231 research outputs found

    Public Key Infrastructure

    Full text link

    China's race to global technology leadership

    Get PDF
    ISPI. L’ISPI è un think tank indipendente dedicato allo studio delle dinamiche politiche ed economiche internazionali fondato nel 1934. È l’unico istituto italiano – e tra i pochissimi in Europa – ad affiancare all’attività di ricerca un significativo impegno nella formazione, nella convegnistica e nell’analisi dei rischi e delle opportunità a livello mondiale per le imprese e le istituzioni. L’ISPI privilegia un approccio interdisciplinare e “policy-oriented” reso possibile da un team di ricerca di oltre 50 analisti e può inoltre contare su un network internazionale di 70 università, think tank e centri di ricerca. Nella classifica redatta dall’Università di Pennsylvania, l’ISPI si è posizionato al primo posto al mondo tra i “Think Tank to Watch” nel 2019

    Modernization of Manufacturing with Cybersecurity at the Forefront

    Full text link
    With the proliferation of Industrial Control Systems (ICSs), manufacturing processes have improved over the last 30 years, however, the organizational focus to securely exchange and process information to/from integrated systems has been consistently lacking. These environments continue to be susceptible to security vulnerabilities, despite history [15] showing that cybersecurity exposures in manufacturing have largely gone unaddressed and continue to rise [52]. This study evaluates cybersecurity challenges in the industry and proposes recommendations for practical and fiscally responsible defense-in-depth cybersecurity protections for manufacturing environments. The business operating model, how ICSs became pervasive, as well as the major components that enable the operational technology (OT) were evaluated. With an understanding of the traditional network architecture for the industry [37], the rapidly evolving challenges facing the industry were examined. These challenges are impactful to the traditional and slow to change manufacturing operating model that has not focused on the necessary cyber protections for their OT environments. In addition, the industry is now facing game-changing technological concepts such as advanced manufacturing and Industry 4.0 that bring new complex challenges and cyber threats, unfamiliar to most in the industry. This is all underpinned by an organizational divide where the personnel most knowledgeable with the modern technology and cyber risks, in the majority of cases, are not responsible for the OT architecture and security. These headwinds impact an industry which spends the least on IT and cyber security than any other industry, globally [22]. The cyber risks and challenges in the industry are diverse, spanning technological and organizational competencies, stemming from purpose built components which operate in an ecosystem where cybersecurity is an afterthought. As a means to close the gap, practical and reasonable recommendations to address these problems are discussed; some specific and unique to the manufacturing industry while others are fundamental applications discussed with a manufacturing industry lens, which are commonly ignored due to perceived complexity, cost or simply lack of awareness. Lastly, a number of these recommendations were selected for further evaluation and implementation; challenges, approach, benefits and outcomes are shared showing measureable improvements to the cybersecurity posture of the organization.Master of ScienceComputer and Information Science, College of Engineering & Computer ScienceUniversity of Michigan-Dearbornhttps://deepblue.lib.umich.edu/bitstream/2027.42/147433/1/49698122_CIS699 - Mangano Thesis - Modernization of Manufacturing with Cybersecurity at the Forefront - Final 121018-v4.pdfDescription of 49698122_CIS699 - Mangano Thesis - Modernization of Manufacturing with Cybersecurity at the Forefront - Final 121018-v4.pdf : Thesi

    China's race to global technology leadership

    Get PDF
    The current trade war between the US and China looks like a small piece in a much larger puzzle over world leadership in which China plays the part of the ascending challenger seeking to upset the existing balance of power. Technology and innovation seem to be Beijing\u2019s weapons of choice in its frontal assault on Washington in sectors traditionally led by the US. China is not only acquiring technology. Its ambitions include the regulation of international trade and global governance. Just what a China-led global order would look like is still unclear, but the inherent dangers of technology need to be meticulously assessed, as they have the potential to alter the core values of modern societies. To what extent will technology facilitate China\u2019s rise

    Spacecraft design project: Low Earth orbit communications satellite

    Get PDF
    This is the final product of the spacecraft design project completed to fulfill the academic requirements of the Spacecraft Design and Integration 2 course (AE-4871) taught at the U.S. Naval Postgraduate School. The Spacecraft Design and Integration 2 course is intended to provide students detailed design experience in selection and design of both satellite system and subsystem components, and their location and integration into a final spacecraft configuration. The design team pursued a design to support a Low Earth Orbiting (LEO) communications system (GLOBALSTAR) currently under development by the Loral Cellular Systems Corporation. Each of the 14 team members was assigned both primary and secondary duties in program management or system design. Hardware selection, spacecraft component design, analysis, and integration were accomplished within the constraints imposed by the 11 week academic schedule and the available design facilities

    EDI control : management and audit issues

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1419/thumbnail.jp

    An Approach to Guide Users Towards Less Revealing Internet Browsers

    Get PDF
    When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed

    Pertanika Journal of Science & Technology

    Get PDF

    Pertanika Journal of Science & Technology

    Get PDF

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms
    corecore