196,579 research outputs found

    Strategic Orientations and Technology Policy: An Empirical Test of Relationship in Developing Countries

    Get PDF
    There is a growing awareness of the pivotal role of technology in securing and maximizing competitive positions. This study based on primary data from two banks in Nigeria examines the relationship between technology policy and strategy dimensions. Differentiation and futurity strategy dimensions were found to be marginally dominant in the managerial practices of these firms. In addition, the study found new evidence of relationship between the strategy dimensions; and the pattern of relationship between technology policy and strategic orientations indicate the use technology to foster defensive behaviours rather than securing competitive edge. Futurity orientation was also found not to be significantly related with most of the technology policy dimensions investigated. These results are expected to provide management and management theorists with valuable practical insight into the relationship between pattern of strategic orientation and technology policy

    A security architecture for personal networks

    Get PDF
    Abstract Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use. In this paper we introduce a security architecture designed for PNs. Our aim is to use secure but lightweight mechanisms suitable for resource constrained devices and wireless communication. We support pair-wise keys for secure cluster formation and use group keys for securing intra-cluster communication. In order to analyze the performance of our proposed mechanisms, we carry out simulations using ns-2. The results show that our mechanisms have a low overhead in terms of delay and energy consumption

    A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration At IoT Edge Devices and Containerized Cluster System

    Get PDF
    Source at https://icissp.scitevents.org/.Securing workloads and information flow against misconfiguration in container-based clusters and edge medical devices is an important part of overall system security. This paper presented a controller that analyzes the misconfiguration, maps the observation to its hidden misconfiguration type, and selects the optimal recovery policy to maximize the performance of defined metrics. In the future, we will integrate streaming from different edge devices, expand the recovery mechanism, and conduct more experiments

    Securing Edge Computing: A Hierarchical IoT Service Framework

    Get PDF
    Title: Securing Edge Computing: A Hierarchical IoT Service Framework Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D. Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University Abstract: Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks. Our secure by design approach prioritizes the establishment of a robust security infrastructure from the outset. By incorporating an Intrusion Detection System and leveraging blockchain for immutable data storage, we create a formidable barrier against security threats. The feasibility of the proposed model for the secure hierarchical architecture is justified by integrating the design with the open-source platform EdgeX Foundry, streamlining device management and data flow among interconnected nodes. A central monitoring device orchestrates system operations, while an acclaimed threat detection model within the server scrutinizes network activities for anomalies. When suspicious actions are detected, the system swiftly alerts other clusters, facilitating a prompt and unified response. The use of blockchain technology not only enhances the intrusion detection capabilities but also guarantees secure and verifiable data storage. Our findings confirm that the framework delivers secure, optimized IoT services with robust intrusion detection and effective data management. The secure-by-design strategy is both advantageous and practical, offering a superior solution to the pressing security challenges in edge computing

    A Survey on Fog Computing: Services, Data and Security

    Get PDF
    Cloud computing can be used as a delivery platform which is a promising way for storing user data and provides a secure access to personal and business information. It involves prevention form risks like data theft and various other attacks. Cyber criminals can access the documents which can results in misuse of data and also interpretation of highly confidential data for illegal purposes. For securing user data from cyber attacks a new paradigm called fog computing can be used. This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorised user access. Fog computing is a computing technique that extends cloud computing to the edge by providing Security in the cloud environment.. In fog computing , new security and privacy challenges are to be faced that are inherited from cloud computing. Mainly fog computing is used to reduce the burden on cloud by gathering workloads, services, applications and huge data to near network edge. In this paper we have discussed this paradigm for preventing misuse of user data and securing information, challenges and corresponding solutions in a brief manner

    “Though this be madness, yet there is method in’t.” A counterfactual analysis of Richard Wagner’s Tannhäuser

    Get PDF
    Much like Wagner himself, the eponymous hero of Tannhäuser treads a path of stark contrasts and rapid swings. From Wartburg to the Venusberg and to the Vatican, the gifted bard transforms from self-centered artist to seduced disciple, disillusioned devotee, hopeful lover, self-loathing pilgrim and finally redeemed martyr. He tries everything and everything is trying. These contrasts reach a peak in the opera‟s central episode, the song contest at Wartburg. Tannhäuser has just been welcomed at the court, received Elisabeth‟s favor and affection, and is ready to compete for the contest‟s prize, one as lofty as possibly the princess‟ hand. Instead of securing his reintegration to Wartburg with a brilliant performance, however, he spoils the event with insolent remarks and the exhibitionist disclosure of his Venusberg experience. His behavior offends his peers, scandalizes the court, breaks Elisabeth‟s heart, and brings him to the edge of death. Why would Tannhäuser sacrifice everything for nothing

    VEHICLE-TO-EVERYTHING THREAT PROTECTION USING SECURITY INTELLIGENCE ENGINE AND MULTI-ACCESS EDGE COMPUTING

    Get PDF
    Techniques are described herein for a threat protection mechanism for Vehicle-to-Everything (V2X) communication channels. This includes shared intelligence at the Multi-access Edge Computing (MEC) function, Security Intelligence Engine (SIE), Original Equipment Manufacturer (OEM) vendors, application providers, and external device vendors. It is capable of securing Vehicle User Entities (V-UEs) simultaneously in real time
    • …
    corecore