785 research outputs found

    Network security attacks. ARP Poisoning case study

    Get PDF
    Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack). In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker).network, security, attacks, arp poisoning, mac.

    E-commerce audit connected with the consumer protection

    Get PDF
    E-commerce highlights the vast area of electronic interchange connected to the commercial activities that involve both the relations between enterprises as well as the relations between enterprises and consumers, referring especially to information interchange, product transactions, equipments, current merchandises and informational, financial and law services. As the studies clearly show, e-commerce is considered by all the consumers, to be one of the best selling systems due to certain factors as: price, shopping time and the supplementary information, regarding most of all the specific characteristics of products and services, characteristics put to public disposal. Despite the concepts mentioned above, the system still deals with a number of disadvantages as: the amount of time that passes between placing the order and receiving the merchandise, the safety of the payments, the ability to test the product quality but most of all the lack of the public trust as for as personal data is concerned during the e-transactions. As a consequence, the enterprises have become more and more aware of these aspects, trying to acknowledge and reduce all these risks and therefore the consumers’ lack of trust assuring higher security standard transactions. The paper will highlight these specific characteristics of data security, the risks and vulnerability of information system as a problem area for e-commerce target, strongly connected to consumer protection.E-commerce; audit; risks; vulnerabilities; data security; Consumer protection.

    Process Models for Security Architectures

    Get PDF
    This paper presents a model for an integrated security system, which can be implemented in any organization. It is based on security-specific standards and taxonomies as ISO 7498-2 and Common Criteria. The functionalities are derived from the classes proposed in the Common Criteria document. In the paper we present the process model for each functionality and also we focus on the specific components.security architecture, process model, security functionality, Common Criteria.

    Tourists behavior and nationality - criteria for tourists classification and market segmentation

    Get PDF
    Tourism marketeres usually use categories to better know their markets and their clients. Most of definitions of segmentation consider dividing the market using different criteria. We explained why segmentation should be considered building of the firm's market, gathering clients with the same characteristics. This work is about two criteria of segmenting the tourism market: tourism behavior and nationality. We use the criteria nationality describing the main categories of foreign tourists visiting Romania in last years.consumer behavior, segmentation; criteria of segmentation; tourism behavior; nationality.

    Probleme etice în lucrul cu Big Data

    Get PDF
    Etica Big Data presupune aderarea la conceptele de comportament corect și greșit în ceea ce privește datele, în special datele cu caracter personal. Etica Big Data pune accentul pe colectorii și diseminatorii de date structurate sau nestructurate. Etica Big Data este susținută, la nivelul UE, de o amplă documentație, prin care se încearcă să se găsească soluții concrete pentru maximizarea valorii Big Data fără a sacrifica drepturile fundamentale ale omului. Autoritatea Europeană pentru Protecția Datelor (AEPD) sprijină dreptul la viață privată și dreptul la protecția datelor cu caracter personal în respectul demnității umane. DOI: 10.13140/RG.2.2.34749.8240

    Security in Internet

    Get PDF
    A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.Internet, Intranet, security, digital certificate, uthentication, confidentiality, nonrepudiation, integrity control, firewall, router

    Internet Banking

    Get PDF
    Internet Banking (known also as online banking) allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short) and banking from anywhere where internet access is available. In most cases a web browser such as Internet Explorer or Mozilla Firefox is utilized and any normal internet connection is suitable. No special software or hardware is usually needed.Internet banking, e-banking, home banking, mobile banking, electronic transactions, electronic funds transfer, mobile terminal, PDA, SSL, EFT.

    Industrial Security – a Component of the Production Operational Management

    Get PDF
    The problem of the industrial objectives security imposes as a fundamental condition of economic efficiency. This is why is necessary the elaboration of a new concept regarding industrial security. This concept must integrate quality problems, with technological and ecological characteristics of the industrial objective with the security problems of the business environment and to protect physical and informational objective against fires or natural calamities. Another role of the new industrial security concept consists of diminution the consequences of undesired events and rapid reestablishment of production capacities.Industrial organization;Security; Production management

    Adobe, gold, oil, tourists or (again) about culture and management in South America

    Get PDF
    The paper presents economical, social, cultural and tourism aspects perceived directly by the author while his visit in the Ecuador, Peru and Bolivia.Culture; Nature; People; Places; Events; History.
    corecore