16 research outputs found

    Revisión de la seguridad en la implementación de servicios sobre IPv6

    Get PDF
    Actually, transmission and interconnection systems have several vulnerabilities including the facility to analyze traffic that allows a high rate of attacks own IPv4 protocol, therefore it is necessary for services such as FTP, DHCP and SSH seek Migration and Deployment to IPv6 networks. It has characteristics of computer security by IPSEC protocol, regardless of the free operating system or own end customers. This paper analyzes by testing the functionality of the standard settings or IPv6 protocol and its security features in the implementation and setting in a controlled environment to mitigate attacks on authentication, integrity and confidentiality of information, allowing to determine which scenario services analyzed guarantee a higher level of own native IPSEC reliability through regardless of the medium on which data travelEn la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos

    Revisión de la seguridad en la implementación de servicios sobre IPv6

    Get PDF
    En la actualidad los sistemas de transmisión e interconexión presentan varias vulnerabilidades, entre ellas, la facilidad de analizar tráfico que permite una tasa alta de ataques propios del protocolo IPv4, por ello se hace necesario que servicios como FTP, DHCP y SSH busquen la migración e implementación de redes IP bajo IPv6, la cual cuenta con características propias de la seguridad informática mediante el protocolo IPsec, sin importar el sistema operativo libre o propietario de los clientes finales. El presente artículo evalúa, mediante pruebas de configuración, la funcionalidad del estándar o protocolo IPv6 y sus características de seguridad en la implementación como opción de configuración en un escenario controlado para mitigar ataques en la autenticación, integridad y confidencialidad de la información, permitiendo determinar que los servicios analizados garantizan un mayor nivel de confiabilidad propio y nativo a través de IPsec por cualquier medio sobre el cual viajen los datos.Actually, transmission and interconnection systems have several vulnerabilities including the facil-ity to analyze traffic that allows a high rate of attacks own IPv4 protocol, therefore it is necessary for services such as FTP, DHCP and SSH seek Migration and De-ployment to IPv6 networks. It has characteristics of computer security by IPSEC protocol, regardless of the free operating system or own end customers. This paper analyzes by testing the functionality of the standard settings or IPv6 protocol and its security features in the implementation and setting in a controlled environment to mitigate attacks on authentication, integrity and con-fidentiality of information, allowing to determine which scenario services analyzed guarantee a higher level of own native IPSEC reliability through regardless of the medium on which data travel

    Revisión de la seguridad en la implementación de servicios sobre IPv6

    Full text link

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Top 10 technology opportunities : tips and tools

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1610/thumbnail.jp

    “Access denied”? Barriers for staff accessing, using and sharing published information online within the National Health Service (NHS) in England: technology, risk, culture, policy and practice

    Get PDF
    The overall aim of the study was to investigate barriers to online professional information seeking, use and sharing occurring within the NHS in England, their possible effects (upon education, working practices, working lives and clinical and organisational effectiveness), and possible explanatory or causative factors. The investigation adopted a qualitative case study approach, using semi-structured interviews and documentary analysis as its methods, with three NHS Trusts of different types (acute - district general hospital, mental health / community, acute – teaching) as the nested sites of data collection. It aimed to be both exploratory and explanatory. A stratified sample of participants, including representatives of professions whose perspectives were deemed to be relevant, and clinicians with educational or staff development responsibilities, was recruited for each Trust. Three non-Trust specialists (the product manager of a secure web gateway vendor, an academic e-learning specialist, and the senior manager at NICE responsible for the NHS Evidence electronic content and web platform) were also interviewed. Policy documents, statistics, strategies, reports and quality accounts for the Trusts were obtained via public websites, from participants or via Freedom of Information requests. Thematic analysis following the approach of Braun and Clarke (2006) was adopted as the analytic method for both interviews and documents. The key themes of the results that emerged are presented: barriers to accessing and using information, education and training, professional cultures and norms, information governance and security, and communications policy. The findings are discussed under three main headings: power, culture, trust and risk in information security; use and regulation of Web 2.0 and social media, and the system of professions. It became evident that the roots of problems with access to and use of such information lay deep within the culture and organisational characteristics of the NHS and its use of IT. A possible model is presented to explain the interaction of the various technical and organisational factors that were identified as relevant. A number of policy recommendations are put forward to improve access to published information at Trust level, as well as recommendations for further research

    Data privacy, security and trust in "consumer internet of things" assemblages and associated mobile applications in South Africa

    Get PDF
    The Internet of Things (IoT) brings with it opportunities and challenges. IoT technology makes it possible to connect all of a person’s devices to create a smart eco-system or assemblage. Various stakeholders share personal data with companies in the consumer IoT space for marketing, tracking and assessment of the IoT products. In a world where cybercriminals have increased enormously, people need to be aware of the advantages, and the risks that come with these technological advances. The purpose of this study was to explore the data privacy, security and trust issues faced by consumers of IoT in South Africa, to propose an integrated and holistic framework that promotes safer adoption of consumer Internet of Things (CIoT). The researcher explained the difference between Industrial IoT (IIoT) and consumer CIoT in the study and focused the research on the latter. This study utilized a qualitative narrative inquiry and Delphi technique to explore the challenges that come with CIoT assemblages and associated mobile applications in South Africa. The researcher’s original contribution was to develop a holistic framework that all stakeholders may use to protect consumers of IoT. The proposed framework addresses the challenges of CIoT from a legal, technical and social context viewpoint. The study looked at legal instruments around the world and compared them to the South African existing legal instruments. The researcher established that South Africa has various pieces of legislation such as the Protection of Personal Information Act 4 of 2013, the Consumer Protection Act 68 of 2008, the Electronic Communications Act 36 of 2005, and the Electronic Communications and Transactions Act 25 of 2002, that law enforcers may use to deal with the challenges IoT. However, the researcher ascertained that these laws do not necessarily address IoT specifically as they are; in fact, they are either outdated or fragmented. In addition to the background literature, the research sought expert opinions to address the technical viewpoints of the CIoT assemblage. The technical approach looked at the existing technologies, design and development considerations, and the overall architecture of CIoT. The researcher generated theme and sub-themes using thematic analysis. There main themes were regarding regulatory frameworks, privacy of personal information, security concerns, trust issues, and convenience and benefits. The study further established that consumers enjoy the convenience and benefits that IoT technology brings. The study suggested an integrated and holistic framework that promote safer adoption of CIoT and associated mobile apps. The conclusion is that for CIoT to thrive, safety is crucial, and all the stakeholders in the IoT assemblage need to ensure the protection of consumers. The suggested framework may assist in the protection of consumers of IoT. The researcher recommends a further study that covers the regulators such as ICASA in detail and the enforcement of the POPI Act.Information ScienceD. Phil (Information Science

    The End of Ownership: Personal Property in the Digital Economy

    Get PDF
    An argument for retaining the notion of personal property in the products we “buy” in the digital marketplace. The open access edition of this book was made possible by generous funding from Arcadia – a charitable fund of Lisbet Rausing and Peter Baldwin. If you buy a book at the bookstore, you own it. You can take it home, scribble in the margins, put in on the shelf, lend it to a friend, sell it at a garage sale. But is the same thing true for the ebooks or other digital goods you buy? Retailers and copyright holders argue that you don\u27t own those purchases, you merely license them. That means your ebook vendor can delete the book from your device without warning or explanation—as Amazon deleted Orwell\u27s 1984 from the Kindles of surprised readers several years ago. These readers thought they owned their copies of 1984. Until, it turned out, they didn\u27t. In The End of Ownership, Aaron Perzanowski and Jason Schultz explore how notions of ownership have shifted in the digital marketplace, and make an argument for the benefits of personal property. Of course, ebooks, cloud storage, streaming, and other digital goods offer users convenience and flexibility. But, Perzanowski and Schultz warn, consumers should be aware of the tradeoffs involving user constraints, permanence, and privacy. The rights of private property are clear, but few people manage to read their end user agreements. Perzanowski and Schultz argue that introducing aspects of private property and ownership into the digital marketplace would offer both legal and economic benefits. But, most important, it would affirm our sense of self-direction and autonomy. If we own our purchases, we are free to make whatever lawful use of them we please. Technology need not constrain our freedom; it can also empower us.https://repository.law.umich.edu/books/1114/thumbnail.jp
    corecore