412,204 research outputs found

    Reconfi guration analysis of carrier security system for IPv6

    Get PDF
    With the continuous development of the Internet, IPv6 planning and deployment has become the current “accelerate the construction of network power, to win the future international competition of new advantages” an urgent requirement, and the current security system reconstruction in the implementation of IPv6 planning and deployment plan has a very important practical promotion signifi cance. However, we should pay attention to one point is that compared with the Internet construction and operation and maintenance, the operator IPv6 network construction and its security operation and maintenance is a certain difference. Therefore, based on the background of the new era, it is very necessary to actively explore the path of IPv6 oriented carrier security system reconstruction planning. Based on this, this paper fi rst describes the application advantages of IPv6, and briefl y analyzes the status quo of the carrier security system, and discusses the reconstruction direction and planning of the IPv6 oriented carrier security system, for reference only

    Modeling and analysis of network resilience : the security perspective

    Get PDF
    The increased impact of global Internet in our daily lives is a continuous challenge for those who are responsible for their design, planning, implementation and administration. As the Internet becomes more important to citizens, organizations and nations, more pressure is placed in their reliability, availability and security or, in other terms, in its Resilience. Because Internet was not initially designed to support the actual levels of responsibility in the global economy, it is now evident that new paradigms and enhancements are needed to make this a resilient network. From the three disciplines that mainly characterize network resilience, security is one of the most challenging. In fact, the range of security threats that nowadays affect Internet is immense and increasingly complex, with the beginning of a new era where the concept of cyber-wars between nations becomes reality. One of the most relevant security threats is the malware and botnet phenomenon. Despite the development of several different types of countermeasures to fight these threats during more than a decade, this continues to be a field with big challenges and where new and solid improvements are needed

    Defining Objectives For Securing The Internet Of Things: A Value-Focused Thinking Approach

    Get PDF
    Over the past few years Internet of Things (IoT) has touched most people. Companies have been competing with each other in inventing new IoT based products and services. It has become a real business opportunity for various companies and a luxury for end users. Yet, the research on securing the Internet of Things (IoT) is in its infancy. In this study, we use the “value-focused thinking” approach to systematically identify IoT security values and objectives from 58 IT professionals. This study provides a foundation for strategically planning and thinking about IoT security. We present four fundamental objectives and thirteen means objectives. The results of this qualitative study will help researchers and practitioners identify and prioritize key IoT security issues

    A Secure Connection: Finding the Form of ASEAN Cyber Security Cooperation

    Get PDF
    Internet security is somehow being understated in ASEAN’s strategy facing 2015. ASEAN Connectivity as the blue print of ASEAN’s development strategy to strengthen the regional bond has not put proper attention in building security for guiding the connectivity plan among ASEAN member countries. This paper will discuss the future of cyber security cooperation particularly as ASEAN is planning to connect the region through ICT. This paper will try to analyse what kind of framework ASEAN will need on preparation to widen its security agenda to cyber world in the future to complete its preparation of being connected

    Rating Retirement Advice: A Critical Assessment of Retirement Planning Software

    Get PDF
    This paper develops a rating system for internet-based free retirement planning software that assumes unsophisticated users. The rating system takes into account two of the most important sources of retirement income—Social Security and investments—and the two main determinants of retirement income needs—the length of the planning period and the target replacement rate or target retirement income. We illustrate the rating approach with a sample of programs, and we find that these often tend to do a poor job in the way they handle Social Security benefits. Some encourage older persons to assume large benefit cuts, which we view as unlikely

    Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration

    Get PDF
    There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems ‘expose’ relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT)

    NSI customer service representatives and user support office: NASA Science Internet

    Get PDF
    The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols

    Voices Raised, Issue 04

    Get PDF
    Included in this issue: 3rd annual Women’s Leadership Conference; 2004 Miryam Award; Mentoring program begins planning for year two; Women’s Studies Then and Now; Women in Juarez inspire students; Walking for a cause and a cure; Making smart – and tough – health care decisions; Is there anything as a healthy tan?; Picturing Faith; Tips for Internet security from UD Public Safety; Is sexual assault a problem at UD?https://ecommons.udayton.edu/wc_newsletter/1003/thumbnail.jp

    Componente di Sicurezza del TIX e della Infrastruttura di RTRT - Indicazioni tecniche per le fasi di progettazione e gestione

    Get PDF
    TIX (Tuscany Internet eXchange) is a Neutral Access Point (NAP) to promote territorial connectivity cover of Tuscany region for Public Local Government that belongs to RTRT (Tuscany Data Transmission Network) Infrastructure. Starting from TIX planning analysis, we provide a description of the process to secure and protect TIX indicating strategies and methodologies to improve the security system level
    • 

    corecore