15 research outputs found

    A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks

    Get PDF
    Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. CopyrightDissertation (MSc (Computer Science))--University of Pretoria, 2006.Computer Scienceunrestricte

    The BG News April 16, 1998

    Get PDF
    The BGSU campus student newspaper April 16, 1998. Volume 80 - Issue 134https://scholarworks.bgsu.edu/bg-news/7324/thumbnail.jp

    The BG News November 4, 1975

    Get PDF
    The BGSU campus student newspaper November 4, 1975. Volume 60 - Issue 24https://scholarworks.bgsu.edu/bg-news/4162/thumbnail.jp

    Proceedings, MSVSCC 2012

    Get PDF
    Proceedings of the 6th Annual Modeling, Simulation & Visualization Student Capstone Conference held on April 19, 2012 at VMASC in Suffolk, Virginia

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Winona Daily News

    Get PDF
    https://openriver.winona.edu/winonadailynews/2291/thumbnail.jp

    General Psychology for Honors Students

    Get PDF
    What are the most effective methods to study for a test? What are the meanings of dreams? How do illusions work? With whom are you most likely to fall in love? These are just a few of the questions that have been asked by psychologists since the birth of the field as an area of scientific research in the 1870’s. This text surveys the basic concepts, theories, and pivotal findings over the past 100 years in the science of Psychology, with special emphasis on contemporary concepts and findings focused on the relation of the brain to normal and pathological behaviors. Psychology has long evolved past the psychodynamic influence to include biological, social, learning, motivational, and developmental perspectives, to name a few. Contemporary psychologists go beyond philosophical or anecdotal speculation and rely on empirical evidence to inform their conclusions. Similarly, readers will push beyond pre-existing schemas and misconceptions of the field of psychology to an understanding of contemporary quantitative research methods as they are used to predict and test human behavior. This textbook is a compilation of thirty-nine readings organized into ten sections. Introduction to Psychology (Readings 1 - 5) A brief history of psychology, followed by an introduction to contemporary psychology, an overview of the scientific method, an introduction to research design, and thinking like a psychological scientist. Psychophysiology (Reading 6 - 8) Neurons, how our brain controls our thoughts, feelings, & behavior, and an introduction to psychophysiological methods in neuroscience. Consciousness & Sleep (Readings 9 - 12) The nature of consciousness, an exploration of sleep, why we sleep, the stages of sleep, and sleep problems and disorders. Perception (Readings 13 - 14) Seeing, and on the accuracy and inaccuracy of perception. Healthy Living (Readings 15 - 16) A healthy life, and substance use & abuse. Learning & Memory (Readings 17 - 20) Learning and memory, predictive learning, operant conditioning, memories as types and stages, and how we remember, with cues to improving memory. Social Psychology (Readings 21 to 26) Conformity, obedience, power & leadership, how the social context influences helping, and determinants of helping, gender and prejudice & discrimination. Psychological Development (Readings 27 to 30) Cognitive development in childhood, theories of development, and attachment through the life course. Research methods in developmental psychology. Personality & Psychological Disorders (Readings 31 - 37) Personality, psychological disorders, diagnostics and classification, anxiety disorders, mood disorders, schizophrenia spectrum disorders, and personality disorders. Treatment (Readings 38 - 39) Therapeutic orientations and psychopharmacology. Changes to the original OER works were made by Kate Votaw and Judy Schmitt to suit the needs of the Inquiries in the Social and Behavioral Sciences course in the Pierre Laclede Honors College at the University of Missouri-St. Louis. This work was developed with support from the University of Missouri-St. Louis Thomas Jefferson Library, with special thanks to librarians Judy Schmitt and Helena Marvin

    A new approach to the development and maintenance of industrial sequence logic

    Get PDF
    This thesis is concerned with sequence logic as found in industrial control systems, with the focus being on process and manufacturing control systems. At its core is the assertion that there is a need for a better approach to the development of industrial sequence logic to satisfy the life-cycle requirements, and that many of the ingredients required to deliver such an approach are now available. The needs are discussed by considering the business case for automation and deficiencies with traditional approaches. A set of requirements is then derived for an integrated development environment to address the business needs throughout the control system life-cycle. The strengths and weaknesses of relevant control system technology and standards are reviewed and their bias towards implementation described. Mathematical models, graphical methods and software tools are then assessed with respect to the requirements for an integrated development environment. A solution to the requirements, called Synect is then introduced. Synect combines a methodology using familiar graphical notations with Petri net modelling supported by a set of software tools. Its key features are justified with reference to the requirements. A set of case studies forms the basis of an evaluation against business needs by comparing the Synect methodology with current approaches. The industrial relevance and exploitation are then briefly described. The thesis ends with a review of the key conclusions along with contributions to knowledge and suggestions for further research
    corecore