412,204 research outputs found
Reconfi guration analysis of carrier security system for IPv6
With the continuous development of the Internet, IPv6 planning and deployment has become the current âaccelerate the
construction of network power, to win the future international competition of new advantagesâ an urgent requirement, and the current
security system reconstruction in the implementation of IPv6 planning and deployment plan has a very important practical promotion
signifi cance. However, we should pay attention to one point is that compared with the Internet construction and operation and maintenance,
the operator IPv6 network construction and its security operation and maintenance is a certain difference. Therefore, based on the
background of the new era, it is very necessary to actively explore the path of IPv6 oriented carrier security system reconstruction planning.
Based on this, this paper fi rst describes the application advantages of IPv6, and briefl y analyzes the status quo of the carrier security system,
and discusses the reconstruction direction and planning of the IPv6 oriented carrier security system, for reference only
Modeling and analysis of network resilience : the security perspective
The increased impact of global Internet in our daily lives is a continuous challenge for those who are responsible for their design, planning, implementation and administration.
As the Internet becomes more important to citizens, organizations and nations, more pressure is placed in their reliability, availability and security or, in other terms, in its Resilience.
Because Internet was not initially designed to support the actual levels of responsibility in the global economy, it is now evident that new paradigms and enhancements are needed to make this a resilient network.
From the three disciplines that mainly characterize network resilience, security is one of the most challenging. In fact, the range of security threats that nowadays affect Internet is immense and increasingly complex, with the beginning of a new era where the concept of cyber-wars between nations becomes reality.
One of the most relevant security threats is the malware and botnet phenomenon. Despite the development of several different types of countermeasures to fight these threats during more than a decade, this continues to be a field with big challenges and where new and solid improvements are needed
Defining Objectives For Securing The Internet Of Things: A Value-Focused Thinking Approach
Over the past few years Internet of Things (IoT) has touched most people. Companies have been competing with each other in inventing new IoT based products and services. It has become a real business opportunity for various companies and a luxury for end users. Yet, the research on securing the Internet of Things (IoT) is in its infancy. In this study, we use the âvalue-focused thinkingâ approach to systematically identify IoT security values and objectives from 58 IT professionals. This study provides a foundation for strategically planning and thinking about IoT security. We present four fundamental objectives and thirteen means objectives. The results of this qualitative study will help researchers and practitioners identify and prioritize key IoT security issues
Recommended from our members
A Clean-Slate Design for the Next-Generation Secure Internet
This is the report on a workshop held at CMU on July 12-14, 2005. The workshop is part of the planning process initiated by NSF to explore potential architectures for a next generation secure network designed to meet the needs of the 21st century. In considering future architectures, we ignore issues of backward compatibility with the current Internet but seek to benefit from the experience gained by analyzing both the strengths and weaknesses of the current design. Specifically, this workshop looks at the fundamental interplay between security and underlying network architecture and seeks to chart a preliminary course for future work in this crucial research area. This workshop focused on initiating a productive dialog between experts from the network security and network architecture communities. The agenda was arranged to stimulate initial consideration of the security goals for a new Internet, the design space of possible solutions, how research in security and network architecture could be integrated so that security is included as a first-tier objective in future architectures, and to explore methods for identifying and considering the social consequences of these architecture and security design choices
A Secure Connection: Finding the Form of ASEAN Cyber Security Cooperation
Internet security is somehow being understated in ASEANâs strategy facing 2015. ASEAN Connectivity as the blue print of ASEANâs development strategy to strengthen the regional bond has not put proper attention in building security for guiding the connectivity plan among ASEAN member countries. This paper will discuss the future of cyber security cooperation particularly as ASEAN is planning to connect the region through ICT. This paper will try to analyse what kind of framework ASEAN will need on preparation to widen its security agenda to cyber world in the future to complete its preparation of being connected
Rating Retirement Advice: A Critical Assessment of Retirement Planning Software
This paper develops a rating system for internet-based free retirement planning software that assumes unsophisticated users. The rating system takes into account two of the most important sources of retirement incomeâSocial Security and investmentsâand the two main determinants of retirement income needsâthe length of the planning period and the target replacement rate or target retirement income. We illustrate the rating approach with a sample of programs, and we find that these often tend to do a poor job in the way they handle Social Security benefits. Some encourage older persons to assume large benefit cuts, which we view as unlikely
Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration
There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems âexposeâ relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT)
NSI customer service representatives and user support office: NASA Science Internet
The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols
Voices Raised, Issue 04
Included in this issue: 3rd annual Womenâs Leadership Conference; 2004 Miryam Award; Mentoring program begins planning for year two; Womenâs Studies Then and Now; Women in Juarez inspire students; Walking for a cause and a cure; Making smart â and tough â health care decisions; Is there anything as a healthy tan?; Picturing Faith; Tips for Internet security from UD Public Safety; Is sexual assault a problem at UD?https://ecommons.udayton.edu/wc_newsletter/1003/thumbnail.jp
Componente di Sicurezza del TIX e della Infrastruttura di RTRT - Indicazioni tecniche per le fasi di progettazione e gestione
TIX (Tuscany Internet eXchange) is a Neutral Access Point (NAP) to promote territorial connectivity cover of Tuscany region for Public Local Government that belongs to RTRT (Tuscany Data Transmission Network) Infrastructure. Starting from TIX planning analysis, we provide a description of the process to secure and protect TIX indicating strategies and methodologies to improve the security system level
- âŠ