191,857 research outputs found

    Securing the Internet of Things Infrastructure - Standards and Techniques

    Get PDF
    The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed

    Safe Routes to School Improves the Built Environment

    Get PDF
    This report focuses on case studies describing how ten states (California, District of Columbia, Georgia, Illinois, Kentucky, Louisiana, New York, Oklahoma, Texas and Virginia) are awarding their SRTS federal funds to support improved infrastructure such as sidewalks, bike lanes, pathways, improved intersections, traffic calming, and more. Safe Routes to School: Improves the Built Environment shares information on local level implementation challenges, best practices, and securing more improvements to the built environment in your community

    Risk Management in Public Key Infrastructure

    Get PDF
    Nowadays it is almost impossible not to hear or read about the risks of using computer systems. Top management is becoming more interested in risk management process and their analysis regarding the use of information technologies within their organization. This is due primarily to the Internet boom and high level of dependence of their business to information systems. Risk management is the process that allows IT managers to balance the operational and economic costs of protective measures and obtain assets in mission capability by securing the IT systems and data that help their organizations performances. In this paper we present the risk management processes, the main services offered by the Public Key Infrastructure and security risks that may arise in implementing Public Key Infrastructure.risk management; public key infrastructure; PKI services; PKI risks.

    Securing the internet of things infrastructure – standards and techniques

    Get PDF
    The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed

    Protecting Government Information Post 9/11: An Evolving Role for Security Architectures

    Get PDF
    This paper discusses the results of a research study in the use of architectures in government agencies. The paper uses archival and time line analysis to present the context for securing the vast stores of protected government information, including the actions taken by the Australian government leading into the terrorist attacks of 11 September 2001 (termed 9/11), and the government reactions post 9/11. The results show that at the strategic level, the Australian government commenced a process of examining information security vulnerabilities and establishing a security architecture only to terminate the initiative due to a lack of budgetary funding. Also, a qualitative research method was used to examine the security architecture implemented in a large government agency. Results from the agency case study demonstrate that security architectures form part of the fabric of the agency’s business, not only in terms of information and communications technology infrastructure, but also staff behaviours and attitudes to securing information stores and exchanges

    Urgensi Regulasi Ketahanan dan Keamanan Siber dalam Undang-Undang ITE

    Get PDF
    The case of the BPJS data leak containing the personal data of 279 million Indonesians and the circulation of the BMKG SMS blast containing false information has become a public spotlight because it indicates the weakness of the personal data protection system and national cyber security. Until now, there is no specific regulation that comprehensively regulates cyber security and resilience. The Ministry of Communication and Information of the Republic of Indonesia (Kominfo) supports the ratification of the Cyber Security and Resilience Bill, especially for securing critical infrastructure and completing the Electronic Information and Transaction La

    Predicting the Probability of Cargo Theft for Individual Cases in Railway Transport

    Get PDF
    In the heavy industry, the value of cargo transported by rail is very high. Due to high value, poor security and volume of rail transport, the theft cases are often. The main problem of securing rail transport is predicting the location of a high probability of risk. Because of this, the aim of the presented research was to predict the highest probability of rail cargo theft for areas. It is important to prevent theft cases by better securing the railway lines. To solve that problem the authors\u27 model was developed. The model uses information about past transport cases for the learning process of Artificial Neural Networks (ANN) and Machine Learning (ML).The ANN predicted the probability for 94.7% of the cases of theft and the Machine Learning identified 100% of the cases. This method can be used to develop a support system for securing the rail infrastructure

    What Attitude Changes Are Needed to Cause SMEs to Take a Strategic Approach to Information Security?

    Get PDF
    Spending on security in an SME usually has to compete with demands for hardware, infrastructure, and strategic applications. In this paper, the authors seek to explore the reasons why smaller SMEs in particular have consistently failed to see securing information as strategic year-on-year spending, and just regard as part of an overall tight IT budget. The authors scrutinise the typical SMEs reasoning for choosing to see non-spending on security as an acceptable strategic risk. They look particularly at possible reasons why SMEs tend not to take much notice of "scare stories" in the media based on research showing they are increasingly at risk, whilst larger businesses are taking greater precautions and become more difficult to penetrate. The results and their analysis provide useful pointers towards broader business environment changes that would cause SMEs to be more risk-averse and ethical in their approach to securing their own and their clients’ information

    ATINER's Conference Paper Series SME2015-1749: What Attitude Changes Are Needed to Cause SMEs to Take a Strategic Approach to Information Security?

    Get PDF
    Spending on security in an SME usually has to compete with demands for hardware, infrastructure, and strategic applications. In this paper, the authors seek to explore the reasons why smaller SMEs in particular have consistently failed to see securing information as strategic year-on-year spending, and just regard as part of an overall tight IT budget. The authors scrutinise the typical SMEs reasoning for choosing to see non-spending on security as an acceptable strategic risk. They look particularly at possible reasons why SMEs tend not to take much notice of "scare stories" in the media based on research showing they are increasingly at risk, whilst larger businesses are taking greater precautions and become more difficult to penetrate. The results and their analysis provide useful pointers towards broader business environment changes that would cause SMEs to be more risk-averse and ethical in their approach to securing their own and their clients’ information

    Bringing Home the Green Recovery: A User's Guide to the 2009 American Recovery and Reinvestment Act

    Get PDF
    The 787billionrecoverypackagemarksabig,bold,andhistoricinvestmentincreatinggreenjobsandbuildingmoreequitablecommunities.Thepackageinvestsnearly787 billion recovery package marks a big, bold, and historic investment in creating green jobs and building more equitable communities. The package invests nearly 100 billion in funding for transportation and infrastructure, 48billionininvestmentsinjobtrainingandeducation,48 billion in investments in job training and education, 41 billion for energy-related programs, and $20 billion in tax incentives for renewable energy. But without substantial advocacy from local and state groups, these historic federal investments may not end up in the communities that need them most. The in-depth guide offers tangible, up-to-date information and ideas for using and securing recovery dollars to help expand opportunity in low-income communities and communities of color. The guide is a first step in what will be a vital nationwide effort to ensure the recovery package helps all communities rise stronger than ever from this economic crisis, and that community-based organizations are at the forefront in crafting a green, equitable recovery.American Recovery and Reinvestment Act, ARRA, stimulus
    • 

    corecore