich der Datenkommunikation über Internetverbindungen arbeitet. Im Rahmen der Trusted-Computing-Architektur wird bezweckt, dass nur zertifizierte Hard- und Softwarekomponenten nutzbar sind, um nachträgliche Manipulationen durch nicht-zertifizierte Komponenten zu unterbinden. Im Zuge der zunehmenden weltweiten Angriffe auf Rechnersysteme soll damit den wachsenden Sicherheitsbedürfnissen der Anwender gegen unautorisierte Eingriffe erfolgreicher als bisher Rechnung getragen werden. Diese Strategie wirft jedoch auch wettbewerbspolitische Fragen hinsichtlich möglicher Marktzutrittsbarrieren insbesondere für innovative kleinere und mittlere Unternehmen auf. Dies ist vor allem dann zu erwarten, wenn die durch Trusted Computing vorgegebenen Zertifizierungen nicht diskriminierungsfrei und mit ausreichender Transparenz erfolgen sollten. Schließlich ist die Umstellung auf eine solche neuartige Systemarchitektur mit erheblichen Kosten verbunden. Andererseits bietet die neue Technologie auch neue Geschäftsfelder für die Informations- und Kommunikationsindustrie.Trusted computing, Information security, Competition Policy

    Assessing the links between childhood trauma, C-reactive protein and response to antidepressant treatment in patients with affective disorders

    Get PDF
    Adverse Childhood Experiences (ACE) are a well-known risk-factor for depression. Additionally, (high-sensitive) C-reactive Protein (hsCRP) is elevated in subgroups of depressed patients and high following ACE. In this context the literature considers hsCRP and ACE to be associated with treatment resistant depression. With the data being heterogenous, this study aimed to explore the associations of ACE, hsCRP levels and response to antidepressant treatment in uni- and bipolar depression. N = 76 patients diagnosed with uni- or bipolar depression and N = 53 healthy controls were included. Treatment was over 6~weeks in an inpatient psychiatric setting within an observatory study design. Depressive symptoms were assessed by the Montgomery-Asberg Depression Rating Scale (MADRS), ACE were assessed by the Childhood Trauma Questionnaire (CTQ); the body-mass-index (BMI) and hsCRP were measured. HsCRP levels did not differ between the study population and the healthy controls. While the depressive symptoms decreased, the hsCRP levels increased. Sexual abuse was associated with significant higher and emotional abuse with lower levels of hsCRP after 6~weeks. The baseline hsCRP levels and the ACE subgroups did not~show significant associations with the treatment response in unipolar depressed patients. The long-lasting effects of specific forms of ACE may have relevant impact on inflammation, supporting hsCRP to be a suitable biomarker. With ACE and hsCRP not showing any significant associations with treatment response in the unipolar depressed subgroup, a more differentiate research concerning biomarkers and treatment regimens is needed when talking about treatment response
    corecore