776 research outputs found

    A Survey of Satellite Communications System Vulnerabilities

    Get PDF
    The U.S. military’s increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries. Attacks on these satellites could cause military communications to become unavailable at critical moments during a conflict. This research dissected a typical satellite communications system in order to provide an understanding of the possible attacker entry points into the system, to determine the vulnerabilities associated with each of these access points, and to analyze the possible impacts of these vulnerabilities to U.S. military operations. By understanding these vulnerabilities of U.S. communications satellite systems, methods can be developed to mitigate these threats and protect future systems. This research concluded that the satellite antenna is the most vulnerable component of the satellite communications system’s space segment. The antenna makes the satellite vulnerable to intentional attacks such as: RF jamming, spoofing, meaconing, and deliberate physical attack. The most vulnerable Earth segment component was found to be the Earth station network, which incorporates both Earth station and NOC vulnerabilities. Earth segment vulnerabilities include RF jamming, deliberate physical attack, and Internet connection vulnerabilities. The most vulnerable user segment components were found to be the SSPs and PoPs. SSPs are subject to the vulnerabilities of the services offered, the vulnerabilities of Internet connectivity, and the vulnerabilities associated with operating the VSAT central hub. PoPs are susceptible to the vulnerabilities of the PoP routers, the vulnerabilities of Internet and Intranet connectivity, and the vulnerabilities associated with cellular network access

    Network Convergence: Where is the Value?

    Get PDF
    The entire telecommunications industry is going through very difficult times. Rapidly changing technology, lack of good business models, and lack of visibility in the near-term for renewed growth all create an uncertain environment. Yet, the global Internet is becoming a multi-service network infrastructure that can potentially replace existing disparate voice and data networks. Although it is widely believed in the telecommunications industry that network convergence of voice, data, video, and images is an industry driver, not much attention has yet been paid to a key proposition: what value does network convergence bring to business and residential customers? This paper explains how different industries are converging; the technological, economic and regulatory forces that are at play and how the various customer segments can benefit from network convergence. While technological advancement is transforming industry and business models rapidly, one question keeps coming back to haunt managers: Where is the business value? We illustrate the value proposition of convergence (for various players) by first explaining the paradigm shifts happening across industries and then highlighting the high velocity spiral of knowledge dissemination theory that is fueled by convergence

    Integrated security sub-system for IPBrick

    Get PDF
    Estágio realizado na iPortalMais e orientado pelo Eng.º Hélder RochaTese de mestrado integrado. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200

    Voice over Internet Protocol (VOIP): Overview, Direction And Challenges

    Get PDF
    Voice will remain a fundamental communication media that cuts across people of all walks of life. It is therefore important to make it cheap and affordable. To be reliable and affordable over the common Public Switched Telephone Network, change is therefore inevitable to keep abreast with the global technological change. It is on this basis that this paper tends to critically review this new technology VoIP, x-raying the different types. It further more discusses in detail the VoIP system, VoIP protocols, and a comparison of different VoIP protocols. The compression algorithm used to save network bandwidth in VoIP, advantages of VoIP and problems associated with VoIP implementation were also critically examined. It equally discussed the trend in VoIP security and Quality of Service challenges. It concludes by reiterating the need for a cheap, reliable and affordable means of communication that would not only maximize cost but keep abreast with the global technological change. Keywords: Voice over Internet Protocol (VoIP), Public Switched Telephone Network (PSTN), Session Initiation Protocol (SIP),  multipoint control uni

    Electronic business and electronic commerce (supporting lecture notes for students of dirеction "Management" of all forms of education)

    Get PDF
    E-Business systems naturally have greater security risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. Customers, suppliers, employees, and numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, authenticity of data, and data integrity. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, anti-virus software, firewalls, and encryption to list a few.Розглянуто та рекомендовано до друку на засіданні кафедри інноваційного менеджменту та підприємництва, протокол No1 від 27 серпня 2015 року. Схвалено та рекомендовано до друку на засіданні методичної комісії факультету управління та бізнесу у виробництві Тернопільського національного технічного університету імені Івана Пулюя, протокол No6 від 26 лютого 2016 року.The purpose of thе document is to present the different underlying "technologies" (in reality, organizational modes based on information and communication technologies) and their associated acronyms. The term "e-Business" therefore refers to the integration, within the company, of tools based on information and communication technologies (generally referred to as business software) to improve their functioning in order to create value for the enterprise, its clients, and its partners.Topic 1. Basic concepts of electronic business and electronic commerce 1.1. Basic concepts and principles of e-business. 1.2. Origins and growth of e-commerce. Topic 2. Ecommerce as a part of electronic business 2.1. E-business infrastructure, e-environment and e-business strategy 2.2. Ways of e-business conducting. Online trading. Topic 3. Basis of global computer network internet functioning. 3.1. Basic principles of internet. 3.2. The most common services of Іnternet. 3.3. The concept and structure of Internet marketing. Topic 4. E-commerce systems in corporate sector 4.1. The basic processes of implementation of electronic commerce in the B2B sector. Virtual enterprise, internet incubator, mobile commerce. 4.2. The role of supply-chain management (SCM) and customer relationship management (CRM) in e-commerce. Topic 5. Information management for effective e-commerce building through intranet and extranet 5.1. Basic principles of Intranet functioning. 5.2. Extranet and its security issues. Topic 6. Electronic payment systems 6.1. Electronic payment systems. 6.2. Primary classification of payment systems

    Self-Verification Of Public-Key Agreement Over Voip Using Random Fusion Scheme

    Get PDF
    Telefoni Internet, yang dikenali juga sebagai Suara melalui Protokol Internet (VoIP), menjadi salah satu alternatif telekomunikasi yang popular disebabkan penggunaan Internet yang semakin meluas. Internet memperkaya cara sistem telefoni digunakan, tetapi dalam masa yang sama menimbulkan pelbagai kebimbangan, terutamanya keselamatan Internet telephony, also known as Voice over Internet Protocol (VoIP), has become one of popular alternatives in telecommunication due to the widespread of the Internet usage. The Internet enriches the way of telephony system is used, but in the meantime it elevates many concerns, particularly security

    Applying a Systems Approach to Security in a Voice over IP System

    Get PDF
    Työn tavoitteena on järjestelmän yksittäisten osien turvallisuuden arvioiminen osana systeemin kokonaisturvallisuutta. Tarkastelun kohteena on Voice Over IP (VoIP) systeemit. Ne ovat olleet viimeaikoina keskustelun kohteena, ja niiden turvallisuusominaisuudet ovat saaneet osakseen arvostelua. Tämä työ on samalla myös yritys yhdistää eri tietoturvallisuuden osa-alueita yhteen yhtenäiseksi kokonaisuudeksi. Tutkimuskeinona on käytetty systeemimetodologiaa. Systeemilähestymistapa jo itsessään korostaa kokonaisuuksia, joten se voisi soveltua myös kokonaistietoturvan tutkimiseen. Tutkimuksessa hahmotellaan metodi järjestelmän tietoturvan analysoimiseksi. Tapaustutkimus turvallisuudesta pienyrityksen VoIP-järjestelmästä soveltaa hahmoteltua metodia ja kokoaa samalla yhteen Voice over IP:n ja tietoturvallisuuden käsitteitä. Systeemimetodologia on yleinen methodologia yksittäisten systeemien ymmärtämiseen yksittäisessä ympäristössä. Se lähtee tutkimaan järjestelmää mahdollisimman vähin alkuoletuksin. Turvallisuuskontekstissa tämä tarkoittaa, että esimerkiksi turvallisuusvaatimuksia ei oleteta, vaan ne etsitään systemaattisen tutkimusmetodin avulla

    Web-Based Training

    Get PDF
    Current Web-based training (WBT) is based upon systematic research and experience with strategies for improving learning and instruction, beginning in the early part of the 20th century and continuing to the present. Use of the World-Wide Web for delivery may improve access to training, but the effectiveness of the resulting training and the usefulness of the outcomes is chiefly dependent upon the quality of the instructional design and the completeness of the support package provided. Factors that impact WBT quality, and which must be addressed in design and implementation processes, include assessment and accommodation of trainees previous learning experiences, training expectations, and overall readiness for new training; availability and familiarity to trainees and trainers of appropriate delivery technologies; presence of technical support; opportunities for interaction with the trainer and other trainees; the preparation and practices of trainers; corporate support and recognition; trainees capacities and expectations for independent and self-directed learning; and the presence of relevant, quality online training materials. WBT creates changes and may thus produce stresses in the training environment, as well as efficiencies. Reduction in travel and subsistence requirements means cost savings, but may also be seen by trainees as depriving them of opportunities to meet with each other face-to-face; self-pacing means trainees may proceed independently and at their own rate, but also that group support may be reduced (unless a cohort model is adopted); use of the Internet for delivery of training materials may foster trainee independence, but may also result in confusion for some trainees used to print materials and a paced, group delivery model; trainers no longer have to lecture as materials (always high quality, and often multimedia-based) are prepared in advance, but some may resent the loss of their role at center-stage; trainees are more responsible for their own learning, which may reflect the autonomy of adult responsibility common in the other areas of their lives, but this may be different from the expectations of some for how training should be conducted. To achieve the efficiencies and advantages well-designed and -managed WBT may offer, adopting organizations must make adjustments. Managers may need to show concrete support for online training by permitting trainees to use corporate resources during company time, to assure access to adequate bandwidth. Trainers may need to master new skills and be willing to adopt new roles less concerned with information dissemination and more involved with meeting individual trainees expressed needs. Trainees themselves may also need new skills, and may need to exercise more independence and selfdirection in their learning. As technologies become more available to support WBT, and as more models of successful WBT are available, the commitment to this delivery model is predicted to continue to grow. The previous corporate experience of the productivity paradox in relation to computers, in which some succeeded in improving productivity while others did notand some even experienced productivity losseswill need to be avoided, especially in relation to promising innovations such as reusable learning objects. Similarly, arrival of the noncommercial new Internets in Canada and the United States constitute a fresh start, an opportunity to demonstrate the value of these resources for academic and research purposes. 2 Choices of the right technologies, effective use of these choices, attention to security and privacy concerns, adequate training and support of users at all levels, assurance of timely and convenient technology access, an

    Analysing the characteristics of VoIP traffic

    Get PDF
    In this study, the characteristics of VoIP traffic in a deployed Cisco VoIP phone system and a SIP based soft phone system are analysed. Traffic was captured in a soft phone system, through which elementary understanding about a VoIP system was obtained and experimental setup was validated. An advanced experiment was performed in a deployed Cisco VoIP system in the department of Computer Science at the University of Saskatchewan. Three months of traffic trace was collected beginning October 2006, recording address and protocol information for every packet sent and received on the Cisco VoIP network. The trace was analysed to find out the features of Cisco VoIP system and the findings were presented.This work appears to be one of the first real deployment studies of VoIP that does not rely on artificial traffic. The experimental data provided in this study is useful for design and modeling of such systems, from which more useful predictive models can be generated. The analysis method used in this research can be used for developing synthetic workload models. A clear understanding of usage patterns in a real VoIP network is important for network deployment and potential network activities such as integration, optimizations or expansion. The major factors affecting VoIP quality such as delay, jitter and loss were also measured and simulated in this study, which will be helpful in an advanced VoIP quality study. A traffic generator was developed to generate various simulated VoIP traffic. The data used to provide the traffic model parameters was chosen from peak traffic periods in the captured data from University of Saskatchewan deployment. By utilizing the Traffic Trace function in ns2, the simulated VoIP traffic was fed into ns2, and delay, jitter and packet loss were calculated for different scenarios. Two simulation experiments were performed. The first experiment simulated the traffic of multiple calls running on a backbone link. The second experiment simulated a real network environment with different traffic load patterns. It is significant for network expansion and integration

    ITACS Annual Accountability Report: FY2004 Accomplishments and Challenges

    Get PDF
    corecore