489,548 research outputs found

    Informacijos saugos valdymo karkasas smulkiam ir vidutiniam verslui

    Get PDF
    Information security is one of the concerns any organization or person faces. The list of new threats appears, and information security management mechanisms have to be established and continuously updated to be able to fight against possible security issues. To be up to date with existing information technology threats and prevention, protection, maintenance possibilities, more significant organizations establish positions or even departments, to be responsible for the information security management. However, small and medium enterprise (SME) does not have enough capacities. Therefore, the information security management situation in SMEs is fragmented and needs improvement. In this thesis, the problem of information security management in the small and medium enterprise is analyzed. It aims to simplify the information security management process in the small and medium enterprise by proposing concentrated information and tools in information security management framework. Existence of an information security framework could motivate SME to use it in practice and lead to an increase of SME security level. The dissertation consists of an introduction, four main chapters and general conclusions. The first chapter introduces the problem of information security management and its’ automation. Moreover, state-of-the-art frameworks for information security management in SME are analyzed and compared. The second chapter proposes a novel information security management framework and guidelines on its adoption. The framework is designed based on existing methodologies and frameworks. A need for a model for security evaluation based on the organization’s management structure noticed in chapter two; therefore, new probability theory-based model for organizations information flow security level estimation presented in chapter three. The fourth chapter presents the validation of proposed security evaluation models by showing results of a case study and experts ranking of the same situations. The multi-criteria analysis was executed to evaluate the ISMF suitability to be applied in a small and medium enterprise. In this chapter, we also analyze the opinion of information technology employees in an SME on newly proposed information security management framework as well as a new model for information security level estimation. The thesis is summarized by the general conclusions which confirm the need of newly proposed framework and associated tools as well as its suitability to be used in SME to increase the understanding of current information security threat situation.Dissertatio

    Recognition of unfamiliar faces

    Get PDF
    People are excellent at identifying faces familiar to them, even from very low quality images, but are bad at recognising, or even matching, faces that are unfamiliar. In this review we shall consider some of the factors which affect our abilities to match unfamiliar faces. Major differences in orientation (e.g. inversion) or greyscale information (e.g. negation) affect face processing dramatically, and such effects are informative about the nature of the representations derived from unfamiliar faces, suggesting that these are based on relatively low-level image descriptions. Consistent with this, even relatively minor differences in lighting and viewpoint create problems for human face matching, leading to potentially important problems over the use of images from security video images. The relationships between different parts of the face (its "configuration") are as important to the impression created of an upright face as local features themselves, suggesting further constraints on the representations derived from faces. The review then turns to consider what computer face recognition systems may contribute to understanding both the theory and the practical problems of face identification. Computer systems can be used as an aid to person identification, but also in an attempt to model human perceptual processes. There are many approaches to computer recognition of faces, including ones based on low-level image analysis of whole face images, which have potential as models of human performance. Some systems show significant correlations with human perceptions of the same faces, for example recognising distinctive faces more easily. In some circumstances, some systems may exceed human abilities on unfamiliar faces. Finally, we look to the future of work in this area, that will incorporate motion and three-dimensional shape information

    A Security Solution for Wireless Local Area Network (WLAN) Using Firewall and VPN

    Get PDF
    In the era of internet millions of users share resource for different purpose. The chances of security risks are more when a user connected with internet. Internet technology plays an important role in every aspect of human life. We can create virtual connectivity with-in seconds with anyone in the world and can exchange or share the information through internet. Sometimes these information is very useful for Defense, and personal use. Sometimes this information is stolen on the internet or we can say destroyed so that receiver cannot receive that information, so for successful communication on internet our connection should be protected. For this protection we can use Firewall protection, VPN Network. These Networks is much more protected than normal Network. Network with VPN and Firewall is faster and efficient rather than normal connection. In normal Network user may faces unexpected delay due to malware and virus. In this paper we have described and analyze impact of Virtual Private Network technology and firewall with normal network. We have simulated three scenarios without firewall, with firewall and Firewall_VPN. The simulation results of three scenarios are compared over WLAN and analyze the impact of Firewall and VPN on network performance. OPNET 14.5 is used for simulator work. Keywords: VPN, Firewall, Security, WLAN, OPNET 14.5

    Multi-Level Liveness Verification for Face-Voice Biometric Authentication

    Get PDF
    In this paper we present the details of the multilevel liveness verification (MLLV) framework proposed for realizing a secure face-voice biometric authentication system that can thwart different types of audio and video replay attacks. The proposed MLLV framework based on novel feature extraction and multimodal fusion approaches, uncovers the static and dynamic relationship between voice and face information from speaking faces, and allows multiple levels of security. Experiments with three different speaking corpora VidTIMIT, UCBN and AVOZES shows a significant improvement in system performance in terms of DET curves and equal error rates(EER) for different types of replay and synthesis attacks

    Why Issue Mandatory Convertibles? Theory and Empirical Evidence.

    Get PDF
    Abstract Mandatory convertibles, which are equity-linked hybrid securities that automatically convert to common stock on a pre-specified date, have become an increasingly popular means of raising capital in recent years (about $20 billion worth issued in 2001 alone). This paper presents the first theoretical and empirical analysis of mandatory convertibles in the literature. We consider a firm facing a financial market characterized by asymmetric information, and significant costs in the event of financial distress. The firm can raise capital either by issuing mandatory convertibles, or by issuing more conventional securities like straight debt, common stock, and ordinary convertibles. We show that, in equilibrium, the firm issues straight debt, ordinary convertibles, or equity if the extent of asymmetric information facing it is large, but the probability of being in financial distress is relatively small; it issues mandatory convertibles if it faces a smaller extent of asymmetric information but a greater probability of financial distress. Our model provides a rationale for the three commonly observed features of mandatory convertibles: mandatory conversion, capped (or limited) capital appreciation, and a higher dividend yield compared to common stock. We also characterize the equilibrium design of mandatory convertibles. Our model also has implications for the abnormal stock returns upon the announcement of mandatory convertibles and for the post-issue operating performance of mandatory convertible issuers. We test the implications of our theory using a sample of firms which have chosen to issue either mandatory convertibles or ordinary convertibles, and we also study the long-term abnormal stock performance of mandatory convertible issuers. The evidence supports the implications of our theory.security design, new security, mandatory convertible, asymmetric information, financial distress

    The Management of Border Area Between Indonesia Republic and Papua New Guinea in Sota Region of Merauke District

    Get PDF
    The border management in all of Indonesia areas is one of integral part of State management; it is implemented by comprehensive approach consist of three dimensions of border management as follows prosperity, security, and environmental management of State border area, implemented by applying an approach oriented to security and environment. This research aims to analyze security management and community prosperity of border area in Sota Region called RI-PING of Merauke District. Quantitative research is one of research method by collecting data and information gotten directly from informant through observation process, interview and documentation on a field notification form, interviewing transcript, empirical data documentation. The security research analysis becomes a successful keys of a State onto keeping community sovereignty of State stability being the main support in a border area to increase human resources, economy competitiveness, and community’s prosperity become main target of the State security sovereignty. The lack quality of human resource as an impact of minimum facility and infrastructure of education is as well as healthy. The security of the border area faces various obstacles, the minimum facility and infrastructure consist of road infrastructure hasn’t been sufficient, the wide region with characteristics of a difficult border to reach necessary means of supporting surveillance activities to bolster security in the border area. Community’s prosperity frontier regions suffered a failed human resource, skills are still low, and the economy of the community is traditional. Key words: Security Management, Prosperity, Border Area, Facility, Infrastructure

    From SuisseID to SwissID: Overcoming the key challenges in Switzerland\u27s e-credential market

    Get PDF
    This teaching case explores the political, socio-technical, and business-related challenges of the introduction of a state-recognized electronic identity (e-ID) in Switzerland. Based on real-life events, the case puts every student in the shoes of a board member of SwissSign Group, a joint venture between 20 of the most influential public and private companies in Switzerland. This conglomerate faces three major challenges. To solve these challenges they need, among others, to learn from the past failures of SuisseID, the previous unsuccessful attempt to launch a nationwide e-ID infrastructure. Students must also analyze current political and regulatory events that impact on the e-credential market and need to develop a business model for the new solution, SwissID. This teaching case is designed for students from the undergraduate level upward. The content may be suitable for courses or modules relating to e-government, the platform economy, business models, value co-creation, information ethics, digitalization, PPPs, information security, and privacy

    A Double Siamese Framework for Differential Morphing Attack Detection

    Get PDF
    Face morphing and related morphing attacks have emerged as a serious security threat for automatic face recognition systems and a challenging research field. Therefore, the availability of effective and reliable morphing attack detectors is strongly needed. In this paper, we proposed a framework based on a double Siamese architecture to tackle the morphing attack detection task in the differential scenario, in which two images, a trusted live acquired image and a probe image (morphed or bona fide) are given as the input for the system. In particular, the presented framework aimed to merge the information computed by two different modules to predict the final score. The first one was designed to extract information about the identity of the input faces, while the second module was focused on the detection of artifacts related to the morphing process. Experimental results were obtained through several and rigorous cross-dataset tests, exploiting three well-known datasets, namely PMDB, MorphDB, and AMSL, containing automatic and manually refined facial morphed images, showing that the proposed framework was able to achieve satisfying results
    corecore