3,877 research outputs found

    Survey of LAN infrastructure and ICT equipment in schools: November 2005 to January 2006 (summary report)

    Get PDF
    Nationally representative technical audit of school infrastructure - summar

    Poor ergonomics costs but can good be made to pay?

    Get PDF

    Security practices: A Mixed approach

    Get PDF
    Consistency of information is ideally maintained by adhering to the best practices and policies. However, statistics show trends of rising threats in information security in global landscape. It leads us to believe that there may be scope for improvement in transforming a good policy on paper into a better practice. This thesis research identifies various points of failure that arise out of improper implementation of a good policy. This research provides basic guidelines for implementation of usable security policies

    Network Security Concepts, Dangers, and Defense Best Practical

    Get PDF
    In today's highly interconnected world, network security has become a critical aspect of protecting organizations from cyber-attacks. The increasing sophistication of attackers and their ability to exploit software and firmware vulnerabilities pose significant dangers to the security of networks. However, many organizations often neglect the essential steps required to secure their networks, leading to an increased risk of security breaches. In this research article, we aim to address this issue by investigating network security concepts, potential dangers, and practical defense strategies. We begin by exploring the different types of cyber-attacks and their sources, highlighting the various ways attackers exploit network vulnerabilities. We also examine the reasons why organizations often overlook network security and the consequences of not prioritizing it. To better understand the complexity of network security, we categorize the different security concerns using the CIA (confidentiality, integrity, and availability) triangle. This approach allows us to identify the various areas of vulnerability and their potential impact on network security. Next, we focus on the most crucial basic concepts and steps involved in various network security operations. We outline the best practices and practical approaches organizations can take to improve their network security, including implementing security policies and procedures, using encryption and authentication methods, and conducting regular security assessments. By highlighting the importance of network security and providing practical guidance on how organizations can defend against cyber-attacks, we hope to raise awareness and help prevent security breaches. Keywords: Network, Internet, Security, Security Threats, IP Address, Network Attack, Attackers DOI: 10.7176/CEIS/14-2-03 Publication date:March 31st 202

    Workshop proceedings: Information Systems for Space Astrophysics in the 21st Century, volume 1

    Get PDF
    The Astrophysical Information Systems Workshop was one of the three Integrated Technology Planning workshops. Its objectives were to develop an understanding of future mission requirements for information systems, the potential role of technology in meeting these requirements, and the areas in which NASA investment might have the greatest impact. Workshop participants were briefed on the astrophysical mission set with an emphasis on those missions that drive information systems technology, the existing NASA space-science operations infrastructure, and the ongoing and planned NASA information systems technology programs. Program plans and recommendations were prepared in five technical areas: Mission Planning and Operations; Space-Borne Data Processing; Space-to-Earth Communications; Science Data Systems; and Data Analysis, Integration, and Visualization

    Paper Session II-C - Introducing New Technologies Into Space Station Subsystems

    Get PDF
    In a cooperative effort between Kennedy Space Center, Stanford University and Lockheed Space Operations Company, a new systems engineering methodology has been developed and applied in the operational world of Shuttle processing. The new engineering approach stresses the importance of identifying, quantitatively assessing, and managing system performance and risk related to the dynamic nature of requirements, technology, and operational concepts. Under the cooperative program entitled, Space Systems Integration and Operations Research Applications (SIORA), the modernization of the processing operations for the Shuttle thermal protection system (IPS) or tiles became the first application of the engineering methodology. This effort adopted an approach consisting of an integrated set of rapid prototyping testbeds in which a government/ university/industry team of users, technologists, and engineers tested and evaluated new concepts and technologies within and in parallel to Shuttle processing operations. The integrated set of technologies introduced included speech recognition and synthesis capabilities, laser imaging inspection systems, distributed Ada programming environments, distributed relational database architectures, in addition to distributed computer network architectures, multi-media workbenches, expert system applications, probabilistic risk assessment modeling, and human factors considerations. The successful operational implementation of the integrated prototype, referred to as the Space Shuttle Tile Automation System, has validated the engineering methodology and strongly indicates that the same approach would be a viable systems engineering and project management tool for Freedom Space Station. This paper will address the lessons learned from the Shuttle processing experience and will present concepts which are applicable to the design and development of the Freedom Space Station

    Annual Report 1996-1997

    Get PDF
    An administrative report of statistics and information pertaining to the University of North Florida Thomas G. Carpenter Library for the years 1996-1997.The report includes summaries and charts on library budgets, library collection, serials and cataloging workloads, circulation, interlibrary loan, and public services
    • …
    corecore