WorldWideScience

Sample records for defense technology security

  1. Terahertz Technology for Defense and Security-Related Applications

    DEFF Research Database (Denmark)

    Iwaszczuk, Krzysztof

    This thesis deals with chosen aspects of terahertz (THz) technology that have potential in defense and security-related applications. A novel method for simultaneous data acquisition in time-resolved THz spectroscopy experiments is developed. This technique is demonstrated by extracting the sheet...... conductivity of photoexcited charge carriers in semi-insulating gallium arsenide. Comparison with results obtained using a standard data acquisition scheme shows that the new method minimizes errors originating from uctuations in the laser system output and timing errors in the THz pulse detection. Furthermore...

  2. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  3. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  4. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    Science.gov (United States)

    1992-06-01

    engineers in a specialized project shop. Although this approach initially sparked resistance, it promoted greater manufactura - bility by forcing...69, p. 760. 106 • Building Future Security video and animation at each employee workstation. Construction, however, remains primarily a hands- on

  5. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  6. Discussion on the Hospital Computer Security Active Defense Technology%医院计算机安全主动防御技术探讨

    Institute of Scientific and Technical Information of China (English)

    彭利华

    2014-01-01

    With the development of computer network technology, it has been widely used in hospitals, especial y with the arrival of the era of big data, the hospital computer management and ef ective implementation of the network management of patient information, treatment of case data, has become an important part of hospital information, but facing the hospital computer security issues have become increasingly prominent. In this paper, a detailed analysis of the relevant factors of hospital computer security, at the same time, the model of computer security active defense, and in-depth analysis of the architecture of computer security active defense technology, so as to bet er use the computer, computer use perception.%随着计算机网络技术的发展,其在医院得到了广泛地应用,尤其是随着大数据时代的到来,医院计算机网络的使用有效地实现了患者信息、治疗案例等数据的联网管理,已经成为医院信息化的重要组成部分,但是医院计算机网络安全面临的问题日益突出。本文分析了医院计算机网络安全的相关因素,阐述了计算机网络安全主动防御模型,同时深入地分析了计算机网络安全主动防御技术的体系架构,以便人们更好地使用计算机,提升计算机使用的感知度。

  7. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  8. SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 38 (April 2009)

    OpenAIRE

    2009-01-01

    This April 2009 issue of the Naval Postgraduate School (NPS) Maritime Defense and Security Research Program Newsletter highlights the following research: "Join MDA [Maritime Defense and Awareness] Outreach on ODNI [Office of the Director of National Intelligence] Bridge" and "NPS Cooperative Operations and Applied Science & Technology Studies." It also provides links to future events, reports, articles, and NPS Theses regarding maritime defense and security.

  9. Secure and defensive high self-esteem.

    Science.gov (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua

    2003-11-01

    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  10. CMC Participation in the Regional Centre for Strategic Studies (RCSS) Workshop: Defense, Technology and Cooperative Security in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.L.; Olsen, J.

    1998-11-01

    As an ongoing part of the collaborative efforts between the Cooperative Monitoring Center (CMC) at Sandia National Laboratories, the United States Arms Control and Disarmament Agency (ACDA), and U.S. Department of Energy (DOE), staff from the CMC served as faculty in conducting a workshop in Shanghai, China. Sponsor of the workshop was the Regional Centre for Strategic Studies (RCSS) based in Colombo, Sri Lanka. The workshop included participants from throughout South Asia and China. The CMC presented four sessions related to the role of monitoring technologies in promoting regional security and building confidence among nations. Participation in these workshops supports U.S. efforts to further regional cooperation and promote arms control, nonproliferation and other cooperative securily measures and supplements efforts funded by DOE and ACDA over the past four years. The RCSS Shanghai meeting permitted a continued CMC involvement in regionally conducted training for anew generation of leaders in government, the military, and academia throughout South Asia and China. Nuclear issues are clearly a dominant South Asian concern since the nuclear tests of May 1998. However, there remains a strong interest in identifying opportunities for increased trade and reduced tensions in other areas. The RCSS and other regional organizations are enthusiastic about continued CMC involvement in future regional courses.

  11. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  12. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  13. Securing smart grid technology

    Science.gov (United States)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  14. 电网企业网络信息安全的威胁与攻防新技术研究%Threat to network information security and study on new defense technologies in power grid enterprises

    Institute of Scientific and Technical Information of China (English)

    龙震岳; 钱扬; 邹洪; 陈锐忠

    2015-01-01

    With the continuous development of management informationization of the power grid enterprises,automatic power grid operation and intelligent electrical equipment,the information security has become more important. For the serious situation of network information security,the new-type defense technologies are studied,which are consisted of advanced persistent threat (APT) protection technology and vulnerability scanning technology. Combining with the advantages and disadvantages of these technologies,the strategy of defense effectiveness analysis based on the minimum attack cost is proposed,which can compute the defense capability of the network.%随着电网企业管理信息化、电网运行自动化、电力设备智能化的不断发展,电网企业信息安全愈发重要.在此针对网络信息安全的严峻形势,通过研究电网企业出现的新型攻防技术,包括高级持续威胁(APT)防护技术、漏洞扫描技术等的优缺点,给出基于最小攻击代价的防御有效性分析策略,并计算网络的防御能力.

  15. Information Technology and Security

    OpenAIRE

    Denning, Dorothy E.

    2003-01-01

    in Grave New World: Global Dangers in the 21st Century (Michael Brown ed.), Georgetown Press, 2003. (.pdf of prepublication version) This paper examines key trends and developments in information technology, and the implications of those developments on stability and security. Focus is on cyber threats to computer networks, including information theft and sabotage, and acts that disrupt or deny services. Seven trend areas are examined: ubiquity, mobility, hacking tools, perform...

  16. Applications of spatially offset Raman spectroscopy to defense and security

    Science.gov (United States)

    Guicheteau, Jason; Hopkins, Rebecca

    2016-05-01

    Spatially offset Raman spectroscopy (SORS) allows for sub-surface and through barrier detection and has applications in drug analysis, cancer detection, forensic science, as well as defense and security. This paper reviews previous efforts in SORS and other through barrier Raman techniques and presents a discussion on current research in defense and security applications.

  17. Blue Rose perimeter defense and security system

    Science.gov (United States)

    Blackmon, F.; Pollock, J.

    2006-05-01

    An in-ground perimeter security system has been developed by the Naval Undersea Warfare Center Division Newport based upon fiber optic sensor technology. The system, called Blue Rose, exploits the physical phenomenon of Rayleigh optical scattering, which occurs naturally in optical fibers used traditionally for Optical Time Domain Reflectometry techniques to detect sound and vibration transmitted by intruders such as people walking or running and moving vehicles near the sensor. The actual sensor is a single-mode optical fiber with an elastomeric coating that is buried in the ground. A long coherence length laser is used to transmit encoded light down the fiber. Minute changes in the fiber in response to the intrusion produce phase changes to the returning backscattered light signal. The return light signal contains both the actual intrusion sound and the location information of where along the fiber the intrusion has occurred. A digital, in-ground, Blue Rose system has been built and is now operational at NUWC. Due to the low cost of the optical fiber sensor and unique benefits of the system, the Blue Rose system provides an advantage in long perimeter or border security applications and also reduces security manning requirements and therefore overall cost for security.

  18. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  19. Nano/micromotors for security/defense applications. A review

    Science.gov (United States)

    Singh, Virendra V.; Wang, Joseph

    2015-11-01

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  20. Nano/micromotors for security/defense applications. A review.

    Science.gov (United States)

    Singh, Virendra V; Wang, Joseph

    2015-12-14

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, 'on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  1. Department of Defense Homeland Security Joint Operating Concept

    Science.gov (United States)

    2004-02-01

    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while...security, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  2. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2

    2015-01-01

    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  3. ADTool: Security Analysis with Attack-Defense Trees

    NARCIS (Netherlands)

    Kordy, Barbara; Kordy, P.T.; Mauw, Sjouke; Schweitzer, Patrick; Joshi, Kaustubh; Siegle, Markus; Stoelinga, Mariëlle Ida Antoinette; d' Argenio, P.R.

    ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of

  4. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  5. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  6. Defense Security Cooperation Agency Vision 2020. Update 1

    Science.gov (United States)

    2015-10-01

    articles, military training, and other defense-related services, by grant, loan, cash sale, or lease , in furtherance of national policies and objectives...Presidential Policy Directive 23 on Security Sector Assistance. D S C A V i s i o n 2 0 2 0 Solutions for America’s Global Partners 7 DSCA...less labor-intensive for USG implementing agencies. Oct 2014 – Dec 2016 d. Explore and develop options for using LOAs to support leases of defense

  7. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    occlusion , multipath etc.) through the use of inertial measurement systems (Interferometric Fiber Optic Gyro, Dynamically Tuned Gyro) and will...management systems provide mobile and semi- mobile assets (e.g., Abrams, Theater Missile Defense - TMD ) with low cost, low burden survivability...technology for development of an operational high energy Airborne Laser (ABL) for Theater Missile Defense ( TMD ). Address risk reduction issues for develop

  8. Nano/micromotors for security/defense applications. A review

    OpenAIRE

    Singh, VV; Wang, J

    2015-01-01

    © 2015 The Royal Society of Chemistry. The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive material...

  9. U.S.-Brazil security cooperation and the challenge of technology transfer

    OpenAIRE

    Storer, Robert J.

    2014-01-01

    Approved for public release; distribution is unlimited. Since 2010, the United States and Brazil have made efforts to expand security cooperation between the two countries with the signing of a defense cooperation agreement, a general security of military information agreement, and the establishment of a defense cooperation dialogue. Despite these positive steps, the issue of technology transfer threatens to impede greater U.S.-Brazil security cooperation. Brazilian defense policy identifi...

  10. Recent advances in computational intelligence in defense and security

    CERN Document Server

    Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein

    2016-01-01

    This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

  11. Science and Technology for Bioterrorism Defense

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, J P

    2004-05-04

    The Lawrence Livermore National Laboratory (LLNL) Chemical & Biological National Security Program (CBNP) provides science, technology, and integrated systems for chemical and biological security. Our approach is to develop and field systems that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons.

  12. Bulgaria in European Security and Defense Policy

    Science.gov (United States)

    2013-03-01

    influence of the West and cultural globalization. The major global religions are Christianity (2 billion adherents) Islam (1 billion) and Hinduism (0.7...Modernization has created a new generation of technological understanding and adapted religious movements like evangelism in America, " Hinduism

  13. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  14. Department of Defense Energy Security Initiatives

    Science.gov (United States)

    2009-01-01

    efficient powerplants (engines, motors, power storage, etc.), to identify ways to reduce fuel consumption affordably and sustain- ably, while sustaining (or...etc.) and is also exploring new technologies, such as ocean and wave harvesting. Solar power. Solar power is the largest contributor in the Air Force’s...effectively. The Navy installed the first wave power buoy at Marine Corps Base Kaneohe Bay, Hawaii, and is partnering with industry to test a second buoy. In

  15. Undersea Perimeter Security Integrated Defense Environment (UPSIDE)

    Science.gov (United States)

    2011-11-29

    Raytheon‟s Athena system involved only several weeks of effort and was greatly facilitated by use of commercial open architectures and standards. In...best of breed” for a set of point technologies such as high frequency active SONAR systems, RADAR systems and Electro- Optical /Infrared systems was...information. In Phase III, UPSIDE was integrated with Raytheon‟s Project Athena (i.e., Regional COP) in accordance with the Figure 8 „tiered‟ maritime

  16. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  17. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  18. Assessing the Risk Situation of Network Security for Active Defense

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiang; YAO Shuping; TANG Chenghua

    2006-01-01

    The risk situation assessment and forecast technique of network security is a basic method of active defense techniques. In order to assess the risk of network security two methods were used to define the index of risk and forecast index in time series, they were analytical hierarchy process (AHP) and support vector regression (SVR). The module framework applied the methods above was also discussed. Experiment results showed the forecast values were so close to actual values and so it proved the approach is correct.

  19. European Security and Defense Policy: The Dialectics of Autonomy

    Science.gov (United States)

    2007-06-01

    only certain types of missions. Rather than centering on a robust military capability, Europe’s security concept has recently been more diplomatically... Pompidou : The Politics of Grandeur (Ithica, NY: Cornell University Press, 1974), p. 316. 27 of a powerful national leader. The gains of the EC were...procedures, operations centers and headquarters that were not already available via NATO. As European states were experiencing falling defense budgets, this

  20. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    familysecuritymatters.org/publications/id.7744/pub_detail.asp. 2 Arthur Tulak, Robert Kraft, and Don Silbaugh, “State Defense Forces and Homeland Security...not part of an elite group of well-armed, well-trained military soldiers hardened by the trials of lethal combat—most were simply the undesirables of...Guard. Accessed September 15, 2014. http://www.tnmilitary.org/tennessee-state- guard.html. Tulak, Arthur , Robert Kraft, and Don Silbaugh. “State

  1. OpenFlow Security Threat Detection and Defense Services

    Directory of Open Access Journals (Sweden)

    Wanqing You

    2014-11-01

    Full Text Available The emergence of OpenFlow-capable switches de- couples control plane from the data flow plane so that they support programmable network and allow network administrators to have programmable central control of network traffic via a controller. The controller and its communication with switches and users become a malicious attack target. This paper explores major possible security threats and attacks on the controller of SDN and proposes a new approach to automatically and dynamically detect and monitor malicious behaviors on flow message passing and defend such attacks to ensure the security of SDN. We have built a FlowEye prototype at service level on Mininet API, and simulation tests are done on two feasible attacks on OpenFlow Beacon platform. The paper provides the feasibility study of such attacks and defense protection strategies in SDN security research.

  2. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  3. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  4. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology Advisory...

  5. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... SPACE ADMINISTRATION 48 CFR Parts 1804 and 1852 RIN 2700-AD46 Information Technology (IT) Security... NASA FAR Supplement (NFS) to update requirements related to Information Technology Security, consistent with Federal policies for the security of unclassified information and information systems. The...

  6. Technology-Enabled Crime, Policing and Security

    Science.gov (United States)

    McQuade, Sam

    2006-01-01

    Crime, policing and security are enabled by and co-evolve with technologies that make them possible. As criminals compete with security and policing officials for technological advantage perpetually complex crime, policing and security results in relatively confusing and therefore unmanageable threats to society. New, adaptive and ordinary crimes…

  7. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... ADMINISTRATION Webinar About Advanced Defense Technologies RFP AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open webinar meeting to discuss Advanced Defense Technologies (ADT) Request for... webinar it is hosting to answer questions from potential Offerors about the Advanced Defense...

  8. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  9. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  10. Analyzing Department of Defense's use of other transactions as a method for accessing non-traditional technology

    OpenAIRE

    Gilliland, John E.

    2001-01-01

    As U.S. Defense budgets and military research and development spending experienced significant decline between 1988 and 1998, the Defense Technology and Industrial Base essentially merged with the national industrial base. DOD reform occurred more slowly than changes in the private sector fueled by advances in technology. U.S. national security relies upon the ability of the military to maintain technological superiority. To attract advanced technology companies that normally do not participa...

  11. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  12. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  13. Department of Defense Laboratories: Finding a Future in Technology Transfer

    Science.gov (United States)

    1993-04-01

    investment. There is no mention of DoD even trying. This, then, presents a problem for Defense technology transfer management. The President expects both...effort, but nonetheless felt unable to express their effort quantitatively. The potential size and demand for Defense technology transfer calls for some... Defense technology transfer is taking place, it is doing so on the enthusiasm and drive of a few key individuals. Political demand and legislation

  14. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  15. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  16. 48 CFR 53.303-DD-441 - Department of Defense DD Form 441, Security Agreement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Department of Defense DD Form 441, Security Agreement. 53.303-DD-441 Section 53.303-DD-441 Federal Acquisition Regulations...-DD-441 Department of Defense DD Form 441, Security Agreement. EC01MY91.163 EC01MY91.164...

  17. A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure

    Directory of Open Access Journals (Sweden)

    Dennis K. Nilsson

    2009-09-01

    Full Text Available The automobile industry has grown to become an integral part of our everyday life. As vehicles evolve, the primarily mechanical solutions for vehicle control are gradually replaced by electronics and software solutions forming in-vehicle computer networks. An emerging trend is to introduce wireless technology in the vehicle domain by attaching a wireless gateway to the in-vehicle network. By allowing wireless communication, real-time information exchange between vehicles and between infrastructure and vehicles become reality. This communication allows for road condition reporting, decision making, and remote diagnostics and _rmware updates over-the-air. However, allowing external parties wireless access to the in-vehicle network creates a potential entry-point for cyber attackers. In this paper, we investigate the security issues of allowing external wireless communication. We use a defense-in-depth perspective and discuss security challenges and propose solutions for each of the prevention, detection, de_ection, and forensics approaches. We stress the important need for applying security using the defense-in-depth principle.

  18. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  19. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  20. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  1. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  2. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  3. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  4. Control Systems Cyber Security: Defense-in-Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  5. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  6. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  7. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  8. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  9. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  10. Department of Defense and Security Cooperation: Improving Prioritization, Authorities, and Evaluations

    Science.gov (United States)

    2016-03-09

    McNerney, Stuart E. Johnson, Stephanie Pezard, David Stebbins , Renanah Miles, Angela O’Mahony, Chaoling Feng, Tim Oliver, Defense Institution Building... line of work. Today, I will focus on three questions. First, how does the Department of Defense (DoD) prioritize its security cooperation

  11. A Study of Security Awareness Information Delivery within the Defense Intelligence Community

    Science.gov (United States)

    Krasley, Paul F.

    2011-01-01

    Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…

  12. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  13. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the... public. DATES: The Homeland Security Science and Technology Advisory Committee will meet January 26, 2010...

  14. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  15. The Catalytic Factor of the Sino-Japanese Security Dilemma: The New 1997 Defense Guidelines for U.S.-Japan Defense Cooperation

    Science.gov (United States)

    2014-12-01

    79 Francis Fukuyama and Kongdan Oh, The U.S.-Japan Security Relationship after the Cold War (Santa Monica, CA: RAND, 1993...8. 80 Fukuyama and Oh, The U.S.-Japan Security Relationship after the Cold War, 12. 81 Japan Defense Agency, Defense of Japan 1992, 51. 30...security strategy. 82 Fukuyama and Oh, The U.S.-Japan Security Relationship after the Cold War, 13

  16. 5th International Conference OTEH 2012 - defense technology (Proceedings review)

    OpenAIRE

    Vlado Petar Đurković

    2013-01-01

    This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI), from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH ...

  17. National Security Technology Incubator Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  18. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  19. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  20. Center for Infrastructure Assurance and Security - Attack and Defense Exercises

    Science.gov (United States)

    2010-06-01

    Security; Botnet; Steganography ; Biometrics; Information Infrastructure 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER...5  4.1.  Steganography Detection Tools ................................................................................................ 5... steganography , cryptography, wireless security, and intrusion detection. These topics were chosen based on proposals submitted by UTSA faculty and

  1. Network attack detection and defense: securing industrial control systems for critical infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  2. Motives for European Union Common Security and Defense Policy Mission Selection

    Science.gov (United States)

    2011-03-01

    ABBREVIATIONS CDU Christian Democratic Union CFSP Common Foreign and Security Policy CSDP Common Security and Defense Policy DRC Democratic Republic of...rightist party, the Christian Democratic Union ( CDU ), was for it. In France the Union for the Popular Movement (UMP), closely aligned with the former

  3. Addressing social resistance in emerging security technologies

    Science.gov (United States)

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863

  4. Addressing social resistance in emerging security technologies.

    Science.gov (United States)

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus. Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake.

  5. The Defense Science Board 1999 Summer Study Task Force on 21st Century Defense Technology Strategies. Volume 1

    Science.gov (United States)

    2016-06-07

    Study Task Force On 21ST Century Defense Technology Strategies Volume 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...3. Defense Technology Strategy and Management PART 4. Strategic Agility PART 5. Analysis and Quantitative Results iii PREFACE The Defense Science...Board (DSB) 1999 Summer Study Task Force on 21st Century Defense Technology Strategies continues a series of studies that have examined key challenges

  6. Center for Coastline Security Technology, Year 3

    Science.gov (United States)

    2008-05-01

    Figure 2.6.8: Close-Up Photograph of RPUUV Tail Section. Figure 2.6.9: Force and moments applied on a hydrofoil . Figure 2.6.10: The NACA 21016... hydrofoil profile. Florida Atlantic University 4/28/08 Page 10 Center for Coastline Security Technology Year Three-Final Report Figure...as a 3D wing with a NACA 21016 hydrofoil profile (Figure 2.6.10) held by 3 cylinders (Figure 2.6.8). Center for Coastline Security Technology Year

  7. Defense Science and Technology Success Stories

    Science.gov (United States)

    2007-01-01

    program. POC: Mr. Paul Koskey, MDA/ DVI , 703-882-6154 Year: FY 2006/2007 Fiber Grating Sensor for Damage Assessment MISSILE DEFENSE AGENCY (MDA) 43...sulfur, these microorganisms remove a potentially fouling precipitate from the anode. Collective activity of the biofilm and continuous flux of fuel by

  8. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-01-12

    ... Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security AGENCY: The National...) Committee, an interagency working group that coordinates cyber security research activities in support of... the defense-in-depth strategy for cyber security. The workshop will be held March 22, 2011 in the...

  9. Commercializing Defense Technologies and Helping Defense Firms Succeed in Commercial Markets: A Report on the Objectives, Activities, and Accomplishments of the TAP-IN Program

    Science.gov (United States)

    1997-01-01

    Technology Access for Product Innovation (TAP-IN), the largest technology deployment project funded by TRP, was competitively selected through a national solicitation for proposals. TAP-IN was created to help companies access and apply defense technologies and help defense-dependent companies enter new commercial markets. Defense technologies included technologies developed by DoD, DOE, NASA, and their contractors. TAP-IN was structured to provide region-based technology access services that were able to draw on technology resources nationwide. TAP-IN provided expert assistance in all stages of the commercialization process from concept through prototype design to capital sourcing and marketing strategy. TAP-IN helped companies locate new technology, identify business partners, secure financing, develop ideas for new products, identify new markets, license technology, solve technical problems, and develop company-specific applications of federal technology. TAP-IN leveraged NASA's existing commercial technology network to create an integrated national network of organizations that assisted companies in every state. In addition to NASA's six regional technology transfer centers (RTTCs), TAP-IN included business and technology development organizations in every state, the Industrial Designers Society of America, and the Federal Laboratory Consortium (FLC).

  10. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  11. European Security: Chances for a European Defense Entity

    Science.gov (United States)

    1991-04-12

    segment of society should be allocated to future security, and on the role of the military in the process. The current incorporation of military...Netherlands, 14 July 1990. (The deceptive appearance of security and unity in Europe.) 33. Europa 1992. Zaken doen op de Europese interne markt ...doen op de Europese interne markt . (Den Haag), 1988. NATO Press Service. London Declaration on a Transformed North Atlantic Alliance. Brussels: Press

  12. Collective Security vs. U.S. Defense Policy

    Science.gov (United States)

    1993-06-01

    in the maintenance of law and order, protecting the delivery of humanitarian assistance, denying airspace, and guaranteeing rights of passage . The...forces, assistance, and facilities, including rights of passage , necessary for the purpose of maintaining international peace and security. 2. Such...the nature of facilities and assistance, including rights of passage , to be made available to the Security Council on its call for the purpose of

  13. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  14. Introduction (to the book Green Defense Technology)

    DEFF Research Database (Denmark)

    Goodsite, Michael Evan; Møldrup, Mathilde; Hubbard, Emil Egerod

    2017-01-01

    of triple net zero and long-term and sustainable energy strategies. It is widely recognized that implementation of policies to benefit environmental sustainability, energy security, and preparedness at both military installations and small cities are imperative, since energy is intricately linked...... to the entire set of net zero goals and vision. Here the focus is especially on learning from best practices across these two domains....

  15. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  16. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  17. National Security Technology Incubator Action Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  18. Wireless Security Threats, Vulnerabilities and Their Defense Mechanisms

    Directory of Open Access Journals (Sweden)

    Ankur Bawiskar

    2013-01-01

    Full Text Available In today’s world means of communications has changed rapidly and the main focus is on wireless communications. Communication in wireless mode has many threats. This paper discusses a brief overview of various threats to wireless networks at various layers and also presents a survey of the defense mechanisms. The main aim is to discuss attacks on MANET and their defense mechanisms. Communication in wireless mode is more challenging as compared to wired mode because of dynamically changing network topology. Wireless networks are mostly used in military applications and commercial applications. This paper also discusses internal threats and external threats. It also gives an overview of routing protocols being used in wireless networks and various attacks that take place against these routing protocols and their counter measures.

  19. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    Science.gov (United States)

    2015-12-01

    meeting that year, they agreed to a broader goal of creating an ASEAN Community, which would have three pillars . One of these would be the ASEAN... pillars . Under APSC, endorsing and enhancing defense cooperation through military engagement is evidence to support the argument that ASEAN has changed...economy. A similar case happened to the West Papua, where its natural resources— copper and gold—had been exploited with little compensation and

  20. Using Automatic Identification System Technology to Improve Maritime Border Security

    Science.gov (United States)

    2014-12-01

    18 Dave Dixon et al., Security Modeling for Maritime Port Defense Resource Allocation ( Aiken , SC: Savannah River National Laboratory, 2010), 3...Maritime Port Defense Resource Allocation. Aiken , SC: Savannah River National Laboratory, 2010. Eggers, William D., and John O’Leary. If We Can Put a

  1. Infrared: A Key Technology for Security Systems

    Directory of Open Access Journals (Sweden)

    Carlo Corsi

    2012-01-01

    Full Text Available Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due to the coolers avoidance, low cost, and, overall, completely integrable with Silicon technology FPAs, especially designed and tailored for specific applications, smart sensors, has really been impacted with revolutionary and new ideas and system concepts in all the infrared fields, especially for security applications. Lastly, the advent of reliable Infrared Solid State Laser Sources, operating up to the Long Infrared Wavelength Band and the new emerging techniques in Far Infrared Submillimeter Terahertz Bands, has opened wide and new areas for developing new, advanced security systems. A review of all the items with evidence of the weak and the strong points of each item, especially considering possible future developments, will be reported and discussed.

  2. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-02-07

    ... Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security AGENCY: The National... interagency working group that coordinates cyber security research activities in support of national security...-Depth strategy for cyber security. The workshop will be held March 22, 2011 in the Washington DC area...

  3. Defense and Homeland Security Applications of Multi-Agent Simulations

    Science.gov (United States)

    2007-12-01

    Monterey, CA 93943-5219, U.S.A. Felix Martinez Wargaming Department Centro de Estudios Superiores Navales Mexico, D.F. 04840, MEXICO Lisa R...critical asset, Petroleos Mexicano (PE- MEX) and the Mexican Navy maintain mutually supportive security strategies in the Campeche Sound. During a state of

  4. A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security(Applied Study to ENR Datacenter – Egyptian National Railways

    Directory of Open Access Journals (Sweden)

    Nashaat el-Khameesy

    2013-03-01

    Full Text Available Defense in Depth is practical strategy for achieving Information Assurance in today’s highly datacenter environments. It is a “best practices” strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational considerations. This paper provides an overview of the major elements of the strategy and provides links to resources that provide additional insight. Companies need to address the security challenges of datacenter using a comprehensive defense-in-depth strategy. No single security solution will keep a determined thief from the goal of compromising the hardware or software given enough time and resources. Applying multiple layers of system security will slow the progress made by a thief, and hopefully, force the thief to abandon the pursuit, at the least, resale of the stolen property, and at worst, of confidential corporate data. The Defense in depth is the concept of protecting a Datacenter with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. In this paper, the main focus is given to highlight the security aspects of data center from perspectives of threats and attacks from one side and approaches for solutions from the other side. The paper also proposes an effective and flexible distributed scheme with two salient features. Our scheme achieves the integration of continual security improvement and Security Risk localization. This paper deals with the implementation of defense in depth at a strategic, principle-based level and provides additional guidance on specific sets of controls that may be applicable to support an organization’s defense in depth initiatives. The paper will present in Section (1 the Defense in depth concept, Section (2 Threats, Adversaries, Motivations, Classes of Attack and Vulnerability

  5. Modern Quantum Technologies of Information Security

    CERN Document Server

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  6. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  7. Technology Foundations for Computational Evaluation of Software Security Attributes

    Science.gov (United States)

    2006-12-01

    Technology Foundations for Computational Evaluation of Software Security Attributes Gwendolyn H. Walton Thomas A. Longstaff Richard C...security attributes to the functional behavior of the software . The emergence of CERT’s new function extraction (FX) technology , unavailable to previous... software meets security requirements if they have been specified in behavioral terms. FX technology prescribes effective means to create and record

  8. 48 CFR 53.303-DD-254 - Department of Defense DD Form 254, Contract Security Classification Specification.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Department of Defense DD Form 254, Contract Security Classification Specification. 53.303-DD-254 Section 53.303-DD-254 Federal... Illustrations of Forms 53.303-DD-254 Department of Defense DD Form 254, Contract Security...

  9. Exemplar Practices for Department of Defense Technology Transfer

    Science.gov (United States)

    2013-01-01

    as Amazon, Discovery Studios, Google, Under Armour , McCormick, and Cisco are invited to speak to researchers about innovation, how they manage it...commercialization and marketing strategies for each of the selected DoD technologies; • actively markets these technologies to industry...Publication This work was conducted by the Institute for Defense Analyses (IDA) under contract DASW01-04-C-0003, Task AI-6-3558 “Review of DoD

  10. Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and pos...

  11. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    NARCIS (Netherlands)

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  12. Defense Transportation’s EDI Program: A Security Risk Assessment

    Science.gov (United States)

    1993-05-01

    available when needed. One way to provide proof of system-security procedures is to follow the guide- lines in the Inteinal Management Control Program ( IMCP ...as mandated by the Federal Manager’s Financial Integrity Act (FMFIA). The IMCP prescribes both general and specific standards for maintaining...appropriate internal controls. For 12 example, the IMCP states that control systems shall be properly documented, trans- actions and other significant

  13. Secure digital voice communications in the Defense Data Network (DDN)

    Science.gov (United States)

    Bernet, M.; Gan, D.; Oesterreicher, C.

    1985-03-01

    This final report has investigated and validated one of the fourteen key features of the future, all-digital World-wide Digital Systems Architecture (WWDSA), namely the enhanced 2.4 Kbps secure voice survivability through the use of packetized voice and the use of packetized voice and the interconnection between the voice survivability through the use of packetized voice and the interconnection between the voice (DSN) phase implementation plan in the report, Secure Voice, as provided by the STU-IIs, can be implemented in the DDN in the late 1980s time-frame with no technical and minimum schedule risk. VIUs are proposed to interconnect, the family of secure voice terminals, called STU-IIs, to the DDN. VIUs contain modan, signalling and supervision (S/S), and processor modules and are supported by the implementation model of the protocol architecture that (with the TAC as processor module) was proposed in the report. An optimum system-level architecture employing the VIUs and the proposed in the implementation plan based on an extensive evaluation.

  14. Iceland and the EU's Foreign, Security and Defense Policy. EU Goals, Icelandic History and Traditions

    OpenAIRE

    Eva Þóra Karlsdóttir 1987

    2011-01-01

    The aim of this thesis is to study how well the EU’s foreign, security and defense policies coincide with Iceland’s foreign policies, particularly in regards to Iceland’s history and traditions. For this purpose, main aspects of Iceland’s foreign policy history are studied, in particular the background to Iceland’s decision to join NATO. Four aspects of the EU’s Common Foreign and Security Policy (CFSP) are then used as case-studies, along with three aspects of the EU’s Common Security and De...

  15. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  16. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    Energy Technology Data Exchange (ETDEWEB)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  17. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  18. Malpractice liability, technology choice and negative defensive medicine.

    Science.gov (United States)

    Feess, Eberhard

    2012-04-01

    We extend the theoretical literature on the impact of malpractice liability by allowing for two treatment technologies, a safe and a risky one. The safe technology bears no failure risk, but leads to patient-specific disutility since it cannot completely solve the health problems. By contrast, the risky technology (for instance a surgery) may entirely cure patients, but fail with some probability depending on the hospital's care level. Tight malpractice liability increases care levels if the risky technology is chosen at all, but also leads to excessively high incentives for avoiding the liability exposure by adopting the safe technology. We refer to this distortion toward the safe technology as negative defensive medicine. Taking the problem of negative defensive medicine seriously, the second best optimal liability needs to balance between the over-incentive for the safe technology in case of tough liability and the incentive to adopt little care for the risky technology in case of weak liability. In a model with errors in court, we find that gross negligence where hospitals are held liable only for very low care levels outperforms standard negligence, even though standard negligence would implement the first best efficient care level.

  19. FACTORS EFFECTING TECHNOLOGY ACQUISITION DECISIONS IN NATIONAL DEFENSE PROJECTS

    OpenAIRE

    2015-01-01

    Defense Industry” (DI) not only strengthens the military power of a country, but also effects other fields of technology and economy positively and enables countries to be much more powerful in terms of their competitiveness in technology and knowledge instead of merely being a follower and a continuous customer. If a state seeks to have high-tech and capable DI the only foundation is to create a national environment which is managed based on a systematic ”Technology Management” philosophy a...

  20. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  1. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  2. Secure Logistic Management System Using Wireless Technologies

    Directory of Open Access Journals (Sweden)

    K.R. Prasanna

    2012-06-01

    Full Text Available This study proposes an idea of solving problems arising in logistics management, with the aid of wireless communication technologies like RFID, GSM and GPS. This study includes the modules of goods delivery status, vehicle location tracking, overloading of goods, interlocking system and finding out the misplaced goods. The integrated system consists of RFID and GPS technology for goods count and vehicle tracking. Overloading of goods is identified with the help of the weight sensors. If the goods are misplaced, the secure system will indicate the authorized base station and will not allow the vehicle to move. If the wrong goods are taken out from the cargo the buzzer will be ON and the message will be intimated to the concerned person through GSM.

  3. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... today, we have witness a lot of national security issues that risks the continued existence of the country as one ... lack of economic security such as Income security, Employment security, Job security, ..... In Australia, building and .... Table 4.2.8 Respondents by IT on Oil and Gas production and distribution.

  4. Smart Door Lock System: Improving Home Security using Bluetooth Technology

    National Research Council Canada - National Science Library

    Jayant Dabhade; Amirush Javare; Tushar Ghayal; Ankur Shelar; Ankita Gupta

    2017-01-01

      In today's world, smart home control system is necessary in daily life. As the technology is emerging a lot it's time for us to be more technical related to home secure security and easy access to the user...

  5. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  6. FACTORS EFFECTING TECHNOLOGY ACQUISITION DECISIONS IN NATIONAL DEFENSE PROJECTS

    Directory of Open Access Journals (Sweden)

    Gökhan ASTAN

    2015-04-01

    Full Text Available “Defense Industry” (DI not only strengthens the military power of a country, but also effects other fields of technology and economy positively and enables countries to be much more powerful in terms of their competitiveness in technology and knowledge instead of merely being a follower and a continuous customer. If a state seeks to have high-tech and capable DI the only foundation is to create a national environment which is managed based on a systematic ”Technology Management” philosophy and well-defined “Acquisition” process. With already reduced resources, it is crucial to spend money for the most needed and right technology. Consequently, the focus of this study is on the “Acquisition" and "Technology Transfer" (TT concepts and approaches. As such the different TT methods are compared and their advantages and disadvantages discussed. In the last part of the study, DI is described and assessed in terms of the TT methods.

  7. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security....

  8. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  9. Motives for European Union Common Security and Defense Policy Mission Selection

    OpenAIRE

    Page, Greg A.

    2011-01-01

    Approved for public release; distribution is unlimited. The European Union (EU) currently lacks a comprehensive agreement on where the EU will engage in crisis management missions under the Common Security and Defense Policy (CSDP) framework. This thesis investigates the motives for why the European Union engages in military or civilian operations under the framework of CSDP. Predominant research suggests the three dominant factors motivating the EU to engage in CSDP are national intere...

  10. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    Science.gov (United States)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  11. Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter

    Science.gov (United States)

    2007-06-01

    Bringing HPC to the First Responder and Warfighter DISTRIBUTION: Approved for public release, distribution unlimited This paper is part of the following...thru ADP023803 UNCLASSIFIED Fast and Accurate CBR Defense for Homeland Security: Bringing HPC to the First Responder and Warfighter Gopal Patnaik and...Urban AerodynamicsE1 3, these models are now the fidelity and accuracy of CFD to the first responder or commonly applied to predict contaminant

  12. Input from Key Stakeholders in the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  13. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on...

  14. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of informatio

  15. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  16. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  17. The security and recent technology of quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    WANG Xiang-bin; YING Hao; MA Huai-xing; PENG Cheng-zhi; YANG Tao; PAN Jian-wei

    2006-01-01

    In principle,quantum key distribution (QKD)can be used to make unconditionally secure private communication.However,the security of the existing real system for QKD needs to be carefully examined.Actually,the existing experiments based on weak coherent states are not secure under photon-number-splitting attack.Fortunately,the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.

  18. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  19. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  20. Ethernet-based integrated surveillance system for homeland security and homeland defense

    Science.gov (United States)

    Schooley, Michael G.; Thompson, Dean

    2004-09-01

    This report documents the results of an internal DRS effort to develop an Ethernet based integrated defense system to improve defense of cities, harbors, airports, power production, energy supplies, bridges, monuments, dams and so forth. Results of the integration of multiple SCOUT LPI radars and multiple Electro-optical targeting systems will be provided, illustrating the benefits of interfacing surveillance radars with imaging sensors to confirm detection and provide visual recognition and identification. An analysis of the handover errors will be provided including errors due to; sensor platforms location and orientation uncertainty, target location measurement errors, data latency and motion prediction errors, which contribute to target handoff and the re-acquisition timeline. These predictions will be compared to measured results. The system architecture will be defined including; security, support for both stationary and moving sensor platforms, remote control of sensor systems and distribution of imagery through the network and remote diagnostics, maintenance and software upgrades. Growth capabilities include secure wireless communication to/from moving platforms, integration with sonar and seismic sensors, cooperative location of friendly forces and acoustic detection and triangulation of gunshots with automated cueing of sensors and security forces to the shooters most probable location. The use of ad hoc multi-hopping wireless networking supplements hardwire networks, augments disaster response capabilities, provides high-speed communications for moving platforms and supplements GPS outage areas.

  1. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  2. Towards an integrated defense system for cyber security situation awareness experiment

    Science.gov (United States)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  3. Security Risks and Modern Cyber Security Technologies for Corporate Networks

    CERN Document Server

    Gharibi, Wajeb

    2011-01-01

    This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.

  4. Security Service Technology for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Aiqun Hu; Tao Li; Mingfu Xue

    2011-01-01

    As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.

  5. Oversight of Aegis’s Performance on Security Services Contracts in Iraq with the Department of Defense

    Science.gov (United States)

    2009-01-14

    for three Reconstruction Security Support Services ( RSSS ) contracts. This report focuses on the RSSS contracts, examining the cost of the...SECURITY SERVICES CONTRACTS IN IRAQ WITH THE DEPARTMENT OF DEFENSE What SIGIR Found In addition to the $612.8 million in RSSS contract costs...at costs that are not readily available. Under the RSSS contract, almost 1,400 Aegis personnel provide DoD a variety of security services

  6. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    Science.gov (United States)

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  7. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  8. Wearable Technology Devices Security and Privacy Vulnerability Analysis

    Directory of Open Access Journals (Sweden)

    Ke Wan Ching

    2016-05-01

    Full Text Available Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable technology is not mature yet in term of device security and privacy acceptance of the public. There exists some security weakness that prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is authentication issue. The low processing due to less computing power of wearable device causethe developer's inability to equip some complicated security mechanisms and algorithm on the device.In this study, an overview of security and privacy vulnerabilities on wearable devices is presented.

  9. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ... ADMINISTRATION Information Collection; Implementation of Information Technology Security Provision AGENCY... new information collection requirement regarding Implementation of Information Technology Security... of Information Technology Security Provision,'' under the heading ``Enter Keyword or ID''...

  10. Korean and U.S. Economic and Technological Capabilities to Support Defense Burdens

    Science.gov (United States)

    1991-01-01

    AD-A25 7 085 A RAND NOTE Korean and U.S. Economic and Technological Capabilities to Support Defense Burdens Charles Wolf, Jr., Yong-Sup Han DTI ova6...collaboration with the Korea Institute for Defense Analyses (KIDA), that addresses possible changes in the roles, structures, and responsibilities of...center supported by the Office of the Secretary of Defense and the Joint Staff. The KIDA work was sponsored by the Korean Ministry of National Defense

  11. Multi-capability color night vision HD camera for defense, surveillance, and security

    Science.gov (United States)

    Pang, Francis; Powell, Gareth; Fereyre, Pierre

    2015-05-01

    e2v has developed a family of high performance cameras based on our next generation CMOS imagers that provide multiple features and capabilities to meet the range of challenging imaging applications in defense, surveillance, and security markets. Two resolution sizes are available: 1920x1080 with 5.3 μm pixels, and an ultra-low light level version at 1280x1024 with 10μm pixels. Each type is available in either monochrome or e2v's unique bayer pattern color version. The camera is well suited to accommodate many of the high demands for defense, surveillance, and security applications: compact form factor (SWAP+C), color night vision performance (down to 10-2 lux), ruggedized housing, Global Shutter, low read noise (<6e- in Global shutter mode and <2.5e- in Rolling shutter mode), 60 Hz frame rate, high QE especially in the enhanced NIR range (up to 1100nm). Other capabilities include active illumination and range gating. This paper will describe all the features of the sensor and the camera. It will be followed with a presentation of the latest test data with the current developments. Then, it will conclude with a description of how these features can be easily configured to meet many different applications. With this development, we can tune rather than create a full customization, making it more beneficial for many of our customers and their custom applications.

  12. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  13. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  14. Secure versus fragile high self-esteem as a predictor of verbal defensiveness: converging findings across three different markers.

    Science.gov (United States)

    Kernis, Michael H; Lakey, Chad E; Heppner, Whitney L

    2008-06-01

    Why is it that many individuals verbally rationalize and distort self-esteem threatening information? We examined whether such verbal defensiveness (Feldman Barrett, Williams, & Fong, 2002) differs as a function of whether individuals' high self-esteem is secure or fragile. Our findings indicated that individuals whose self-esteem was stable, not contingent, or congruent with high implicit self-esteem exhibited especially low amounts of verbal defensiveness. In contrast, verbal defensiveness was considerably higher when individuals' high self-esteem was unstable, contingent, or paired with discrepant low implicit self-esteem. Discussion centers on why the possession of well-anchored and secure high self-esteem obviates defensiveness directed toward enhancing, maintaining, or bolstering feelings of self-worth.

  15. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  16. Database security and encryption technology research and application

    Science.gov (United States)

    Zhu, Li-juan

    2013-03-01

    The main purpose of this paper is to discuss the current database information leakage problem, and discuss the important role played by the message encryption techniques in database security, As well as MD5 encryption technology principle and the use in the field of website or application. This article is divided into introduction, the overview of the MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements and application, this paper makes readers more detailed and clearly understood the principle, the importance in database security, and the use of MD5 encryption technology.

  17. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  18. Solution to Upgrade the Existing Power System Network Security Defense System%提升电力系统现有网络安全防御体系的解决方案

    Institute of Scientific and Technical Information of China (English)

    李永康; 周军鹏; 陈云峰

    2011-01-01

    Analyzed technologies of the existing power system network security defense,it shows the current security and defense technology can solve the vast majority of known malicious code attacks,but it is in a state of passive defense,which can not recognize the new and unknown malicious code,it proposed to upgrade the existing security defense system for the active defense system,to achieve the solution of differentiation and defense in depth.%对电力系统现有的网络安全防御技术进行了分析,得出当前的安全防御技术虽能够解决绝大部分已知的恶意代码攻击,但却处于对新型的和未知的恶意代码攻击无法识别的被动防御的状态,并提出将现有的安全防御体系提升为主动防御体系,实现差异化、纵深防御的解决方案。

  19. COMMUNICATING DEFENSE AND SECURITY IN ROMANIA DURING THE UKRAINIAN CRISIS (NOVEMBER 2013 - SEPTEMBER 2014

    Directory of Open Access Journals (Sweden)

    Viorel MIHAILĂ

    2014-10-01

    Full Text Available This paper analyzes the main themes and patterns used by Romanian communication programs on defense and security during the Ukrainian crises, from November 2013 until the ceasefire of September 5th. Acknowledging the change made in the Romanian leadership’s understanding of the security concept during the last 25 years of country’s transition from communism to democracy, the study found out that the narrative used by the Romanian institutions might lead to a new understanding on whose job is to protect the country in case of a military aggression. Currently, the bearer of this responsibility appears to be, for Romanians, the North Atlantic Treaty Organization (NATO, the European Union (EU and the Romanians themselves, in this order. For the timeframe analyzed, for what is spoken and written in the media by the politicians and, afterwards, re-represented by the general public (developed by opinion pools it seems that for the military dimension, the security responsibility was somehow outsourced.

  20. Applying New Network Security Technologies to SCADA Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  1. The Institute for Security Technology Studies (ISTS): overview

    Science.gov (United States)

    Kotz, David F.

    2004-09-01

    The Institute for Security Technology Studies (ISTS) was founded at Dartmouth College in 2000 as a national center of security research and development. The Institute conducts interdisciplinary research and development projects addressing the challenges of cyber and homeland security, to protect the integrity of the Internet, computer networks, and other interdependent information infrastructures. ISTS also develops technology for providing the information and tools necessary to assist communities and first responders with the evolving, complex security landscape. ISTS is a member of and administers the Institute for Information Infrastructure Protection (I3P), a consortium of 24 leading academic institutions, non-profits and federal laboratories that brings industry, academia and government together to articulate and focus on problems that need to be solved to help ensure the nation's information infrastructure is safe, secure, and robust.

  2. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  3. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  4. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45 Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science...

  5. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  6. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  7. Massachusetts Institute of Technology Security Studies Program

    Science.gov (United States)

    2006-01-01

    postdoctoral fellowships at the Olin Institute for Strategic Studies at Harvard University and the Center for International Security and Cooperation...government and business have frequently invited him to speak on Middle Eastern affairs. JEANNE GUILLEMIN’s training in sociology and anthropology led to her...been the recipient of several scholarships and awards, including two NATO Fellowships and two Fulbright Scholarships. In 1995, he was named to the

  8. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  9. National Defense Education and Innovation Initiative: Meeting America's Economic and Security Challenges in the 21st Century

    Science.gov (United States)

    Association of American Universities, 2006

    2006-01-01

    The Association of American Universities (AAU) calls on the Administration, Congress, and academia, with the help of the business sector, to implement a 21st Century National Defense Education and Innovation Initiative aimed at meeting the economic and security challenges we will face over the next half-century. Government and America's…

  10. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  11. External Service Providers to the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  12. Technology for low-cost PIR security sensors

    Science.gov (United States)

    Liddiard, Kevin C.

    2008-03-01

    Current passive infrared (PIR) security sensors employing pyroelectric detectors are simple, cheap and reliable, but have several deficiencies. These sensors, developed two decades ago, are essentially short-range moving-target hotspot detectors. They cannot detect slow temperature changes, and thus are unable to respond to radiation stimuli indicating potential danger such as overheating electrical appliances and developing fires. They have a poor optical resolution and limited ability to recognize detected targets. Modern uncooled thermal infrared technology has vastly superior performance but as yet is too costly to challenge the PIR security sensor market. In this paper microbolometer technology will be discussed which can provide enhanced performance at acceptable cost. In addition to security sensing the technology has numerous applications in the military, industrial and domestic markets where target range is short and low cost is paramount.

  13. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science...

  14. A SURVEY REPORT ON VPN SECURITY & ITS TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    JAYANTHI GOKULAKRISHNAN

    2014-08-01

    Full Text Available Virtual Private Network (VPN is a communication network which provides secure data transmission in an unsecured or public network by using any combination of technologies. A virtual connection is made across the users who are geographically dispersed and networks over a shared or public network, like the Internet. Even though the data is transmitted in a public network, VPN provides an impression as if the data is transmitted through private connection. This paper provides a survey report on VPN security and its technologies.

  15. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  16. Cyber Security Evaluation of II&C Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  17. Security Management System for Oilfield Based on GSM Technology

    Directory of Open Access Journals (Sweden)

    Batchu Spandana,

    2011-06-01

    Full Text Available Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for the oil thefting, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical task for the security people. To improve the security level by implantation of wireless embedded technology will solve this problem. By reducing the manual power, at the site locations, and by improving the security level with the help of GSM based wireless technology which consist of transmitter (GSM modem at the site location and receiver is the GSM mobile. Information transmitted by the GSM modem at the plant location will be sent to the respective person’s mobile as a text message. The security people will take appropriate action according to the problem. For this we are used LPC2148 (ARM7 based microcontroller, which is the current dominant microcontroller in mobile based products and Softwaredevelopment tools as Keil, flash magic for loading hex file into the microcontroller.

  18. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  19. PERSEUS Technology: New Trends in Information and Communication Security

    CERN Document Server

    Filiol, Eric

    2011-01-01

    Using cryptography to protect information and communication has bacically two major drawbacks. First, the specific entropy profile of encrypted data makes their detection very easy. Second, the use of cryptography can be more or less regulated, not to say forbidden, according to the countries. If the right to freely protect our personal and private data is a fundamental right, it must not hinder the action of Nation States with respect to National security. Allowing encryption to citizens holds for bad guys as well. In this paper we propose a new approach in information and communication security that may solve all these issues, thus representing a rather interesting trade-off between apparently opposite security needs. We introduce the concept of scalable security based on computationnally hard problem of coding theory with the PERSEUS technology. The core idea is to encode date with variable punctured convolutional codes in such a way that any cryptanalytic attempt will require a time-consuming encoder reco...

  20. Security technologies and protocols for Asynchronous Transfer Mode networks

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.

    1996-06-01

    Asynchronous Transfer Mode (ATM) is a new data communications technology that promises to integrate voice, video, and data traffic into a common network infrastructure. In order to fully utilize ATM`s ability to transfer real-time data at high rates, applications will start to access the ATM layer directly. As a result of this trend, security mechanisms at the ATM layer will be required. A number of research programs are currently in progress which seek to better understand the unique issues associated with ATM security. This paper describes some of these issues, and the approaches taken by various organizations in the design of ATM layer security mechanisms. Efforts within the ATM Forum to address the user communities need for ATM security are also described.

  1. Systems and technologies for enhanced coastal maritime security

    Science.gov (United States)

    Carapezza, Edward M.; Bucklin, Ann

    2008-04-01

    This paper describes a design for an innovative command and control system for an intelligent coastal maritime security system. The architecture for this intelligent coastal maritime security system is derived from the forth generation real-time control (RCS) system architecture1 developed by the National Institute of Science and Technology (NIST) over the past twenty years. This command and control system is a decision support system for real-time monitoring, response and training for security scenarios that can be hosted at various locations along the coast of the United States where homeland security surveillance and response activities are required. Additionally, this paper describes the design for a derivative real-time simulation based environment that can be used as a state-of-art test bed for developing new hardware and software components to be integrated into previous versions of deployed real-time control systems.

  2. Report of the Defense Science Board Task Force on Defense Science and Technology Base for the 21st Century

    Science.gov (United States)

    2016-06-07

    equations are likely to be non- linear , the standard-matrix algebra -solution approach will probably not be applicable. Instead, an iterative optimization...and ultimately combat outcome. The depiction makes the problem seem fairly simple and linear . There is a flow from the technology base through...observation is that industry does not manage its research and development process in a linear fashion as does the Department of Defense. By linear , it is

  3. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  4. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  5. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  6. National Security and Information Technology: The New Regulatory Option?

    Science.gov (United States)

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  7. Information Security / 2002 Command & Control Research & Technology Symposium

    OpenAIRE

    Buddenberg, Rex

    2002-01-01

    Approved for public display, distribution unlimited 2002 Command & Control Research & Technology Symposium, Naval Postgraduate School, Code IS/Bu, Monterey,CA,93943 Security in information systems is a complex problem. Single solutions to complex problems don't exist and matching the appropriate solution (or more accurately, a set of solutions) to a requirement is necessary.

  8. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  9. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  10. Microbial Monitoring from the Frontlines to Space: Department of Defense Small Business Innovation Research Technology Aboard the International Space Station

    Science.gov (United States)

    Oubre, Cherie M.; Khodadad, Christina L.; Castro, Victoria A.; Ott, C. Mark; Flint, Stephanie; Pollack, Lawrence P.; Roman, Monserrate C.

    2017-01-01

    The RAZOR (trademark) EX, a quantitative Polymerase Chain Reaction (qPCR) instrument, is a portable, ruggedized unit that was designed for the Department of Defense (DoD) with its reagent chemistries traceable to a Small Business Innovation Research (SBIR) contract beginning in 2002. The PCR instrument's primary function post 9/11 was to enable frontline soldiers and first responders to detect biological threat agents and bioterrorism activities in remote locations to include field environments. With its success for DoD, the instrument has also been employed by other governmental agencies including Department of Homeland Security (DHS). The RAZOR (Trademark) EX underwent stringent testing by the vendor, as well as through the DoD, and was certified in 2005. In addition, the RAZOR (trademark) EX passed DHS security sponsored Stakeholder Panel on Agent Detection Assays (SPADA) rigorous evaluation in 2011. The identification and quantitation of microbial pathogens is necessary both on the ground as well as during spaceflight to maintain the health of astronauts and to prevent biofouling of equipment. Currently, culture-based monitoring technology has been adequate for short-term spaceflight missions but may not be robust enough to meet the requirements for long-duration missions. During a NASA-sponsored workshop in 2011, it was determined that the more traditional culture-based method should be replaced or supplemented with more robust technologies. NASA scientists began investigating innovative molecular technologies for future space exploration and as a result, PCR was recommended. Shortly after, NASA sponsored market research in 2012 to identify and review current, commercial, cutting edge PCR technologies for potential applicability to spaceflight operations. Scientists identified and extensively evaluated three candidate technologies with the potential to function in microgravity. After a thorough voice-of-the-customer trade study and extensive functional and

  11. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  12. Airborne megawatt class free-electron laser for defense and security

    Energy Technology Data Exchange (ETDEWEB)

    Roy Whitney; David Douglas; George Neil

    2005-03-01

    An airborne megawatt (MW) average power Free-Electron Laser (FEL) is now a possibility. In the process of shrinking the FEL parameters to fit on ship, a surprisingly lightweight and compact design has been achieved. There are multiple motivations for using a FEL for a high-power airborne system for Defense and Security: Diverse mission requirements can be met by a single system. The MW of light can be made available with any time structure for time periods from microseconds to hours, i.e. there is a nearly unlimited magazine. The wavelength of the light can be chosen to be from the far infrared (IR) to the near ultraviolet (UV) thereby best meeting mission requirements. The FEL light can be modulated for detecting the same pattern in the small fraction of light reflected from the target resulting in greatly enhanced targeting control. The entire MW class FEL including all of its subsystems can be carried by large commercial size airplanes or on an airship. Adequate electrical power can be generated on the plane or airship to run the FEL as long as the plane or airship has fuel to fly. The light from the FEL will work well with relay mirror systems. The required R&D to achieve the MW level is well understood. The coupling of the capabilities of an airborne FEL to diverse mission requirements provides unique opportunities.

  13. Spectroelectrochemistry as a Strategy for Improving Selectivity of Sensors for Security and Defense Applications

    Energy Technology Data Exchange (ETDEWEB)

    Heineman, William R.; Seliskar, Carl J.; Morris, Laura K.; Bryan, Samuel A.

    2012-12-19

    Spectroelectrochemistry provides improved selectivity for sensors by electrochemically modulating the optical signal associated with the analyte. The sensor consists of an optically transparent electrode (OTE) coated with a film that preconcentrates the target analyte. The OTE functions as an optical waveguide for attenuated total reflectance (ATR) spectroscopy, which detects the analyte by absorption. Alternatively, the OTE can serve as the excitation light for fluorescence detection, which is generally more sensitive than absorption. The analyte partitions into the film, undergoes an electrochemical redox reaction at the OTE surface, and absorbs or emits light in its oxidized or reduced state. The change in the optical response associated with electrochemical oxidation or reduction at the OTE is used to quantify the analyte. Absorption sensors for metal ion complexes such as [Fe(CN)6]4- and [Ru(bpy)3]2+ and fluorescence sensors for [Ru(bpy)3]2+ and the polycyclic aromatic hydrocarbon 1-hydroxypyrene have been developed. The sensor concept has been extended to binding assays for a protein using avidin–biotin and 17β-estradiol–anti-estradiol antibodies. The sensor has been demonstrated to measure metal complexes in complex samples such as nuclear waste and natural water. This sensor has qualities needed for security and defense applications that require a high level of selectivity and good detection limits for target analytes in complex samples. Quickly monitoring and designating intent of a nuclear program by measuring the Ru/Tc fission product ratio is such an application.

  14. Biofuels. Environment, technology and food security

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J. [NEST - Excellence Group in Thermal Power and Distributed Generation, Mechanical Engineering Institute, Universidade Federal de Itajuba (Brazil); Yanez, Edgar E. [CENIPALMA, Oil Palm Research Center - Cenipalma, Calle 21 42-C-47, Bogota (Colombia); Castillo, Edgar F. [CENICANA - Sugarcane Research Center of Colombia, Calle 58 N, 3BN-110, A.A., 9138 - Cali (Colombia); Almazan, Oscar [ICIDCA - Instituto Cubano de Investigaciones de los Derivados de la Cana de Azucar, Via Blanca y Carretera Central 804, San Miguel del Padron, A.P. 4036, La Habana (Cuba)

    2009-08-15

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  15. Developing an Assessment, Monitoring, and Evaluation Framework for U.S. Department of Defense Security Cooperation

    Science.gov (United States)

    2016-09-01

    48 3.3. MoDA AME Process...evaluation MACOM major command MCC Millennium Challenge Corporation MoDA Ministry of Defense Advisors MfR Managing for Results MOE measure of effectiveness...Minis- try of Defense Advisors ( MoDA ) program, and the Defense Education Enhancement Program (DEEP).8 The DIB AME process, though con- 7 See Perry et

  16. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and Technology Directorate, DHS..., 56662-56663 that the Homeland Security Science and Technology Advisory Committee (HSSTAC) would meet on... will be held at the Department of Homeland Security (DHS), Science and Technology Directorate, 1120...

  17. Enabling National Security Through Dual-Use Technology

    Science.gov (United States)

    2014-04-30

    efforts. Kratz leads Lockheed Martin’s Automatic Identification Technology implementation, including RFID and UID. After successfully completing eight...bäÉîÉåíÜ=^ååì~ä=^Åèìáëáíáçå= oÉëÉ~êÅÜ=póãéçëáìã= qÜìêëÇ~ó=pÉëëáçåë= sçäìãÉ=ff= = Enabling National Security Through Dual-Use Technology Lou Kratz...Security Through Dual-Use Technology 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER

  18. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  19. Challenges at the Intersection of Energy, Economy, Environment, & Security and the Role of the Defense Sector in Addressing Them

    Science.gov (United States)

    2011-11-29

    to what’s been normal over the millennia. • Human activity – above all fossil-fuel burning and tropical deforestation – is the main reason. • The...1.3 Germany 82 2.9 14 83% 0.8 Defense-sector issues around energy and climate change • US oil dependence and greenhouse -gas-driven...international tensions, increasing chance of conflict • types of missions security forces must perform • effectiveness of troops & equipment in combat

  20. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  1. A Network Security and Defense Program Based on Ad Hoc%一种基于Ad Hoc的网络安全防御方案

    Institute of Scientific and Technical Information of China (English)

    黄成兵; 陈明东

    2012-01-01

    Analying of Wireless Ad Hoc networks play an important role in society, and its facing a variety of security threats, this paper discusses the advantages and limitations of various network security solutions and technologies for wireless Ad Hoc networks , proposes an in-depth security defense program and explains its implementation process, while points out some of the problems of wireless Ad Hoc networks need to be resolved in the security field.%分析无线Ad Hoc网络在社会中发挥的重要作用及其面临的多种安全威胁,讨论目前各种网络安全解决方案和技术的优点及局限性,提出一种针对无线Ad Hoc网络的纵深安全防御方案并阐述其执行过程,同时指出无线Ad Hoc网络在安全领域急需解决的一些问题.

  2. 云计算面临的安全问题及防御策略%Security issues and defense strategies of cloud computing

    Institute of Scientific and Technical Information of China (English)

    贾佳

    2015-01-01

    近年来,云计算技术的应用越来越广泛,如何构建安全的云计算环境已成为当前信息技术学科研究的问题之一。通过深入分析云计算环境下的各种安全问题,从IaaS、PaaS、SaaS 3种业务层面提出了安全防御策略,同时从管理层面提出了完善安全管理制度的建议。%In recent years, the application of cloud computing technology is becoming more and more extensive. How to build a secure cloud computing environment has become one of the problems in the current research of information technology.Through in-depth analysis of various security issues in cloud computing environment,it puts forward a security defense strategy from IaaS, PaaS, SaaS three service levels, and puts forward suggestions for improving the safety management system from the management level.

  3. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting...

  4. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY: The Secretary of Homeland Security has determined that...

  5. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION... Homeland Security has determined that the renewal of the charter of the Homeland Security Science...

  6. 计算机网络安全技术%Security Technologies of Computer Network

    Institute of Scientific and Technical Information of China (English)

    罗明宇; 卢锡城; 卢泽新; 韩亚欣

    2000-01-01

    With the development of computer network,requirements of computer network security have been more and more urgent. In tills paper, goals of network security are reviewed. Several network attack methods,such as interruption,interception, modification, fabrication,are studied. Network security technologies,such as security mechan!sm,encryption,security detection,firewall,were discussed.

  7. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  8. Value Proposition of Department of Defense Domestic Technology Transfer

    Science.gov (United States)

    2010-01-15

    Systems Center, Pacific Aplus Mobile, Inc., Oregon City, OR CRADA On-Hold Demonstration of Low-Cost Expendable Bottom Crawling Vehicles Naval...Circuits Defense Microelectronics Activity Packet Digital Corporation, Fargo, ND CRADA On-Hold Preventing Severe Infections in Infants and Children...Health Sciences Bard Access Systems, Lake City, UT PLA Preventing Severe Infections in Infants and Children Uniformed Services University of the

  9. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  10. XSS攻击机制及防御技术浅谈%Discussion on XSS attack mechanism and defense technology

    Institute of Scientific and Technical Information of China (English)

    葛强; 李俊; 胡永权

    2016-01-01

    跨站脚本攻击(XSS)是客户端Web安全的主要威胁。因跨站脚本攻击的多样性以及Web安全漏洞的隐蔽性,使得该类型的攻击很难彻底防御。介绍了跨站脚本攻击的基本概念,针对不同环境发生的跨站脚本攻击机制进行了分析,探讨了不同环境下如何防御跨站脚本攻击的具体技术。%Cross site scripting (XSS) attack is a major threat to the security of Web client. Because of the diversity of XSS attacks and Web security vulnerabilities hidden, this type of attack is very difficult to completely defense. This paper introduces the basic concept of XSS attacks, analyzes the XSS attack mechanisms of different environment, and discusses the specific technology to defense the XSS attacks of different environment.

  11. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... SECURITY Coast Guard Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast... technology to meet certain provisions of the Cruise Vessel Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection technologies. The Notice of request for...

  12. Research on Industrial Control System Security Defense%工业控制系统信息安全防护研究

    Institute of Scientific and Technical Information of China (English)

    王昱镔; 陈思; 程楠

    2016-01-01

    Information security situation of industrial control system is grim and cannot be ignored which produces serious threat to social stability and national security. The information security of industrial control system is different from the traditional information security, and the traditional information security is usually not applicable to the field of industrial control system information security. This paper analyzes the characteristics of industrial control system, expounds the current information security situation of industrial control system by analyzing the report produced by the industrial control systems cyber emergency response team of the USA, and puts forward a model of industrial control system security defense which contains the industrial control system security protection system, key technologies and safety life cycle. The research production of security protection system can guide key technologies research and safety life cycle building. The research production of key technologies can be converted into special safety protection products in all stages of the safety life cycle, and provides the corresponding technologies and tools though all stages of the safety life cycle. The model can provide technology and management support for the ifeld of industrial control system information security.%工业控制系统信息安全形势严峻,严重威胁社会稳定和国家安全,不容忽视。工业控制系统信息安全有别于传统信息安全,传统信息安全保障方式经常不适用于工业控制系统信息安全领域。文章研究了工业控制系统的特点,通过分析美国工业控制系统网络应急响应小组的报告,阐述了工业控制系统当前的安全形势,提出了由工业控制系统安全防护体系、关键技术及安全生命周期等部分组成的工业控制系统信息安全防护模型。该模型中安全防护体系的研究成果可指导关键技术研究及安全生命周期建设,

  13. SDI (Strategic Defense Initiative) Technology, Survivability and Software.

    Science.gov (United States)

    2007-11-02

    deploy This section addresses strategic uefense genetically —i.e., goals for defense against all means of delivering nuclear weap- ons, not just...34 --■■v■""• o■ ’-j-:o-;.•:/:■ ’■,--i\\’’ •e.ry^vY.’.v’y-’ ftd » 6-1. Number of Space-Based Interceptors Launched Into Space .. ,y.V.,171 6-2. Number of...times." Each make and model of computer has a unique set of instructions in which it must be pro- grammed, genetically known as machine in- structions

  14. Closing the Cyber Gap: Integrating Cross-Government Cyber Capabilities to Support the DHS Cyber Security Mission

    Science.gov (United States)

    2014-12-01

    40 John Rollins and Anna Henning , Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations (CRS Report No...enhance our security posture .107 Pal and Golubchik argue that, if the cost of defensive security measures...defensive technology provides a measure of security that is far from comprehensive. A purely defensive posture allows attackers unlimited time to

  15. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  16. Department of Defense Space Science and Technology Strategy 2015

    Science.gov (United States)

    2015-01-01

    using both GPS navigation and Iridium communication satellite signals. GPS- Iridium Anti-Jam (AJ) Antenna Systems for Air and Sea Platforms SPAWAR... satellite was launched in 2014. ANGELS hosts a sensor payload to evaluate techniques for detection, tracking and characterization of space objects...that supports U.S. national security; and prepare to defeat attacks and to operate in a degraded environment. A robust and comprehensive space S&T

  17. 76 FR 52133 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Science.gov (United States)

    2011-08-19

    ... Acquisition Regulation Supplement; Contractors Performing Private Security Functions (DFARS Case 2011-D023..., equipping, and conduct of personnel performing private security functions. DATES: Effective Date: August 19.... 110-181, enacted October 28, 2008), section 862, entitled ``Contractors Performing Private...

  18. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    Robotics: The Key to Immediate Assessment & Response to Hazardous Situations, Mr. Alan Bignall, CEO, ReconRobotics Using Modeling and Simulation for...Corporation 9:20 am Reconnaissance Robotics: The Key to Immediate Assessment & Response to Hazardous Situations • Mr. Alan Bignall, CEO...Department of Employment and Economic Development 3:25 pm Prevention of Terrorism & Industry’s Role • Mr. Sam Brinkley , Vice

  19. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    Directory of Open Access Journals (Sweden)

    Mustafijur Rahman

    2015-03-01

    Full Text Available "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detection and lock system etc. Furthermore it has advanced security compared to other houses and can send a message to the user for action that occur inside his/her house while he/she is away from home. It can also allow a person to control appliances from a remote location by mobile phone using GSM technology.

  20. An Assessment of Contractor Personnel Security Clearance Processes in the Four Defense Intelligence Agencies

    Science.gov (United States)

    2014-04-14

    298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 INTEGRITY* EFFIC IENCY* ACCOUNTABILITY* EXCELLENCE Mission Our mission is to provide independent...Department of Energy (DoE) from 2011-2012. DoE told us it was aware of the NRO IG report of investigation at the time it made its favorable adjudicative... Energy DoD Department of Defense DODCAF DoD Consolidated Adjudication Facility DoDD Department of Defense Directive DoD I Department of Defense

  1. A Common European Security and Defense Policy in the European Union: Greek Policy and Strategy on ESDP

    Science.gov (United States)

    2003-06-01

    create such an empire, and an army for all of Europe. That leader was Charlemagne , or Charles the Great, King of the Franks and Emperor of the Holy...army responsible for the security and defense of all Europe. Charles, King of the Franks, known as Charlemagne , who became the supreme ruler of...Western Europe when crowned Emperor on Christmas Day in the year 800 AD,3 rose from such a power vacuum and the lack of such an army after the fall of

  2. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ... Bureau of Industry and Security Proposed Information Collection; Comment Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau of Industry and Security... of U.S. industrial base sectors deemed critical to U.S. national security. The information gathered...

  3. Review of the National Defense Intelligence College's Master's Degree in Science and Technology Intelligence

    Science.gov (United States)

    National Academies Press, 2011

    2011-01-01

    The National Research Council (NRC) was asked by the National Defense Intelligence College (NDIC) to convene a committee to review the curriculum and syllabi for their proposed master of science degree in science and technology intelligence. The NRC was asked to review the material provided by the NDIC and offer advice and recommendations…

  4. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  5. Building Partner Capacity: Inventory of Department of Defense Security Cooperation and Department of State Security Assistance Efforts

    Science.gov (United States)

    2017-03-24

    receive exposure to U.S. undergraduate education in a military environment. 10 U.S.C. § 4345, Exchange program with foreign military academies 10...conferences or workshops; personnel exchanges (e.g., embedding advisors into foreign military and security ministries); needs or capability assessments...capabilities. 10 U.S.C. § 2114, Students: selection; status; obligation 25. Foreign Service/Military Academy Semester Abroad Exchanges

  6. Security Cooperation: Comparison of Proposed Provisions for the FY2017 National Defense Authorization Act (NDAA)

    Science.gov (United States)

    2016-11-01

    Committee’s (SASC’s) markup of the FY2017 NDAA, from which the security cooperation proposals of S. 2943 originate, explained its purpose and...Act for Fiscal Year 2017, markup summary, May 12, 2016. Security Cooperation: Provisions in the FY2017 NDAA Congressional Research Service 5

  7. The reformulation of emotional security theory: the role of children's social defense in developmental psychopathology.

    Science.gov (United States)

    Davies, Patrick T; Martin, Meredith J

    2013-11-01

    Although children's security in the context of the interparental relationship has been identified as a key explanatory mechanism in pathways between family discord and child psychopathology, little is known about the inner workings of emotional security as a goal system. Thus, the objective of this paper is to describe how our reformulation of emotional security theory within an ethological and evolutionary framework may advance the characterization of the architecture and operation of emotional security and, in the process, cultivate sustainable growing points in developmental psychopathology. The first section of the paper describes how children's security in the interparental relationship is organized around a distinctive behavioral system designed to defend against interpersonal threat. Building on this evolutionary foundation for emotional security, the paper offers an innovative taxonomy for identifying qualitatively different ways children try to preserve their security and its innovative implications for more precisely informing understanding of the mechanisms in pathways between family and developmental precursors and children's trajectories of mental health. In the final section, the paper highlights the potential of the reformulation of emotional security theory to stimulate new generations of research on understanding how children defend against social threats in ecologies beyond the interparental dyad, including both familial and extrafamilial settings.

  8. Building Partner Capacity: Key Practices to Effectively Manage Department of Defense Efforts to Promote Security Cooperation

    Science.gov (United States)

    2013-02-14

    and poverty that impact the security and stability of the region. In recent years, in an effort to better support security and stability in the... Ecuador , Peru, and Venezuela. However, during our 2012 review, we found that the DOD Inspector General cited a number of reasons for not

  9. SDI (Strategic Defense Initiative) Software Technology Program Plan

    Science.gov (United States)

    1987-06-01

    Computing Initiative program under Simpson and Sears . Industrial research labs are studying fundamental issues of the man-machine interface to formulate...Reform," The Brookings Review, Summer 1986, pp. 11-16. [Maidique 80] Maidique, Modesto , "Entrepreneurs, Champions, and % Technological Innovation...Management Tasks Area," from Computer t. Special Issue on STARS Program, (November 1983), pp. 56-62. [Maidique 80] Maidique, Modesto A., "Entrepreneurs

  10. Hypermedia Laboratory, Defense Applied Information Technology Center; Review for 1988

    Science.gov (United States)

    1988-12-01

    des images. La proliferation des reseatix publics et prives et des services de messagerie oti courrier electronique utilisant de larges bandes et des...technologies tres fiables permer de transporter du texte integral et de proceder a des transferts eLectroniques de documents la oti pour l’instant on...des reseaux de coumrer electronique (comme Infotap et Geomail), et des possibilites de transferts rapides entre collections archivees sur disques et

  11. Evaluating Security Technologies Used to Enhance Physical Security Capabilities at Domestic and Deployed Bases

    Science.gov (United States)

    2013-07-01

    secure wireless communications, behavioral analysis , and installation access control 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...Secure Wireless Communications  Installation Access Control  Integrated Waterside Security  Behavioral Analysis , and  Other areas as prescribed...Wireless Communications  Installation Access Control  Situational Awareness  Behavioral Analysis  Integrated Waterside Security, and  Other areas

  12. 基于多角度网络环境的网站安全防御系统分析%Web-based Multi-angle Analysis of Security and Defense Systems Network Environment

    Institute of Scientific and Technical Information of China (English)

    秦久明

    2015-01-01

    With the popularization and development of modern computer network technology, the security and stability of the net-work operating environment is getting more and more attention. The network has a high degree of freedom and openness in the process of its operation will be faced with a variety of security risks, network environment is damaged, from the current network environment of the site security defense system construction, and can not be completely effective solution to the network envi-ronment, need to build a multi angle network environment of website security defense system, the full range of multi angle on the site to run the security of the site, this article from the current status of security defense.%随着现代计算机网络技术的普及和发展,网络运行环境的安全性和稳定性越来越受到人们的关注.网络所具有的高度自由和开放使得在其运行的过程中会面临到多种多样的安全风险,网络环境受到破坏,从当前网络环境的网站安全防御系统建设来看,并不能完全的有效解决网络环境网站的安全问题,需要在新形势下,建立一个多角度网络环境的网站安全防御系统,全方位多角度的对网站运行起到安全保护作用,据此,该文从当前网站安全防御的现状入手,研究构建了一个多角度综合化的网站安全防御系统.

  13. From Sputnik to Minerva: Education and American National Security (Defense Horizons, Number 65, January 2009

    Science.gov (United States)

    2009-01-01

    programs concentrated on only a dozen (mostly European) lan- guages. He observed that “more college students currently stud- ied Ancient Greek (20,858...background checks difficult.14 The Department of Defense was forced under existing U.S. law to fire homosexual linguists and translators. Yet by 2006

  14. Department of Everything: Department of Defense Spending That Has Little to Do With National Security

    Science.gov (United States)

    2012-11-01

    the Exact Same Research A researcher who plagiarized a grant proposal and progress report received funding from the Defense Advanced Research...either the Air Force or NSF award. DARPA also approved funding for the project. All three proposals contained the same significant plagiarism ”31...individuals or provide military required training that may be available from an academic institution

  15. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  16. Based on combination of L2TP and IPSec VPN security technology research

    Directory of Open Access Journals (Sweden)

    Ya-qin Fan

    2012-01-01

    Full Text Available This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data transmission, and the simulation results of VPN is valuable for security professionals to refer.

  17. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007)...

  18. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be...

  19. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan...

  20. World society and the transformation of national defense: exploring world cultural impact on security and military

    OpenAIRE

    2009-01-01

    In this paper, I explore the applicability of sociological institutionalism for the analysis of security and the military. Based on cross-sectional data from 50 countries, I show how values linked to the nation state and security are related to world cultural ideas and the diffusion of rationalized organizational models. Such linkage could explain the transformation of the military as a common and worldwide trend, being based on political and societal preconditions that converge across countr...

  1. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  2. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  3. Research on Network Security Technology%关于网络安全技术的探讨

    Institute of Scientific and Technical Information of China (English)

    曾照华; 王晓霞

    2013-01-01

    In this paper,from two aspects of network attack anddefense of the existing network security technologies areintroduced,the main means of network attacksand the corresponding defense measures are discussed,the network protocol security,firewall,encryption,transmission process invade to examine the technique principle of these four kinds of network defense are given,so as to solve some problems the existing network security.%从网络攻击和网络防御两个方面针对现有网络安全技术进行了探讨,讨论了网络攻击的主要手段和相应的防御措施,给出了网络协议安全、传输过程加密、防火墙、入侵检测技术这4种网络防御手段的原理,从而解决了现有网络安全面临的一些问题。

  4. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  5. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source.

  6. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  7. A tracking technology for security personnel and first responders

    Science.gov (United States)

    Womble, Phillip; Barzilov, Alexander; Paschal, Jon; Hopper, Lindsay; Music, Abe; Morgan, Timothy; Moore, Ryan; Pinson, Dudley; Schultz, Frederick; Maston, Michael J.; Kowalik, Robert

    2005-05-01

    Northwest Nuclear, LLC (NWN), the Applied Physics Institute (API) at Western Kentucky University, and Crisis Prep Services, LLC (CPS) have developed a tracking technology for first responders and security personnel based upon the AeroScout system (a product of AeroScout, Inc.) and technologies developed independently by NWN, API, and CPS. These systems provide location information using 802.11XXX architecture by measuring the time of arrival of packets from a set of active radio frequency (RF) tags to a set of location receivers. The system can track and graphically display the location on maps, drawings, floor plans or photographs of tagged items on any 802.11-compliant devices (PDAs, laptops, computers, WiFi telephones) situated both outside and inside structures. This location information would be vital for tracking the location of first responders, security, and other emergency personnel during rescue operations; particularly, under adverse conditions (e.g., fires). NWN, API, and CPS have been improving the precision of the location measurement to an uncertainty of 20 cm or 8 inches (under certain conditions) and also developing algorithms to increase the accuracy. NWN and API personnel have developed: 1) special tags which indicate tampering or sudden movement and transmit briefly under these conditions, and 2) permanent and portable systems which can be deployed rapidly. Additional software created by Crisis Prep Services, LLC allows response force personnel to be tracked and located inside a building in real time as well as use the software and tags as a training and rehersal system. The location of each person is depicted on a drawing of the building and is displayed on a laptop computer or any other browser capable device.

  8. Defense Security Enterprise Architecture (DSEA) Product Reference Guide. Revision 1.0

    Science.gov (United States)

    2016-06-01

    benefits of cross-department vetting. In the use case. a U.S. military service member...users can add external data sources to their view in common web service formats (KML, KMZ, WMS , and GeoRSS). Other capabilities within OneView include...USNORTHCOM and active participation from DSEA on use case development • Examining the benefits of information sharing between the defense

  9. Security Assistance and Cooperation: Shared Responsibility of the Departments of State and Defense

    Science.gov (United States)

    2016-04-04

    MODA Section 1081, P.L. 112-81 (3)) Provides management, training, and other support Yes Wales (formerly Warsaw) Initiative Fund (Activities...Initially designed for Afghanistan, the Ministry of Defense Advisors Program ( MODA ) was established as a global authority by the FY2012 NDAA (P.L...112-81, Section 1081, as amended). MODA enables senior DOD civilian experts to advise their counterparts abroad on matters such as personnel and

  10. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  11. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  12. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  13. Disability Compensation: Review of Concurrent Receipt of Department of Defense Retirement, Department of Veterans Affairs Disability Compensation, and Social Security Disability Insurance

    Science.gov (United States)

    2014-09-30

    Page 1 GAO-14-854R Disability Compensation 441 G St. N.W. Washington, DC 20548 September 30, 2014 The Honorable Tom Coburn, M.D. Ranking...Member Committee on Homeland Security and Governmental Affairs United States Senate Disability Compensation: Review of Concurrent Receipt of...Department of Defense Retirement, Department of Veterans Affairs Disability Compensation, and Social Security Disability Insurance Dear Dr. Coburn: The

  14. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  15. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  16. Impact of the Defense Critical Technologies Plan on Weapon Systems Test and Evaluation

    Science.gov (United States)

    1990-12-01

    middle of the 1980’s several factors led to the realization that DoD’s T&E capabilities were approaching a crisis situation. These factors included...techologies most critica to saing the long-term quai.- tative superiority of United States wampon syvtme. The number of such technologie identified in any...United States, The Defense Technology Base, Introduction and Overview, U.S. Government Printing Office, March 1988. Pastine, John, D. Dr., "A Crisis

  17. Maritime Defense and Security Research Program: Final Report, 2004-2011

    Science.gov (United States)

    2011-11-01

    Major Vida Beard and Major Brian McCullough, both from the National Security Affairs Department in the NPS School of International Graduate Studies...experiments: NPS SPAWAR Systems Center Pacific, San Diego USCG District 11, Yerba Buena CA San Francisco State University (SFSU) – Romberg

  18. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology (IT) resources....

  19. The National Security Strategy and Transformation of the Hungarian Defense Forces

    Science.gov (United States)

    2007-11-02

    WORD COUNT=6579 16 17 ENDNOTES 1 Ferenc Juhasz Minister of Defense “Interview”; 26 July 2002; available from <http://www.honvedelem.hu/cikk.php?cikk...10263&next=110&archiv =1&next=110 Internet>; Internet; accessed 15 October 2004. 2 “Speech” by Dr. Janos Martonyi, Minister of Foreign Affairs of the...available from <http://www.nato.int/ docu/speech/1999/ s990312c.htm>; Internet; accessed 23 November 2004. Hereafter referred to as Speech by Dr. Janos

  20. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  1. Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security

    Science.gov (United States)

    2012-12-01

    economic recession (the Obama administration committed $110 billion to the car industry , the federal Troubled Asset Relief Program, established to prop...for the growth of industry that generates savings that can be reapplied into society.58 What does economic security really mean? Simply having...hollow out the military force and leave the nation vulnerable to future attacks, in essence, a hollow chocolate Easter Bunny—although it looks big and is

  2. Secure Information Sharing in a Defense Support to Civil Authorities Environment

    Science.gov (United States)

    2009-03-12

    Controlled Information (CUI), however CUI is not in general usage yet. 4 John Elting , Swords Around a Throne (London, Collier MacMillan Publishers 1988...Research shows Cyber Attack Could cost US 50 times more than Katrina”, Market Wire, July 2007 Available at http://findarticles.com/p/ articles /mi_pwwi... articles /2002/03/03/IT-security-calls-for-collaboration.aspx Accessed on 7 February 2009. 21 organization. This team of 10 – 12 soldiers has the same

  3. Public Procurement of Security Technology : A multiple case study of Swedish municipalities and regions

    OpenAIRE

    Rolandsson, Rasmus

    2016-01-01

    Municipalities and regions in Sweden have an increasing need to purchase security technology to secure their properties and their operations. However this procurement process is strictly regulated by the Swedish procurement act (“Lagen om Offentlig Upphandling”, LoU), leading to a similar procurement process. However no academic studies have been done on the procurement of security technology in local authorities.This thesis explores and maps this process and the important aspects which affec...

  4. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  5. 一种基于蜜网的网络安全防御技术%Honeynet-based network security defense model

    Institute of Scientific and Technical Information of China (English)

    王铁方; 李云文; 叶宝生; 杨屹; 律原; 诸立尚

    2009-01-01

    Though honeynet, which is based on an active defense, has overcome some of the shortcomings of traditional techniques, invaders can still attack the inner and outer networks through Honeynet, so there are still many insecure factors in honeynet. This paper proposed an active defense technology based on honeynet. Using DMZ (demilitarized zone) and two firewalls to prevent the inner network from being invaded, and using NIDS(network intrusion detection system) and flow control to prevent the outer network from being attacked. By this means, solved many problems both in the traditional network security model and honeynet.%基于主动防御的蜜网技术虽然在一定程度上克服了传统安全模型被动防御的缺陷,但入侵者仍能通过蜜网对内部网络和外部网络进行攻击,造成蜜网本身也存在一定的不安全因素.为此提出了一种基于蜜网的网络安全防御技术--用DMZ(非武装区)和两层防火墙来防止内部网络被入侵;用NIDS(网络入侵检测系统)和流量控制的方法来防止外部网络被攻击,从而较好地解决了传统网络安全模型存在的一些缺陷.

  6. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  7. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  8. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Declassification by the Director of the Information Security Oversight Office. 2400.19 Section 2400.19 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY...

  9. Research on Framework Design of Industrial Control System for Cyber-Security Defenses%工业控制系统网络安全防护体系研究

    Institute of Scientific and Technical Information of China (English)

    陈亚亮; 杨海军; 姚钦锋; 戴沁芸

    2013-01-01

    文章在阐述工业控制系统(ICS)网络概念与特点的基础上,深入分析其安全威胁及脆弱性,提出运用“深度防御”思想,以ICS资产功能及重要性为安全域划分依据,从技术与管理两个维度设计适用于ICS的网络安全防护体系。%Security threats and vulnerabilities are analyzed in depth in this paper, which is based on the network concept and the characteristic of the industrial control system (ICS). Subsequently, Framework design of industrial control system for cyber-security defenses is proposed by the use of“defense-in-depth”thought, combining with technology and management measures, separating the function and the importance of ICS asset into several security zones.

  10. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc... and accurate information concerning the securities of Security Intelligence Technologies, Inc. because...

  11. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  12. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  13. Advanced sensors, telecommunications and data processing: Technological spin-offs from the Strategic Defense Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.L.

    1986-10-01

    While the details of Nitze Criteria-satisfying architectures for defense against strategic attack with ballistic missiles are still being worked out, it is already clear that quite advanced sensors, telecommunications and data processing technologies will be features of all of them. It is concluded that the SDI, due to its institutional youthfulness, its charter for large-scale research and its self-evident need for such technologies, is likely to dominate many aspects of these technology development areas during the next two decades, especially if it continues more-or-less as the current American Administration contemplates. Both the technical and the economic aspects of data-gathering and manipulation seem likely to be substantially enhanced, due to the existence of the SDI.

  14. Lessons learned from U.S. Department of Defense 911-Bio Advanced Concept Technology Demonstrations.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T.; Gasper, W.; Lacher, L.; Newsom, D.; Yantosik, G.

    1999-07-06

    The US Department of Defense (DoD), in cooperation with other federal agencies, has taken many initiatives to improve its ability to support civilian response to a domestic biological terrorism incident. This paper discusses one initiative, the 911-Bio Advanced Concept Technology Demonstrations (ACTDs), conducted by the Office of the Secretary of Defense during 1997 to better understand: (1) the capability of newly developed chemical and biological collection and identification technologies in a field environment; (2) the ability of specialized DoD response teams to use these new technologies within the structure of cooperating DoD and civilian consequence management organizations; and (3) the adequacy of current modeling tools for predicting the dispersal of biological hazards. This paper discusses the experience of the ACTDs from the civilian community support perspective. The 911-Bio ACTD project provided a valuable opportunity for DoD and civilian officials to learn how they should use their combined capabilities to manage the aftermath of a domestic biological terrorism incident.

  15. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    Soils and food security. ... Whilst all these threats are important of particular significance is the loss of soil through ... A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after ...

  16. Research On the Computer Network Hacking Technology and Its Defense Technology%计算机网络中的黑客攻击技术及其防御技术研究

    Institute of Scientific and Technical Information of China (English)

    杨峰

    2013-01-01

    In modern society ,whether in learning or life ,with the development of computer science and technology ,com-puter network security risks exist more and more ,more and more network hacker attacks ,faster and faster ,especiallyhas a lot of damage national security or commercial confidentiality ,in view of this situation ,studying the hacker's network technology is the key to ensure network security ,has become the most important cash social security and defense .In this paper ,the analysis of a variety of computer network hacker attacks ,corresponding defense technology.%在现代社会,无论是在学习还是生活中,随着计算机科学技术的发展,计算机网络中存在的安全隐患越来越大,网络黑客的攻击活动方式越来越多、速度越来越快,特别是对国家安全或者商业机密上都有很大的破坏。研究防御黑客的网络技术是保证网络安全的关键,也是现今社会信息安全防御的重中之重。通过对各种计算机网络黑客的攻击手段的分析,提出了对应的防御技术。

  17. The Lessons of Coalition Politics. Sino-American Security Relations.

    Science.gov (United States)

    1984-02-01

    between the theory and practice of defense technology transfer all continued to impede the development of a more extensive security relationship. The...by Moscow. Second, China undertook these dealings (especially in the area of defense technology transfer ) to compensate for two decades of internal...that these sessions addressed defense technology transfer and intelligence cooperation. In a press conference following three days of deliberations

  18. T-dominance: Prioritized Defense Deployment for BYOD Security (Post Print)

    Science.gov (United States)

    2013-10-01

    infrastructure. Employees’ demand/ satisfaction , decreased IT acquisition and support cost, and increased use of cloud/virtualization technologies in...example, a report [8] on hijacking hotel Wi-Fi hotspots for drive-by malware attacks on laptops comes close to what we have in mind; practical man-in...obtaining unwarranted privilege, are often ignored for convenience, or circumvented for customization by the users. Rootkits, like iOS Jailbreak5, are

  19. System-on-chip-centric unattended embedded sensors in homeland security and defense applications

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin; Shih, Min-Yi; Walter, Kevin; Lee, Kang; Gans, Eric; Esterkin, Vladimir

    2009-05-01

    System-on-chip (SoC) single-die electronic integrated circuit (IC) integration has recently been attracting a great deal of attention, due to its high modularity, universality, and relatively low fabrication cost. The SoC also has low power consumption and it is naturally suited to being a base for integration of embedded sensors. Such sensors can run unattended, and can be either commercial off-the-shelf (COTS) electronic, COTS microelectromechanical systems (MEMS), or optical-COTS or produced in house (i.e., at Physical Optics Corporation, POC). In the version with the simplest electronic packaging, they can be integrated with low-power wireless RF that can communicate with a central processing unit (CPU) integrated in-house and installed on the specific platform of interest. Such a platform can be a human body (for e-clothing), unmanned aerial vehicle (UAV), unmanned ground vehicle (UGV), or many others. In this paper we discuss SoC-centric embedded unattended sensors in Homeland Security and military applications, including specific application scenarios (or CONOPS). In one specific example, we analyze an embedded polarization optical sensor produced in house, including generalized Lambertian light-emitting diode (LED) sources and secondary nonimaging optics (NIO).

  20. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on ho

  1. Survey of Security Technologies on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuwei Yang

    2015-01-01

    Full Text Available Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages and pointed out the future direction of the hot research field.

  2. Water harvesting technologies in ensuring food security: Lessons ...

    African Journals Online (AJOL)

    Mo

    One of the success stories in water development and food security in the pastoral and agro-pastoral areas of Somali ... hydroelectric power, live animals for export, and tourist ... of overgrazing, land degradation and conflicts between clans.

  3. 48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.

    Science.gov (United States)

    2010-10-01

    ... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information...

  4. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible...

  5. An Analysis of Bluetooth Technology,Features,Future and Security

    OpenAIRE

    Ullah, Malik Zaka

    2009-01-01

    In this thesis I present my analysis on various aspects of Bluetooth wireless technology. The Bluetooth technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application. Therefore during in this thesis I try to analysis the current status of this technology and issue which are related to this technology. The first section introduces Bluetooth technology, in which I discussed the architecture of Bluetooth and different terminolo...

  6. Adaptive security systems -- Combining expert systems with adaptive technologies

    Energy Technology Data Exchange (ETDEWEB)

    Argo, P.; Loveland, R.; Anderson, K. [and others

    1997-09-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  7. Reviews of computing technology: Securing network applications, Kerberos and RSA

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  8. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  9. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  10. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... COMMISSION Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys... Energy Corp. because it has not filed any periodic reports since the period ended December 31, 2006. It... concerning the securities of Biomedical Waste Systems, Inc. because it has not filed any periodic reports...

  11. 下一代防火墙:网络安全防范技术分析%The Next Generation Firewall:Network Security defending technology analysis

    Institute of Scientific and Technical Information of China (English)

    林鸿

    2012-01-01

    面对日趋复杂的应用控制和安全威胁,传统的网络安全防御架构已显力不从心。新一代的网关安全产品NGFW(下一代防火墙)是否能成为未来网络安全防范的新选择?下一代防火墙是什么样的安全产品,与传统安全产品有什么不同,可实现哪些安全功能并具有哪些技术特色,都值得我们加以讨论和分析。%Facing the increasingly complicated application control and security threats,the traditional defensive network security architecture has already showed its deficiency.Can the new generation of gateway security products NGFW(the Next Generation Firewall) be the new choice for future network security architecture? What kind of security product is the Next Generation Firewall,what are the differences between traditional security products and Next Generation Firewall,meanwhile what type of security function can it realize and what technological characteristics does it have,all these mentioned above do worth our discussion and analysis.

  12. Investigate the Computer Information Network Security Technology and the Development Direction

    OpenAIRE

    Ping Teng

    2017-01-01

    After China’s accession to the WTO, the computer information network security technology of our country has a rapid development, bring many conveniences for the people’s life and work, indirectly changing their daily life and working mode. For the whole development situation of our country, the development direction of informatization is the inevitable trend of development in our country, while the using process of computer information network security technology in the society still exist ma...

  13. Fortresses and Icebergs: The Evolution of the Transatlantic Defense Market and the Implications for U.S. National Security Policy. Volume 1: Study Findings and Recommendations

    Science.gov (United States)

    2009-01-01

    rationale and the roadmap for our engagement with Europe on defense markets in support of our mutual security objectives. Dr. Jacques S. Gansler Roger C...Acquired by Northrop through Litton Industries. Leading producer of military and space navigation systems. Northrop Grumman Sperry Marine GmbH...when it acquired Litton Industries. Its subsidiaries Northrop Grumman Italia, Northrop Grumman LITEF and Northrop Grumman Sperry Marine, are all

  14. THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

    2004-01-30

    The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

  15. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  16. An Analysis of Rapid Technology Transfer Solutions and Best Practices for Use by the Department of Defense

    OpenAIRE

    Holden, Dennis R.

    2010-01-01

    Approved for public release; distribution is unlimited The DoD is burdened by an Integrated Defense Acquisition, Technology, and Logistics Life Cycle Management System that is designed to acquire large systems, such as ships, and that takes years to complete. Information technology evolves at a rapid pace because it is driven by industry. The DoD acquisition system is therefore at odds with industry development, at least with respect to information technology. Acquisition of informatio...

  17. An assessment of Turkish Defense Industry and Turkey's efforts to transfer military technology: strategies for arming the future

    OpenAIRE

    2001-01-01

    The end of the cold war has created a safer environment for most nations and reduced the need for fielding huge armed forces and vast investments for defense. However, due to her very special strategic position and historical responsibilities, Turkey still faces a range of substantial threats to its national interests, physical security, economic well being. These threats require the maintenance of a broad set of military capabilities in order to deter, and if necessary, to fight and win any ...

  18. Design of Network Security Defense System Based on the TCP/IP Protocol%一种基于TCP/IP协议的网络安全防御系统设计

    Institute of Scientific and Technical Information of China (English)

    张辉

    2013-01-01

    This paper firstly described the structure and functions of each layer of the TCP / IP (Transmission Control Protocol/Internet Protocol)briefly, and analyzed and discussed the potential security risks of the protocol layers , Then designed a network security defense system model in the combination of active defense new technology, gave out the concrete realization physical structure, Finally discussed its features and benefits briefly.%  简要阐述了TCP/IP协议的结构及各层功能,分析讨论了各层协议自身潜在的安全性隐患,结合主动防御新技术,设计了一个网络安全防御系统模型,并给出了具体实现的物理结构,最后简要论述了该网络安全防御系统的特点和优越性。

  19. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... contractor shall include the following statement on deliveries of hardware, software, and data products... delivery of hardware, software, or data on diskettes under this contract. (d) This clause shall not limit... Virus Security. 2452.239-71 Section 2452.239-71 Federal Acquisition Regulations System DEPARTMENT...

  20. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  1. Semiconductor Technology and U.S. National Security

    Science.gov (United States)

    2010-04-21

    international community to a nation that ―is focused not on the world but on itself.Ŝ While China’s efforts to expand its economic and military strengths are...26, 2009) 39 Lieberman, 5. 40 Department of Commerce Home Page, http://www.osec.doc.gov/ omo /dmp/default. 41 Bureau of Industry and Security

  2. 软件定义网络安全技术研究%Research on Software Defined Network Security Technology

    Institute of Scientific and Technical Information of China (English)

    邵延峰; 贾哲

    2016-01-01

    With the rapid development of network scale and the diversification of network services,the original network structure is difficult to meet the needs of the future development.Software Defined Network (SDN) as a new technology realizes the separation of control plane and data plane,which can provide centralized network controll and the flexible traffic management. This will take place great changes in communication field.This paper firstly analyses the features of SDN architecture and the security threat;then gives a survey on the present development of SDN security;and finally propose the development orientation of SDN security technology including network dynamic defense,software defined monitoring,and security enforcement,which can reinforce the security of SDN,and enhance the dynamic arrangement of security resources.%随着网络规模的快速扩大及网络业务的多样化,原有的网络架构难以满足未来发展需要。软件定义网络( Software Defined Network, SDN)作为一种新兴技术,实现了控制面与数据面的解耦,能够提供网络的集中控制与流量的灵活调度,将引起通信领域的巨大变革。研究了SDN架构的特点及其面临的安全威胁;针对SDN安全技术研究现状进行了综述;从网络动态防御、软件定义监控和自身安全性增强3个方面提出了SDN安全技术的发展方向。在加强SDN自身安全性的同时提高了网络安全资源的动态调度能力。

  3. Sécurité, justice et technologies Security, Justice and Technologies

    Directory of Open Access Journals (Sweden)

    Jean-Charles Froment

    2011-10-01

    Full Text Available Les réflexions qui structurent cet article sont issues de près de quinze années d’observation du développement du recours aux nouvelles technologies de contrôle dans le champ de la justice et de la sécurité. Elles s’appuient plus spécifiquement sur l’étude de deux d’entre elles, principalement le placement sous surveillance électronique et accessoirement la vidéosurveillance, qui ont vu leur champ d’application s’élargir considérablement en l’espace d’une vingtaine d’années. De ces travaux se dégagent neuf clés de lecture à partir desquelles on peut analyser les caractéristiques et l’impact du développement de ces technologies (la vitesse de circulation des modèles ; le jeu du marché ; la question du contrôle ; les formes de la désinstitutionnalisation du pouvoir ; la problématique des libertés ; la plasticité des usages ; les stratégies de légitimation ; les enjeux de régulation ; l’insuffisance d’évaluation.This analysis is based over 15 years of investigation about new technologies in the field of justice and security, and more specifically about electronic monitoring and CCTV which have known a strong development for the last twenty years... From these reflections, Jean-Charles Froment introduces nine analysis keys about the characteristics and the impact of the development of this technologies (speed of policy transfer; rules of market; progressive change towards a «society of control»; power conversions; human rights; plasticity of uses; legitimacy strategies; regulation challenges; weakness of evaluation.

  4. Technology Security Policy: From the Cold War to the New World Order

    Science.gov (United States)

    1993-12-01

    Mitchel B. Wallerstein , "Controlling Dual-Use Technologies in the New World Order," Issues in &ience and Technology, Summer 1991, pp. 74-5 and Aaron Karp...Relations and Armed Services, letter to Anthony Lake, the Assistant to the President for National Security Affairs, August 6, 1993. Wallerstein , Mitchell

  5. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    areas. Advanced Computing and Communications The exponential growth of the digital economy, driven by ubiquitous computing and communication...technologies, holds tremendous potential for innovation, economic competitiveness , and national security. New and rapidly evolving technological...weapons- focused R&D, many of the capabilities being developed have significant dual-use potential. Digital connectivity, for instance, brings

  6. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information...

  7. Information technology convergence security, robotics, automations and communication

    CERN Document Server

    Barolli, Leonard; Xhafa, Fatos; Jeong, Hwa-Young

    2013-01-01

    Information technology and its convergence issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. This area will be the most comprehensive topics with various aspects of advances in information technology and its convergence services. This book covers all topics as computational science and applications, electronics engineering, manufacturing technology, services, technical skill to control the robot, automatic operation and application, simulation and testing communication and many more.

  8. Wearable Technology Devices Security and Privacy Vulnerability Analysis

    OpenAIRE

    Ke Wan Ching; Manmeet Mahinderjit Singh

    2016-01-01

    Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable tec...

  9. Survey of Collaboration Technologies in Multi-level Security Environments

    Science.gov (United States)

    2014-04-28

    Dickson. 1996. "Teams in Organizations: Recent Research on Performance and Effectiveness". Annual Review of Psychology , 47:307-338. [32] Hall, D.L... Psychology , 94, 2, 535-546. [48] Moore, J.A. (2002). JView: an information visualization paradigm. Proc. SPIE, Vol. 4716, 367-374. In Enabling...date. Multilevel security solutions like the Multi-Layer Access Solution were developed by Gestalt and MAXIM Systems before these companies became

  10. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A. H. M. Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  11. Secure quantum signatures: a practical quantum technology (Conference Presentation)

    Science.gov (United States)

    Andersson, Erika

    2016-10-01

    Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.

  12. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  13. 基于GEP的web服务器安全防护技术研究%Research of Web Server Security Technology Based on GEP

    Institute of Scientific and Technical Information of China (English)

    龙珑; 宁葵

    2011-01-01

    目前网络安全问题日益严重,由于互联网开放性和通信协议的安全缺陷等原因使web服务器面临着越来越多的安全威胁.基因表达式编程( GEP)融合了遗传算法和遗传编程的优点,基于GEP的web服务器安全防护技术开发小组将GEP人工智能技术引入到web服务器,建立了一个多层次的安全防御模型.利用GEP算法的动态学习功能不断地提高安全防御能力,基于GEP的web服务器安全防护技术小组最终目标就是希望把web服务器的安全性提升到一个较为理想的状态.%Nowadays there is a growing concern about the problem of internet security. As the internet and communication protocols open security holes and other reasons,web server is more and more confronted with security threats. Gene Expression Programming (GEP) combines genetic algorithms and genetic programming advantages, GEP artificial intelligence technology will be used for the web server to establish a multi-layered security defense model. Using dynanic learning function in GEP algorithm can improve the security and defense capabilities, the way can better improve the web server security.

  14. SQL注入攻击与防御技术研究%Research on SQL Injection Attack and Defense Technology

    Institute of Scientific and Technical Information of China (English)

    刘文生; 乐德广; 刘伟

    2015-01-01

    With the rapid development of computer network technology, the human is more and more reliance on the ubiquitous network, and a series of network security problem that make people pay more attention on it. At present, the SQL injection attack has become one of the primary means of hacking by hackers. This paper introduces the principle of SQL injection, depth study on the cause of SQL injection and actual combat encounter common SQL injection attack, proposed a new SQL injection detection techniques and tools to achieve in practice on the basis of actual penetration testing, and provides strong technical support for future testing SQL injection attacks or provides powerful guarantee for the information system in the SQL injection defense.%随着计算机网络技术的飞速发展,人们对无处不在的网络依赖程度越来越高,随之而来的一系列网络安全问题也越来越受到人们的重视.目前,SQL注入攻击已成为了黑客攻击的主要手段之一.文章介绍了SQL注入原理,对产生SQL注入原因以及实战中遇到的常见SQL注入攻击方式进行了深入研究,并在实际渗透测试的实践基础上提出一种新的SQL注入检测技术及工具实现,为日后测试SQL注入攻击提供有力的技术支持,为信息系统在SQL注入防御方面提供有力保障.

  15. 分布式信息安全防御系统的设计与实现%Design and Realization of Distributed Information Security Defense System

    Institute of Scientific and Technical Information of China (English)

    王国鑫; 朱宪花

    2012-01-01

    In allusion to the United Threat Management(UTM)'s problems of single point failure and stability of equipment etc., a distributed information security defense system is designed. This system is tree multi-level management structure, it can be divided into three parts, including proactive defense platform, monitoring nodes and host monitoring module. They separately undertake different information system defense tasks. So it can effectively relieve the safety management burden of the gateway, thus solve the problems of single point failure and system stability. This helps to solve hybrid network security threats.%针对统一威胁管理(UTM)的单点失效、设备稳定性等问题,设计一种分布式信息安全防御系统.该系统为树形多级管理结构,可分为主动防御平台、监控节点、主机监控模块3个部分,分别承担不同的信息系统防御任务.实验结果表明,该系统可有效地减轻网关处的安全管理负担,解决单点失效及系统稳定性问题,适用于防御混合型网络安全威胁.

  16. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    OpenAIRE

    Mihai-Gabriel IONITA; Victor-Valeriu PATRICIU

    2016-01-01

    Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices aroun...

  17. Information technology security at the Advanced Photon Source.

    Energy Technology Data Exchange (ETDEWEB)

    Sidorowicz, K. V.; McDowell, W.; APS Engineering Support Division

    2007-01-01

    The proliferation of 'botnets,' phishing schemes, denial-of-service attacks, root kits, and other cyber attack schemes designed to capture a system or network creates a climate of concern for system administrators, especially for those managing accelerator and large experimental-physics facilities, as they are very public targets. This paper will describe the steps being taken at the Advanced Photon Source (APS) to protect the infrastructure of the overall network with emphasis on security for the APS control system.

  18. COmmunications and Networking with QUantum operationally Secure Technology for Maritime Deployment (CONQUEST)

    Science.gov (United States)

    2016-12-02

    Networking with QUantum operationally-Secure Technology for Maritime Deployment (CONQUEST) Contract Period of Performance: 2 September 2016 – 1 September...potential of using advanced photonic integrated circuits to enable high- speed quantum-secure communications. Task 5: QKD network via un-trusted quantum...has a practical advantage in its imple- mentation since it can use conventional optical telecom components, and does not require cryostats to support

  19. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  20. Object/Shape Recognition Technology: An Assessment of the Feasibility of Implementation at Defense Logistics Agency Disposition Services

    Science.gov (United States)

    2015-02-25

    IV.  ANALYSIS OF THE CURRENT PROPERTY PROCESS AT DEFENSE LOGISTICS AGENCY DISPOSITION SERVICES AND MATURITY ASSESSMENT OF OBJECT/SHAPE RECOGNITION...implement full automation with optical sorting and data mining that included sensors, laser, object/shape recognition technology on conveyor belt...the current state of object/shape recognition technology and assess the feasibility of implementing it at DLA DS. C. RESEARCH QUESTIONS, SCOPE AND

  1. Symbol RFID Technology to be Deployed at United States Defense Logistics Agency’s Distribution Centers Worldwide

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Symbol Technologies, Inc., The Enterprise Mobility Company, today announced that it had been selected by ODIN technologies, the leader in the physics of RFID testing, software and deployment, to support its recent contract win with the United States Defense Logistics Agency (DLA), the United States Department of Defense’s (DoD) logistics combat support agency that provides supplies and services to America’s military forces worldwide.

  2. Web 2.0 Technologies and Social Networking Security Fears in Enterprises

    Directory of Open Access Journals (Sweden)

    Fernando Almeida

    2012-02-01

    Full Text Available Web 2.0 systems have drawn the attention of corporation, many of which now seek to adopt Web 2.0 technologies and transfer its benefits to their organizations. However, with the number of different social networking platforms appearing, privacy and security continuously has to be taken into account and looked at from different perspectives. This paper presents the most common security risks faced by the major Web 2.0 applications. Additionally, it introduces the most relevant paths and best practices to avoid these identified security risks in a corporate environment.

  3. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    Science.gov (United States)

    2015-05-14

    Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs Report Documentation Page Form... fairness of personnel security in the DoD In the wake of events like 9-11, Ft. Hood, and the Washington Navy Yard shootings, we expanded our

  4. 浅析无线局域网的安全威胁与安全防范%Analysis Security Threats and Security Defenses of Wireless LAN

    Institute of Scientific and Technical Information of China (English)

    黄波

    2011-01-01

    Basis on wireless local area network(WLAN) has been widely used and Developed.This paper analysis security threats in WLAN.The security attacks are described briefly and security solutions,such as encryption,authentication,access control,dynamic security link,wireless IDS,are discussed in this paper.Finally a suggestion about WLAN security is also put forward.%本文依据目前无线网络的广泛应用与发展,分析了无线局域网面临的安全威胁,针对无线局域网的技术标准,在无线局域网中可能使用的加密,认证,端口访问控制,动态安全链路,VPN,无线入侵检测等安全防范技术进行了阐述和探讨。

  5. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  6. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  7. 计算机网络信息安全纵深防护模型分析%ANALYSIS OF A DEFENSE-IN-DEPTH MODEL OF INFORMATION SECURITY IN COMPUTER NETWORKS

    Institute of Scientific and Technical Information of China (English)

    黄卢记; 栾江峰; 肖军

    2012-01-01

    To satisfy needs for information security in computer networks, a defense-in-depth secure model was made in terms of logic and technology. The technologies and their relationship were described and analyzed to illustrate the functions they play and the layer they are located in the model.%以计算机网络上需要进行安全防护的信息本体为出发点,从技术和逻辑角度建立一个综合多种计算机网络信息安全技术的纵深防护安全模型,并对其中用到的安全技术进行了深入浅出的介绍和分析,阐述了不同的计算机网络信息安全技术在安全防护中所处的层次和所起的作用.

  8. An update on the OpenOrbiter I Mission and its paradigm's benefits for the defense, homeland security and intelligence communities

    Science.gov (United States)

    Straub, Jeremy

    2017-05-01

    The OpenOrbiter I spacecraft is the culmination of significant work on reducing the cost levels of a CubeSat-class spacecraft. By redesigning the spacecraft from the ground up, down to the component level, to use readily available electronic and physical components, the cost of CubeSat construction has been significantly reduced. This paper provides an overview of the OpenOrbiter I mission, to date. It then focuses on the benefits that can be provided by the lower-cost, low-risk spacecraft. The paper discusses the prospective utility of this mission paradigm for the defense, homeland security and intelligence communities.

  9. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  10. Competitive Technologies for National Security: Review and Recommendations

    Science.gov (United States)

    2008-02-29

    Ibid. 13. SPG Media , “ABL YAL 1A Airborne Laser, USA,” at www.airforce-technology.com/projects/abl (March 15, 2006). 14. Press release, “Boeing Receives...the first quar- ter of 2005, almost all of the venture capital invested in the nanotech industry went to four companies: NanoTex ($33 millon

  11. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  12. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  13. The DoD Manufacturing Technology Program Strategic Plan: Delivering Defense Affordability

    Science.gov (United States)

    2009-03-01

    laboratories and RDECs to RDECOM SOSI. The first level of review for ATO-Ms is the Warfighter Technical Council ( WTC ). The WTC is a one-star level body that...and cost. Tracked efforts: this category consists of smaller stand-alone ManTech projects. Typically, the WTC approves tracked efforts...National Defense Authorization Act NDE non- destructive examination NDIA National Defense Industrial Association NDS National Defense Strategy Net

  14. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  15. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  16. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  17. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    Science.gov (United States)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  18. Hybrid rice technology for food security in the world

    Institute of Scientific and Technical Information of China (English)

    YUAN Long-ping

    2004-01-01

    @@ The current world population is over 6 billion and will reach 8 billion in 2030. Meanwhile, the annual loss of land to other use is 10 to 35 million ha, with half of this lost land coming from cropland.Facing such severe situation of population growth pressure plus cropland reduction, it is obvious that the only way to solve food shortage problem is to greatly enhance the yield level of food crops per unit land area through advance of science and technology.

  19. Report on Sensor Technology for Battlefield and Physical Security Applications.

    Science.gov (United States)

    1977-07-01

    END ITEMS, IT SHOULD BE USEFUL IF WE GET A HANDLE ON THE OVERALL MANAGEMENT CONCEPTo THE PROGRAM OBJECTIVES, AND THE ESTIMATED FUNDING LEVELS...LEARN MORE ABOUT THE DEVICES THAT WILL BE AVAILABLE ON THE OPEN MARKET . WE WOULD EXPECT SUCH A CENTER TO BE ACCESSABLE BY ALL FEDERAL AGENCIES AND TO...that the ported coaxial cable sensor technology does work and that it appears to work better than other sensors on the market . The ADM development

  20. 基于ARM平台的ROP攻击及防御技术%ROP Attack and Defense Technology based on ARM

    Institute of Scientific and Technical Information of China (English)

    钱逸; 王轶骏; 薛质

    2012-01-01

    With the development of mobile-phone field, ARM architecture is usually used in the mobile-phone and tablet computer, and the security issues on ARM platform always attract much attention from the researchers. ROP, a popular attack method on X86 is planted into ARM. This paper analyzes the different ROP defense methods on X86, presents the technical details of ROP attack, including specific implementation and gadgets search algorithm on ARM. Finally, a library sandbox technology is suggested to defense this kind of attack and secure the system.%随着智能手机领域的发展,几乎所有智能手机及平板电脑都采用了ARM架构,在此平台上的安全问题也越来越受到研究者的关注。X86平台上流行的返回导向编程被引入到了ARM平台上。通过研究总结X86平台上返回导向编程的攻击和防御机制,给出了该攻击移植到ARM平台上的技术细节,包括具体实现方式和gadget搜索算法的差异性,通过自动构建gadgets链加速Exploit开发,最后提出了一种系统库沙盒技术来防御此攻击。

  1. USAF Expeditionary Security Operations 2040:A Technology Vision For Deployed Air Base Defense Capabilities

    Science.gov (United States)

    2014-04-09

    laser truck that zaps enemy missiles,” 8 October 2012, http://theweek.com/article/index/234467/the-armys-eight-wheeled-laser-truck-that- zaps -enemy...Army’s eight-wheeled laser truck that zaps enemy missiles.” 8 October 2012. http://theweek.com/article/index/234467/the-armys-eight-wheeled-laser-truck...that- zaps -enemy- missiles (accessed 16 February 2014). Weiss, Brian A., and Craig I. Schlenoff. “Performance Assessments of Two-Way, Free-Form

  2. Innovation priorities optimization in the context of national technological security ensuring

    Directory of Open Access Journals (Sweden)

    V.A. Omelyanenko

    2016-12-01

    Full Text Available The aim of this article. The article is devoted to the main aspects of technological security providing through increasing the efficiency of innovation development priorities selection. The features of impact of technological security for national security and international experience of its software were analyzed. The scheme of determination of innovation priorities, based on the assessment of critical technologies and strategy of socio-economic development, were proposed. The scheme of innovation priorities based on “deployment policy” concept was developed. The results of the analysis. Based on analysis of possibilities of using the capacity of international environment, eliminating the technological gap between Ukraine and leading countries in framework of technological security provision should be implemented not by increasing the one-side transfer of foreign technologies, but with the improvement and development of national critical technologies based on foreign experience. Also positive balance of international technology transfer in future can’t be achieved the growth of dumping policy with the expansion of volumes of these technologies only when the country has to spend a resources, which is beneficial only for foreign partners. This balance should be focused on system-level processes, it is necessary to speed up the development of its own technology base, that can eliminate existing or possible “technological blockade”. Conclusions and perspectives for further research. The state’s ability to engage in complicated tech activities is a characteristic of scientific, technical and technological level of its development as well as has great impact on economic situation and national security and assists enhance its international prestige. However, the development of such industries and requires the creation of efficient innovation system and international cooperation mechanisms to compensate for negative effects of unilateral

  3. Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

    Directory of Open Access Journals (Sweden)

    Mei-Yu Wu

    2013-01-01

    Full Text Available Information technology has an enormous influence in many enterprises. Computers have not only become important devices that people rely on in their daily lives and work, but have also become essential tools for enterprises. More and more enterprises have shifted their focus to how to prevent outer forces from invading and stealing from networks. However, many enterprises have disregarded the significance of internal leaking, which also plays a vital role in information management. This research proposes an information security management approach that is based on context-aware role-based access control (RBAC and communication monitoring technology, in order to achieve enterprise information security management. In this work, it is suggested that an enterprise may, first, use an organizational chart to list job roles and corresponding permissions. RBAC is a model that focuses on different work tasks and duties. Subsequently, the enterprise may define a security policy to enforce the context-aware RBAC model. Finally, the enterprise may use communication monitoring technology in order to implement information security management. The main contribution of this work is the potential it provides to both reduce information security incidents, such as internal information leakage, and allow for effective cost control of information systems.

  4. The evolution of advanced mechanical defenses and potential technological applications of diatom shells.

    Science.gov (United States)

    Hamm, Christian E

    2005-01-01

    Diatoms are unicellular algae with silicified cell walls, which exhibit a high degree of symmetry and complexity. Their diversity is extraordinarily high; estimates suggest that about 10(5) marine and limnic species may exist. Recently, it was shown that diatom frustules are mechanically resilient, statically sophisticated structures made of a tough glass-like composite. Consequently, to break the frustules, predators have to generate large forces and invest large amounts of energy. In addition, they need feeding tools (e.g., mandibles or gastric mills) which are hard, tough, and resilient enough to resist high stress and wear, which are bound to occur when they feed on biomineralized objects such as diatoms or other biomineralized protists. Indeed, many copepods feeding on diatoms possess, in analogy to the enamelcoated teeth of mammals, amazingly complex, silica-laced mandibles. The highly developed adaptations both to protect and to break diatoms indicate that selection pressure is high to optimize material properties and the geometry of the shells to achieve mechanical strength of the overall structure. This paper discusses the mechanical challenges which force the development of mechanical defenses, and the structural components of the diatom frustules which indicate that evolutionary optimization has led to mechanically sophisticated structures. Understanding the diatom frustule from the nanometer scale up to the whole shell will provide new insights to advanced combinations of nanostructured composite ceramic materials and lightweight architecture for technological applications.

  5. Computer Network Security Technology%浅谈计算机网络安全技术

    Institute of Scientific and Technical Information of China (English)

    梁其烺

    2011-01-01

    从当前计算机网络安全现状入手,对主要的网络安全威胁进行了讨论。最后分析了计算机网络安全技术的类型,力图使网络设计者和使用者对网络安全有一个全面的认识,从而能正确采用成功对策。%The present situation of the current computer network security,network security of the main threats were discussed,the final analysis,the type of computer network security technology to try to make the network designers and users of network security with a comprehensive understanding, so that it can correctly the use of successful strategies.

  6. Study on Network Security Architecture for Power Systems

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.

  7. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  8. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available stream_source_info Venter-2015.pdf.txt stream_content_type text/plain stream_size 1509 Content-Encoding UTF-8 stream_name Venter-2015.pdf.txt Content-Type text/plain; charset=UTF-8 Finding the right technology solutions... • Real-life field conditions • Simulated events Maritime Scenario • Maritime and Harbour Protection in Saldanha area • Refugee Influx, Intertidal Poaching, Vessel Interception • Specific “Injects” – plausible events simulated • Various...

  9. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  10. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  11. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  12. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  13. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...The Department of State has submitted the following information collection request to the Office of Management and Budget (OMB) for approval in accordance with the Paperwork Reduction Act of 1995. Title of Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements Pursuant to 22 CFR 126.18. OMB Control Number: 1405-XXXX.......

  14. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... public comment period may end before the time indicated, following the last call for comments. To... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge.... The agenda on December 5 focuses solely on the interaction between DHS S&T and Customs and...

  15. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  16. Exploration of technologies of use to civil security forces

    Energy Technology Data Exchange (ETDEWEB)

    Farnum, E.H.; Petrovic, J.; McClellan, K.; Trujillo, E.; Neuman, A.; Lounsbury, B. [Los Alamos National Lab., NM (United States); Mann, T. [Foster Miller, Inc., Waltham, MA (United States); Rousseau, R. [Ordnance Body Armor Company (United States)

    1998-12-01

    This is the final report of a two-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The objective was to determine whether armor tile technology could be used to solve problems of civil law enforcement as identified by the New Mexico State Police. Most of the effort focused on the design and construction of a lightweight, portable box that could contain the shrapnel and redirect the blast from a steel-pipe/black-powder bomb. The bomb box task was carried out in collaboration with two companies, Foster Miller, Inc. and Ordnance Body Armor Co., who constructed most of the boxes tested. The results of the tests indicated that soft, flexible fabrics are superior to hard tiles in containing the bomb fragments. Subsequent to these experiments, Foster Miller has developed a bomb container that is commercialized and is currently being sold to law enforcement agencies.

  17. Image-Based Vehicle Identification Technology for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A

    2002-10-08

    The threat of terrorist attacks against US civilian populations is a very real, near-term problem that must be addressed, especially in response to possible use of Weapons of Mass Destruction. Several programs are now being funded by the US Government to put into place means by which the effects of a terrorist attack could be averted or limited through the use of sensors and monitoring technology. Specialized systems that detect certain threat materials, while effective within certain performance limits, cannot generally be used efficiently to track a mobile threat such as a vehicle over a large urban area. The key elements of an effective system are an image feature-based vehicle identification technique and a networked sensor system. We have briefly examined current uses of image and feature recognition techniques to the urban tracking problem and set forth the outlines of a proposal for application of LLNL technologies to this critical problem. The primary contributions of the proposed work lie in filling important needs not addressed by the current program: (1) The ability to create vehicle ''fingerprints,'' or feature information from images to allow automatic identification of vehicles. Currently, the analysis task is done entirely by humans. The goal is to aid the analyst by reducing the amount of data he/she must analyze and reduce errors caused by inattention or lack of training. This capability has broad application to problems associated with extraction of useful features from large data sets. (2) Improvements in the effectiveness of LLNL's WATS (Wide Area Tracking System) by providing it accurate threat vehicle location and velocity. Model predictability is likely to be enhanced by use of more information related to different data sets. We believe that the LLNL can accomplish the proposed tasks and enhance the effectiveness of the system now under development.

  18. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  19. From the Weakest Link to the Best Defense: Exploring the Factors That Affect Employee Intention to Comply with Information Security Policies

    Science.gov (United States)

    Aurigemma, Salvatore

    2013-01-01

    Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…

  20. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Employment and Training Administration TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher, Pennsylvania; TA-W-82,634A, Prudential Global Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business...

  1. A Study on: Exploring U.S. Missile Defense Requirements in 2010: What Are the Policy and Technology Challenges?

    Science.gov (United States)

    1997-04-01

    military offi- cers, law enforcement personnel, and organized crime groups are willing to engage in illegal activ- ities for a price. This willingness...Interview with Gennady G. Yanpolsky, "A New Era for Russian Defense Export," Military Technology, December 1995, p. 33. Vago Muradian, "Russia Wants...34 that have hindered ballistic missile devel- opment in the past. For example, rocket- society papers on staging problems, discussions on guid- ance

  2. Maritime Security in East Asia: Peaceful Coexistence and Active Defense in China’s Diaoyu/Senkaku Policy

    DEFF Research Database (Denmark)

    Odgaard, Liselotte

    2016-01-01

    The origins and role of the concepts of peaceful coexistence and active defense in Chinese foreign policy are investigated and applied to China’s policy toward the Diaoyu/Senkakus. The dominant moderate conceptual strategic thinking encourages Beijing to aim for the establishment of a modus vivendi...

  3. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    total defense expenditure figures were calculated using the European Central Bank ( ECB ) fixed rates to the euro in 1999 where possible, or the...earliest available annual average exchange rate provided by the ECB . For 2007 figures, where necessary, the ECB annual average exchange rates of the

  4. GIG Technologies

    Science.gov (United States)

    2008-08-08

    caching • GIG as a sensor • Cyber SA/defense • Cross Domain Information Sharing • Multi-Level Security solutions • Enterprise Service Bus ( ESB ...Link Layer Technologies Integrated Link Layer All Optical Core For Terrestrial and Space Networks Separate Transmission Networks Mid-Term Integrated

  5. 2003 U.S. Department of Energy Strategic Plan: Protecting National, Energy, and Economic Security with Advanced Science and Technology and Ensuring Environmental Cleanup

    Energy Technology Data Exchange (ETDEWEB)

    None,

    2003-09-30

    The Department of Energy contributes to the future of the Nation by ensuring energy security, maintaining the safety, security and reliability of the nuclear weapons stockpile, cleaning up the environment from the legacy of the Cold War, and developing innovations in science and technology. After 25 years in existence, the Department now operates 24 preeminent research laboratories and facilities and four power marketing administrations, and manages the environmental cleanup from 50 years of nuclear defense activities that impacted two million acres in communities across the country. The Department has an annual budget of about $23 billion and employs about 14,500 Federal and 100,000 contractor employees. The Department of Energy is principally a national security agency and all of its missions flow from this core mission to support national security. That is true not just today, but throughout the history of the agency. The origins of the Department can be traced to the Manhattan Project and the race to develop the atomic bomb during World War II. Following the war, Congress engaged in a vigorous and contentious debate over civilian versus military control of the atom. The Atomic Energy Act of 1946 settled the debate by creating the Atomic Energy Commission, which took over the Manhattan Project’s sprawling scientific and industrial complex.

  6. 政府网站安全防御要变被动为主动%Conversion of Passive Defense to Proactive Prevention-On Government Website Security

    Institute of Scientific and Technical Information of China (English)

    孙宇

    2011-01-01

    文中从政府网站监管机构和运营者的角度考虑,在专门针对政府网站特定业务应用的原有被动式安全防御建设基础上,提出在贯穿政府网站全生命周期的信息安全建设过程中,从安全监测、安全防护、安全恢复、安全检查和应急响应体系5个方面对政府网站的信息安全体系进行完善,将政府网站安全需求转化为更加主动的防御技术和监管手段,使政府网站具备一定的对抗能力和应急恢复能力,形成事前安全评估、事件监测,事中应急响应与恢复,事后整改加固等完整的政府网站安全管理方式。%A way to perfect the security system and keep the government websites always secure is proposed from the angle of websites operators and surveillance and on the basis of existing passive defense against attacks targeting specific applications of these websites. The security concept covers the entire lifecycle of an attack,with five aspects, including security monitoring,attack prevention,attack recovery,security re-checking and emergency response system. This way converts the security requirements to proactive prevention techniques and surveillance measures,thus to enhance the website capabilities in anti-attacks,emergency responses and quick recovery and form a seamless website security management approach involving pre-event security assessment and monitoring,in-event quick response, and recovery and post-event reinforcement.

  7. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  8. The use of information technology security assessment criteria to protect specialized computer systems

    Energy Technology Data Exchange (ETDEWEB)

    Lykov, V.A.; Shein, A.V. [Atominform of Russia (Russian Federation); Piskarev, A.S. [Atomzashchitinform of Russia (Russian Federation); Devaney, D.M.; Melton, R.B. [Pacific Northwest National Lab., Richland, WA (United States); Hunteman, W.J.; Prommel, J.M. [Los Alamos National Lab., NM (United States); Rothfuss, J.S. [Lawrence Livermore National Lab., CA (United States)

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  9. 移动目标防御技术综述%Overview on Moving Target Defense Technology

    Institute of Scientific and Technical Information of China (English)

    张晓玉; 李振邦

    2013-01-01

    Moving target defense technology is one of the cyberspace game-changing revolutionary technologies proposed by Federal Networking and Information technology Research and Development (NITRD) in recent years. Not alike to the prior efforts in cybersecurity research, moving target defense technology, through diverse and continually-changing evaluation, deployment mechanisms and strategy, raises the complexity and costs for attackers, and effectively restricts the vulnerabilities exposure and the opportunities for attack. Therefore, the in-depth study on this technology is of great improtance for future development of china’s communication network and cybersecurity. This paper gives an overview on the goals and development stragegies, including feasibility, recent progress, prospects and challenges of moving target defense technology.%  移动目标防御技术是近年来美国科学技术委员会提出的网络空间“改变游戏规则”的革命性技术之一。它完全不同于以往的网络安全研究思路,通过多样的、不断变化的构建、评价和部署机制及策略来增加攻击者的攻击难度及代价,有效限制脆弱性暴露及被攻击的机会。因此,深入研究该技术对我国未来通信网络及网络安全的发展具有重要意义。主要对移动目标防御技术的目标和发展战略、可行性、最新进展、以及未来发展前景及面临的挑战等方面进行了全面概述。

  10. The Security Technology of E-commence——Intelligent Packet-filtering Firewalls

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Research has revealed that, in the next ten to twen ty years, the implementation of E-commence will become a new basis of economic in crease of China and other countries in the world. And the essence of implementin g E-commerce is the credit standing among the banks, the sellers and the custom ers. But the credit standing in the net ultimately depends on the security of th e network. Firewall is a useful network security technology to keep a network fr om being intruded. The rational use of firewalls can...

  11. Gerald L. Epstein, PhD: director, center for science, technology, and security policy, American Association for the Advancement of Science (AAAS). Interview by Madeline Drexler.

    Science.gov (United States)

    Epstein, Gerald L

    2009-12-01

    Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the

  12. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  13. GEP-UCON's Web Database Security Technology%基于GEP-UCON的Web数据库安全技术研究

    Institute of Scientific and Technical Information of China (English)

    宁葵; 龙珑; 宁德鹏; 杨武英

    2011-01-01

    Nowadays there is a growing concern about the problem of Intemet security. Various means serious threat to attack the network security. Because Web database for many users to directly share, more prominent security issues. Gene Expression Programming (GEP)combines genetic algorithms and genetic programming advantages. GEP artificial intelligence technology will be used to the UCON model for the Web database to establish a multi-layered security defense model. Establish a multi-library collaborative manner authorized by the rules and classification models, analysis of user access patterns to achieve. In order to identify and access the main features of the role and behavior of the type, achieve the purpose of security access control. The results show that the interception system is effective to forbid invade database of illegal, GEP-UCON algorithm can dynamic improve the security and defense capabilities, the way can better improve the Web database security.%目前网络安全问题日益严重,各种各样的攻击手段严重威胁网络的安全,而Web数据库为众多用户直接共享,安全性问题更为突出.基因表达式编程(GEP)融合了遗传算法和遗传编程的优点,笔者将GEP人工智能技术引入到UCON模型为Web数据库构建了一个多层次的安全防御模型,以多库协同方式建立起授权规则和分类模型,实现用户访问行为模式分析,从而识别和访问主体的角色类型和行为特征,达到安全访问控制的目的.系统使用结果表明拦截对Web数据库非法、越权访问的准确较高,GEP-UCON算法的动态学习功能不断地提高安全防御能力,从而把Web数据库的安全性提升到一个较为理想的状态.

  14. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  15. Science and Technology to Advance Regional Security in the Middle East and Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tompson, A F B; Richardson, J H; Ragaini, R C; Knapp, R B; Rosenberg, N D; Smith, D K; Ball, D Y

    2002-10-09

    This paper is concerned with the promotion and advancement of regional security in the Middle East and Central Asia through the development of bilateral and multilateral cooperation on targeted scientific and technical projects. It is widely recognized that increasing tensions and instability in many parts of the world emphasize--or reemphasize--a need to seek and promote regional security in these areas. At the Lawrence Livermore National Laboratory (LLNL), a national security research facility operated for the US Department of Energy, we are pursuing an effort to use science and technology as a ''low risk'' means of engagement in regions of strategic importance to the United States. In particular, we are developing collaborations and cooperative projects among (and between) national laboratory scientists in the US and our various counterparts in the countries of interest.

  16. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  17. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  18. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    complexity of DHS led to a bureaucracy that is difficult to manage and oversee. Third, the merger of so many distinct agencies created a lack in...development for its employees. DOD follows the Defense Acquisition Workforce Improvement Act implementation, which breaks down the civilian workforce...program began to prepare potential DHS employees for further leadership roles and growth within the department. In 2014, the Governmental

  19. Defense Infrastructure: More Accurate Data Would Allow DOD to Improve the Tracking, Management, and Security of Its Leased Facilities

    Science.gov (United States)

    2016-03-01

    Methodology 46 Appendix II Comments from the Department of Defense 54 Appendix III GAO Contact and Staff Acknowledgments 57 Related GAO Products 58...U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its...and alternative workplace arrangements, such as telework ; and identifying offsetting reductions in inventory when new space is acquired. This

  20. A Hard Look at Hard Power: Assessing the Defense Capabilities of Key U.S. Allies and Security Partners

    Science.gov (United States)

    2015-07-01

    point has been South Korea’s desire to reprocess spent nuclear fuel of U.S. origin used in South Korean reactors —a practice effectively prohibited...from www.difesa.it/InformazioniDellaDifesa/periodico/IlPeriodico_Anni- Precedenti/Documents/2001_-_Nuove_forze_per_un_nuovo_secolo. pdf #search=Nuove...Approfondimenti/Nota-aggiuntiva/Documents/58570_na_2001. pdf . 14. Ibid. 15. Italian Ministry of Defense, Nota Aggiuntiva allo Stato di Previsione per la Difesa

  1. Contributions of the Department of Defense Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Programs to Training and Education: FY1999-FY2004

    Science.gov (United States)

    2006-01-01

    allows visual tracking, free-floating Magnetic Levitation ( Maglev ) haptic feedback with real surgical tools and sce- nario-based training that can be...Defense Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Programs to Training and Education: FY1999–FY2004 J.D...Department of Defense Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Programs to Training and Education: FY1999

  2. Avionics Collaborative Engineering Technology Delivery Order 0035: Secure Knowledge Management (SKM) Technology Research Roadmap - Technology Trends for Collaborative Information and Knowledge Management Research

    Science.gov (United States)

    2004-06-01

    International Corporation 4031 Colonel Glenn Highway Beavercreek, OH 45431-1673 Nikolaos G. Bourbakis Wright State University Information Technology...NUMBER 2432 5e. TASK NUMBER 04 6. AUTHOR(S) Russell F. Moody (Science Applications International Corporation) Nikolaos G. Bourbakis (Wright...modeling, retrieving, distributing, and publishing documents on the Web ( Bourbakis ) − Research cryptanalysis. − System security. − Self-healing

  3. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  4. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  5. Research on the Campus Network Security Based on Defense in Depth%基于纵深防御思想的校园网安全研究

    Institute of Scientific and Technical Information of China (English)

    朱爱军

    2014-01-01

    在分析校园网建设现有网络资源及应用的基础上,提出了以防火墙技术、入侵检测技术、漏洞扫描技术、防病毒技术、安全评估技术为核心的完整的安全解决方案。通过该方案的提出和实现,提高校园网建设的安全防护系数。%Based on the analysis of the campus network construction resource and application, this paper proposes a security so-lution with the firewall technology, intrusion detection technology, vulnerability scanning technology, anti-virus technology and safe-ty assessment technology as the core. This solution can improve the safety coefficient of the campus network construction.

  6. IT Security Plan for Flight Simulation Program

    CERN Document Server

    Hood, David; 10.5121/ijcsea.2011.1510

    2011-01-01

    Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentia...

  7. 77 FR 4632 - Defense Federal Acquisition Regulation Supplement; Independent Research and Development Technical...

    Science.gov (United States)

    2012-01-30

    ... technology readiness level. The DTIC on-line form can be found at http://www.dtic.mil/ird/dticdb/index.html... independence of contractors to choose which technologies to pursue in IR&D programs. The public comment period... of Defense, International Technology Security. Therefore the respondent made the...

  8. Employee Access IDs Enhanced with Technology

    OpenAIRE

    Center for Homeland Defense and Security

    2011-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Alan Black’s course paper for Technology in Homeland Security addressed potential insider threats to airports and how a simple technological shift could mitigate those threats. Black, who is vice president...

  9. U.S.-Brazil Security Cooperation and the Challenge of Technology Transfer

    Science.gov (United States)

    2014-03-01

    direction throughout the process. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. MAJOR RESEARCH QUESTION Since 2010, the United...weapons systems to the Middle East. Regarding the industry’s success in that era, Luis Bitencourt notes: The reason they got that market was mainly due...31. 143 Luis Bitencourt, The Problems of Defence Industrialization for Developing States,” in Arms and Technology Transfers: Security and Economic

  10. Supported Liquid Membrane Extraction Technology and Its Application in Detection of Meat Security

    Institute of Scientific and Technical Information of China (English)

    LIU Jia; LI Weijin

    2010-01-01

    As a novel technology, supported liquid membrane extraction has gradually become the direction of the research of extraction, for the advantages of using little organic solvents, good selectivity and repeatability. This paper is based on describing the working principle, structure and influencing factors of supported liquid membrane, and research in domestic and foreign literatures which are in the same period, and give a review on the application of supported liquid membrane in meat security determination.

  11. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    Energy Technology Data Exchange (ETDEWEB)

    1984-02-01

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  12. 78 FR 11161 - Reestablishment of Department of Defense Federal Advisory Committee

    Science.gov (United States)

    2013-02-15

    ... issues or pursuing a career in a national security position. b. Provide for wide dissemination of..., particularly in the area of science or technology. f. Provide the Secretary of Defense biennially with a list... Security Education Board. The DFO, at that time, may provide additional guidance on the submission of...

  13. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  14. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels.

  15. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  16. Advances in AlGaInN laser diode technology for defence, security and sensing applications

    Science.gov (United States)

    Najda, S. P.; Perlin, P.; Suski, T.; Marona, L.; Boćkowski, M.; Leszczyński, M.; Wisnieski, P.; Czernecki, R.; Targowski, G.

    2016-10-01

    Laser diodes fabricated from the AlGaInN material system is an emerging technology for defence, security and sensing applications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., 380nm, to the visible 530nm, by tuning the indium content of the laser GaInN quantum well, giving rise to new and novel applications including displays and imaging systems, free-space and underwater telecommunications and the latest quantum technologies such as optical atomic clocks and atom interferometry.

  17. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    Energy Technology Data Exchange (ETDEWEB)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.

  18. The Research on The Fusion Technology of Wireless LANs and Personal Area Networks for Emergency Secure in Coal Mine

    Science.gov (United States)

    Chiyuan, Li

    The author has provided craft brother with predictive wireless communication modality and imaginative solutions, and discussed the applied mode of amalgamation technology of wireless LANs and personal area networks for emergency secure in coal mine. The fire protection jobs of emergency secure will become more scientific, more efficient and more flexible in this circumstance. The study can supply bailout team with the situation of a disaster and the location of miner, enhance the efficiency of emergency secure in coal mine.

  19. LATIST: A Performance Support Tool for Integrating Technologies into Defense Acquisition University Learning Assets

    Science.gov (United States)

    2011-07-01

    is exemplified through its Performance Learning Model ( PLM ) (DAU, 2010, p. 28). The three pillars of the PLM (Career Development, Job Perfor- mance...University. (2010). Defense Acquisition University 2010 catalog. Retrieved from http://icatalog.dau.mil/onlinecatalog/doc/Catalog2010. pdf Department of

  20. Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008

    Science.gov (United States)

    2009-01-16

    involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These

  1. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  2. DNA Sequencing Technologies within the Chemical and Biological Defense Enterprise: How to Position the Department of Defense to Maximize the Use of These Emerging Technologies - JUPITR

    Science.gov (United States)

    2015-07-01

    computers, tablets , and smartphones have stretched the bounds of how we perceive and use communications data, the rapidly evolving science of DNA...included to ensure the single deployed platform is replaced when scientific evidence dictates the need. 3. RECOMMENDATIONS FOR THE FUTURE OF DNA...actionable information. 4.4 DNA as Archival Storage Material The evaluation of DNA technologies to support or replace modern long-term data

  3. Growth and Study of Nonlinear Optical Materials for Frequency Conversion Devices with Applications in Defense and Security

    Science.gov (United States)

    2015-03-01

    AFRL-RY-WP-TP-2015-0068 GROWTH AND STUDY OF NONLINEAR OPTICAL MATERIALS FOR FREQUENCY CONVERSION DEVICES WITH APPLICATIONS IN DEFENCE AND...2015 Technical Paper 1 August 2013 – 1 August 2014 4. TITLE AND SUBTITLE GROWTH AND STUDY OF NONLINEAR OPTICAL MATERIALS FOR FREQUENCY CONVERSION...SUBJECT TERMS hydride vapor phase epitaxy, nonlinear optical materials , quasi-phase matching 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  4. Analysis of the Effectiveness of the Departament of Defense Industrial Security Program and Recommendations for Program Improvement

    Science.gov (United States)

    1984-12-10

    deposit box in his name in a bank in Tijuana , Mexico. The case against Harper has now been completed with his sentencing and incarceration. But certain...ensued. Before going to Warsaw, Harper had driven with Louise to Tijuana and placed his remaining collection of classified documents in a safe...Boyce was an employee of TRW, Incorporated, in Redondo Beach , California. From 1975 to 1977 he worked as a security clerk in a "black vault" operated at

  5. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  6. 78 FR 22841 - Defense Federal Acquisition Regulation Supplement: Encouragement of Science, Technology...

    Science.gov (United States)

    2013-04-17

    ... Regulation Supplement: Encouragement of Science, Technology, Engineering, and Mathematics (STEM) Programs... contractors to develop science, technology, engineering, and mathematics (STEM) programs. FOR FURTHER... 2012, which requires DoD to encourage contractors to develop science, technology, engineering,...

  7. 信息安全视角下人防面临的威胁分析%Analysis on the Civil Air Defense Threat under the Perspective of Information Security

    Institute of Scientific and Technical Information of China (English)

    平亮

    2015-01-01

    信息防护是人民防空安全防护的重要组成部分,涉及的内容广泛,是一项系统工程,包括物理层安全、系统层安全、网络层安全和管理层安全等.%Information protection is an important part of the civil air defense. It is a system engineering that involves extensively, generally includes the physical security, system security, network layer, application layer and security management, etc.

  8. 数字化校园信息安全立体防御体系的探索与实践%Exploration and practice of tridimensional information security defense system in digital campus

    Institute of Scientific and Technical Information of China (English)

    张新刚; 田燕

    2012-01-01

    For the serious breakage behaviors, aiming at the education information-based application resulted from the network attacks which are becoming more and more complicated, the traditional static, unilateral and passive information security defense system has already not been satisfied with the security requirements under new-type application environment. To resolve these problems a three-dimensional hierarchy information security model is put forward including physical security, network security, data security and content security. It can safeguard the confidentiality, controllability of information security and so on. An active digital campus defense model APPDRRCC is put forward and security policies are designed in different stages to achieve the the active defense in the whole process from the early risk evaluation to the terminal trace. The experimental results in the campus show that the digital campus tridimensional security defense system can achieve tridimen-sional, dynamic and active defense. So the scheme is effective and feasible.%针对数字化校园中日益复杂多样化的网络攻击对教育信息化应用造成的严重破坏行为,传统的静态化、片面化的被动型信息安全防御体系已经无法满足新型应用环境下的安全需求.对此,从信息安全的4个层次——物理安全、网络安全、数据安全和内容安全出发,提出了数字化校园信息安全立体防御层次化安全模型,保障了信息安全的机密性、可控性等安全属性.在该模型中的网络安全层,提出了数字化校园网络安全全过程主动防护模型APPDRRCC,设计了各阶段的安全防护策略,实现了从前期的风险评估到后期的追踪反击全过程主动防御.该模型在校园网中的实际应用结果表明:数字化校园信息安全立体防御体系能够实现防御的立体化、动态化和主动性,该方案是有效、可行的.

  9. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  10. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  11. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  12. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  13. Hybrid Network Defense Model Based on Fuzzy Evaluation

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2014-01-01

    Full Text Available With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  14. Multi-Level Security for Automotive–RFID Based Technology with Lab VIEW Implementation

    Directory of Open Access Journals (Sweden)

    Priya Darshini .V

    2013-03-01

    Full Text Available Security has become a prominent parameter for all the electronic gadgets. This proposed paper aims at securing the automotive and also preventing the unauthorized persons from accessing it. The technologies such as Radio Frequency Identification (RFID, thumb registration system and face recognition will be applied for the security measures. This proposed system will also be implemented in LabVIEW using Educational Laboratory Virtual Instrumentation Suite II (ELVIS. Initially, the RFID system will be authenticated .The importance of this system is that, it gets verification from the Road Transportation Office (RTO.The user will require an authentication to get proceed to the thumb registration module by which the efficiency of the thumb is enhanced using Pattern Matching Algorithm (PMA. Face recognition system is a technique which will be used after the thumb registration system. At last, this system allows the user to drive the car. For emergency, a key insertion slot will be placed in the system through which the user can insert the key. During this emergency mode of operation the camera captures the driver’s image and sends it to the owner’s mobile as Multimedia Messaging Service (MMS. The owner will provide the authentication password; this in turn allows the user to drive the vehicle. Global System for Mobile communication (GSM module is also kept inbuilt for tracking purpose. Among the different technologies proposed, RFID technique is briefly discussed in this paper.

  15. Security inspection in ports by anomaly detection using hyperspectral imaging technology

    Science.gov (United States)

    Rivera, Javier; Valverde, Fernando; Saldaña, Manuel; Manian, Vidya

    2013-05-01

    Applying hyperspectral imaging technology in port security is crucial for the detection of possible threats or illegal activities. One of the most common problems that cargo suffers is tampering. This represents a danger to society because it creates a channel to smuggle illegal and hazardous products. If a cargo is altered, security inspections on that cargo should contain anomalies that reveal the nature of the tampering. Hyperspectral images can detect anomalies by gathering information through multiple electromagnetic bands. The spectrums extracted from these bands can be used to detect surface anomalies from different materials. Based on this technology, a scenario was built in which a hyperspectral camera was used to inspect the cargo for any surface anomalies and a user interface shows the results. The spectrum of items, altered by different materials that can be used to conceal illegal products, is analyzed and classified in order to provide information about the tampered cargo. The image is analyzed with a variety of techniques such as multiple features extracting algorithms, autonomous anomaly detection, and target spectrum detection. The results will be exported to a workstation or mobile device in order to show them in an easy -to-use interface. This process could enhance the current capabilities of security systems that are already implemented, providing a more complete approach to detect threats and illegal cargo.

  16. Defense Technology and Trade Initiative: Ashton Carter’s Strategy in India

    Science.gov (United States)

    2016-03-01

    product assembly in India : Rather, it aims at joint development of new technologies through design, engineering, manufacturing, testing, production...Technology Development and Transfer Steps Technology Transferred Transfer Media Research Product Design Documentation & Hardware Laboratory...staunchly advocates treating India like some of the closest U.S. partners in terms of the extent and level of technology transfer, co- develop - ment

  17. 移动目标防御技术研究进展%Research and Development of Moving Target Defense Technology

    Institute of Scientific and Technical Information of China (English)

    蔡桂林; 王宝生; 王天佐; 罗跃斌; 王小峰; 崔新武

    2016-01-01

    易攻难守是当前网络安全面临的核心问题之一。移动目标防御为解决这一问题提供了一种全新思路,其核心思想是通过内部可管理的方式对被保护目标的攻击面实施持续性的动态变换以迷惑攻击者,从而增加攻击者实施成功攻击的代价和复杂度,降低其攻击成功的概率,提高系统弹性和安全性。首先对移动目标防御的基本概念加以介绍,并依据研究内容的不同对已有的研究成果进行分类;然后对每类成果加以描述、分析和总结;最后对当前研究现状进行总结,并对未来研究方向进行了展望。%Nowadays ,network configurations are typically deterministic ,static ,and homogeneous . These features reduce the difficulties for cyber attackers scanning the network to identify specific targets and gather essential information ,which gives the attackers asymmetric advantages of building up ,launching and spreading attacks .Thus the defenders are always at a passive position ,and the existing defense mechanisms and approaches cannot reverse this situation . Moving target defense (M TD) is proposed as a new revolutionary technology to alter the asymmetric situation of attacks and defenses .It keeps moving the attack surface of the protected target through dynamic shifting ,which can be controlled and managed by the administrator . In this way , the attack surface exposed to attackers appears chaotic and changes over time . Therefore , the work effort ,i .e ., the cost and complexity ,for the attackers to launch a successful attack ,will be greatly increased .As a result ,the probability of successful attacks will be decreased ,and the resiliency and security of the protected target will be enhanced effectively .In this paper ,we firstly introduce the basic concepts of M TD ,and classify the related works into categories according to their research field .Then ,under each category , we give a detailed description on the

  18. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  19. Application of Cyber Security in Industrial Control Systems Based on Security Protection Technology for Electrical Secondary System%电力二次安全防护技术在工业控制系统中的应用

    Institute of Scientific and Technical Information of China (English)

    邹春明; 郑志千; 刘智勇; 陈良汉; 陈敏超

    2013-01-01

    我国电力二次系统安全防护技术已广泛应用并取得了良好的安全防护效果,通用工业控制系统与电力二次系统既有相似性,又存在行业不同的需求差异。文章根据电力二次安全防护技术成果,通过加强工控网络边界的防护强度、对工控通信协议进行深度分析、挖掘工控协议攻击特征模型、建立统一安全管理平台等技术手段,构筑具备纵深防御能力的通用工控信息安全防护系统。通过模拟工控环境和网络攻击等方法对关键部件工控防火墙进行了研究测试,结果表明在保证工控系统授权通信正常运行的前提下,成功拦截了非授权控制命令,具备深度保护工控系统信息安全的能力。因此,该系统可增强工控系统抵御黑客病毒攻击的安全防护能力,并降低由信息安全攻击带来工业设备故障损坏的风险。%Cyber security scheme is used for the secondary electrical systems of power grids in China widely and successfully and favorable security protection effects have been achieved. There is not only the similarity between general industrial control system and the secondary electrical systems in power grids and but also the difference in demand due to the differences among industrial sectors. Based on the achievements in security protection technologies for the secondary electrical systems and by means of such technological means as enhancing the protection for the border of industrial control network, analyzing communication protocols for industrial control in depth, mining attack signature models of industrial control protocol and establishing a unified security management platform and so on, a general security protection system for industrial control information, which possesses the ability of defense in depth, is constructed. Through simulating both industrial control environment and network attack, the industrial control firewall for key components is

  20. Technology solutions of computer network security database%计算机网络数据库安全技术方案

    Institute of Scientific and Technical Information of China (English)

    伍军

    2015-01-01

    With the development of computer ne twork database, the security threats facing more and more complex, and therefore, the network database security technology must continue to advance with the times. Can take three authentication, database encryption, active tracking and monitoring technology, from passive defense initiative to track both directions and evolving in response to the increasing complexity of the situation, to maximize network database to ensure the integrity and consistency of data sex.%随着时代的发展,计算机网络数据库面临的安全威胁越来越多,越来越复杂,因此,网络数据库安全防护技术必须不断与时俱进。可采取三级身份认证、数据库加密、主动追踪和监测技术,从被动防御和主动追踪两个方向不断发展,以应对越来越复杂的局面,最大程度地保证网络数据库数据信息的完整性和一致性。

  1. Field studies of safety security rescue technologies through training and response activities

    Science.gov (United States)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  2. Analysis of Computer Network Security Technology%浅析计算机网络安全技术

    Institute of Scientific and Technical Information of China (English)

    岳建

    2011-01-01

    本文就网络安全面临的威胁和网络安全存在的问题作一些分析,最后有针对性的介绍了几种常用的加强网络安全的技术。为网络安全工作探索一条新思路。%In this paper,network security threats and network security problems for some analysis,and finally targeted introduction of several commonly used to enhance network security technology for network security to explore a new idea.

  3. 浅析计算机网络安全建设及安全技术策略%Computer Network Security Construction and Security Technology Strategies Analysis

    Institute of Scientific and Technical Information of China (English)

    岳慧平; 刘广; 刘建平

    2011-01-01

    With the computer technology and communication technology in all aspects of social life, the extensive application of computer network security issues and more and more prominent.This definition of network security from the start,details the threat to computer network security considerations,and proposed technical and management aspects of the corresponding preventive measures.%随着计算机技术和通信技术在社会生活各方面的广泛应用,计算机网络安全防护问题也愈来愈突出。本文从网络全定义入手,详细阐述了威胁计算机网络安全的因素,并在技术及管理方面提出了相应的防范对策。

  4. Cyber Security Status and Technology Development%网络安全现状与技术发展

    Institute of Scientific and Technical Information of China (English)

    宁向延; 张顺颐

    2012-01-01

    The developments of open, free, international cyber technologies bring many revolutionary changes to all countries of the world, all government organizations, all enterprise organizations and all aspects of our lives. With the improved efficiency and the conveniences, many threats and challenges have appeared on open networks. Thus cyber security has become an indispensable part of information networks. Based on the developing security theories, application technologies , management standards, and so on, cyber security technology system has been gradually formed and mature. With the development of network technologies , new information security technologies ( such as IPv6 security, wireless security and embedded system security) will become the mainstream of network security. Many security technologies will be a-malgamated, at the same time the security technology will be syncretized with other technologies, and monitoring technology will become the mainstream of cyber security technologies.%开放、自由、国际化的信息网络技术的发展给世界各国、政府机构、企事业机构和个人生活带来了革命性的变革.伴随着提高效率和提供各种便利的同时,人们要面对开放网络带来的信息安全方面的威胁和挑战,网络的安全问题成为信息网络健康发展必不可少的重要一环.有关网络安全的研究,在安全理论、应用技术、规范管理等方面不断深入,安全技术体系逐步形成并成熟起来.随着网络技术的发展变化,新兴信息安全技术(如IPv6安全、无线安全和嵌入式系统安全等)将成为主流,网络安全技术也将逐渐发展和变化.许多安全技术将由独立走向融合,同时安全技术开始与其他技术进行融合,监控技术将成为信息网络安全技术的主流.

  5. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    Science.gov (United States)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  6. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-01-01

    Full Text Available Background: This study integrates the diffusion of innovation, technology acceptance model and Hofstede’s cultural dimensions theory to assess the role that information and communications technology (ICT plays in ensuring food security. A survey of smallholder farmers from the iLembe district municipality of the KwaZulu-Natal Province of South Africa was conducted, and the data were used to test the proposed model.Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory.Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques.Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons.Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies

  7. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  8. Digital Watermark-based Security Technology for Geo-spatial Graphics Data

    Institute of Scientific and Technical Information of China (English)

    JIA Peihong; CHEN Yunzhen; MA Jinsong; ZHU Dakui

    2006-01-01

    The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data, as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data. The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product, so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data. So far in the GIS field throughout the world, few researches have been made on digital watermarking. The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique. An application software employing the proposed technology has been developed. A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology.

  9. Research on Web System Security Architecture based on Defense in Depth%基于纵深防御的Web系统安全架构研究

    Institute of Scientific and Technical Information of China (English)

    许子先; 卜哲; 裴立军

    2013-01-01

      文章综述了构建一个安全的Web应用系统需要遵守的准则。并根据Web应用系统层次化的结构特点,从构建合理安全的网络拓扑结构,配置安全严格的主机系统安全策略,编写严谨的应用代码三个方面阐述了如何从技术方面来构建安全的Web应用系统。另外也强调了建立以人为主体的安全管理与技术相结合的保护模式的重要性。%With the development of network technology, Hackers’ attention were transferred from attacking the Web server to attacking the Web application system.So many softwares for hacking make it easy for hackers to attack Web applications system.Network security incident occurred frequently, So Web security has been widespread concern.This paper introduced how to build a security Web application system.From the following three aspects that how to construct the Web application security system. First,reasonable construction safety of network topology. Secondly,making the confguration of the host system security strategy strict.Third,writting rigorous application code. Also,it is very important to make the safety management and technical combination.

  10. Security implications and governance of cognitive neuroscience.

    Science.gov (United States)

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.

  11. 78 FR 13604 - Defense Federal Acquisition Regulation Supplement: Encouragement of Science, Technology...

    Science.gov (United States)

    2013-02-28

    ... Regulation Supplement: Encouragement of Science, Technology, Engineering, and Mathematics (STEM) Programs..., which requires DoD to take steps to encourage contractors to develop science, technology, engineering... (FY12), which requires DoD to encourage contractors to develop science, technology, engineering,...

  12. Research on Honeypot Technology-based Security Model of Campus Network%基于蜜罐技术的校园网络安全模型研究

    Institute of Scientific and Technical Information of China (English)

    谢盛嘉; 黄志成

    2013-01-01

    Traditional network security mainly takes passive defense strategies. It is effective for known attacks, but not for unknown attacks. Honeypot technology as appeared in recent years is a new type of active defense technology that shows an advantage against unknown attacks. It studies the basic principles and functional architecture of honeypot technology, and proposes a honeypot technology-based security model of campus network. Tests show that the model enhances the security of campus network, provides a good teaching environment for network security class teaching, and improves the effectiveness of teaching.%  传统网络安全主要采取被动的防御策略,对已知攻击比较有效,但对于防范未知攻击,效果不太理想。蜜罐技术作为近年来出现的一种新型的主动防御技术,在防范未知攻击方面日益显示出了优势。研究了蜜罐技术的基本原理和功能架构,提出了基于蜜罐技术的校园网安全模型。实际测试表明,模型增强了校园网络安全,并为网络安全类课程教学提供了良好的教学环境,提高了教学效果。

  13. An Illustrative Case Study for Twentieth Century Defense Planners: The Technology and Politics of United States Coastal Defense, 1880-1898.

    Science.gov (United States)

    1980-04-24

    932. 2 lGoodrich, Our New Naval Guns," pp. 667-68. 22"Modern Artillery," p. 296. 36 in the nineteenth century by the crucible or open- hearth methods...comments on coast defense ships. "Seaport Defenses: Proposes Artificial Islands to Protect the Approache to the Harbors." Scientific American 63 (23...August 1890): 112. 157 Particularly interesting: proposed artificial islands similar to fixed concrete battleships to be built in harbors; system

  14. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  15. Port and Harbor Security

    Energy Technology Data Exchange (ETDEWEB)

    Saito, T; Guthmuller, H; DeWeert, M

    2004-12-15

    Port and Harbor Security is a daunting task to which optics and photonics offers significant solutions. We are pleased to report that the 2005 Defense and Security Symposium (DSS, Orlando, FL) will include reports on active and passive photonic systems operating from both airborne and subsurface platforms. In addition to imaging techniques, there are various photonic applications, such as total internal reflection fluorescence (TIRF), which can be used to ''sniff'' for traces of explosives or contaminants in marine. These non-imaging technologies are beyond the scope of this article, but will also be represented at DSS 2005. We encourage colleagues to join our technical group to help us to make our ports and harbors safer and more secure.

  16. SecurIST: Ensuring Secure, Dependable & Resiliant ICT Technologies to Empower the European Citizen of the Future

    OpenAIRE

    Clarke, James (James H.); Fitzgerald, William M.

    2006-01-01

    Industry and companies are benefiting significantly from the increased productiv-ity, competitiveness and customer satisfac-tion provided by mobility. However, to be viable in the future, mobility must address the foremost challenge confronting it today ensuring a high level of security to protect the enterprise network and the valuable in-formation it carries, dependability along with subscriber privacy issues. With the advent of mobility, security is even more important than before. Any exi...

  17. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  18. The development of coal-based technologies for Department of Defense Facilities. Interim report, March 27, 1993--July 30, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Sharifi, R. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1993-09-24

    The US Department of Defense (DOD), through an Interagency Agreement with the US Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first phase of the program is underway. Phase I activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water slurry fuels (MCWSFs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. Phase II research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and precombustion (i.e., slagging combustion and/or gasification) strategies for the utilization of high ash, high sulfur coals. Phase III activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phase I are described below. The objective in Phase I is to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWSF or DMC. This will be achieved through a program consisting of the following five tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; and (5) Final Report/Submission of Design Package.

  19. The development of coal-based technologies for Department of Defense facilities: Phase 1 final report. Volume 1: Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Pisupati, S.V. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1997-01-31

    The first phase of a three-phase project investigating the development of coal-based technologies for Department of Defense facilities has been completed. The objectives of the project are to: decrease DOD`s dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase 1 activities were focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water mixtures (MCWMs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. The specific objective in Phase 1 was to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWM or DMC. This was achieved through a project consisting of fundamental, pilot-sale, and demonstration-scale activities investigating coal beneficiation and preparation, and MCWM and DMC combustion performance. In addition, detailed engineering designs and an economic analysis were conducted for a boiler located at the Naval Surface Warfare Center, near Crane, Indiana. Results are reported on MCWM and DMC combustion performance evaluation; engineering design; and cost/economic analysis.

  20. Research on Food Science and Technology Innovation Based on National Food Security: A Case Study of Hubei Province

    Institute of Scientific and Technical Information of China (English)

    Qingfang; YANG; Junying; WEI

    2015-01-01

    Based on the background of national food security,this paper analyzes the current situation of food production in Hubei Province that except food yields,overall production situation is not good. Through the food production,storage and circulation,this paper describes the role of food science and technology innovation in food security,and further points out the problems of food science and technology innovation system in Hubei Province,such as disconnection between food science and technology innovation research and food production as well as economic development,backward management system failing to adapt to the needs of agricultural transformation,and low conversion rate of food scientific and technological innovation. Based on this,this paper sets forth the recommendations for food security in Hubei Province.

  1. Scientific and Technological Innovation Is an Important Approach to Ensuring China's Oil Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production,energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security.

  2. CrossTalk: The Journal of Defense Software Engineering. Volume 18, Number 10

    Science.gov (United States)

    2005-10-01

    renewable systems are being deployed by telephone companies for new, always-con- nected applications such as Internet Protocol Television ( IPTV ), where...Survivable Information Systems Designing survivability measures into an information system from the start allows continued operations through failure...Information Technology Security Arms Race This author discusses how an intrusion prevention system can fill the need for new technology defenses to

  3. In Defense of Engineering Sciences: On the Epistemological Relations Between Science and Technology

    NARCIS (Netherlands)

    Boon, Mieke

    2011-01-01

    This article presents an overview of discussions in the philosophy of technology on epistemological relations between science and technology, illustrating that often several mutually entangled issues are at stake. The focus is on conceptual and ideological issues concerning the relationship between

  4. Planetary Defense is More Than Science and Technology: Policy, People, and Disaster Management

    Science.gov (United States)

    Harrison, A. A.

    2009-12-01

    Physical scientists and engineers who work to identify and then deflect or destroy threatening Near Earth Objects deserve the support of colleagues who have a thorough understanding of human psychology, society and culture. Behavioral and social scientists can help build governmental and public support for vigorous and comprehensive programs of planetary defense as well as apply their work to minimize the human cost of NEO threats and impacts. Tasks include preparing the public for a succession of possible threats of differing levels; developing effective warning and evacuation strategies; and supporting residents of affected areas during the impact and recovery phases. Although much can be learned from the pre-existing disaster literature, it is important to remain mindful of differences between asteroid or comet impacts and other natural disasters such as hurricanes and earthquakes. After identifying widespread but erroneous stereotypes that exaggerate human weakness and interfere with effective disaster planning, we turn to models whereby international, national, and regional organizations help local communities and citizens develop the skills, attitudes and resources that they need to help protect their own welfare. These models view residents of disaster areas as part of the solution as well as part of the problem, acknowledge dangers and disruptions outside of the immediate impact area, and demand high sensitivity to political and cultural issues. We conclude with a brief discussion of strategies for preserving the human legacy under worst-case scenarios including the construction and administration of survival communities and sending time capsules into space. Anthropology, political science, psychology and sociology are already contributing to astrobiology and SETI, and it is time for researchers and practitioners in these areas to become conspicuous partners in the pursuit of planetary defense.

  5. Public Security Risk Factors and Defense Measures of 2014 Nanjing Youth Olympic Games%2014年南京青奥会公共安全风险及防范对策

    Institute of Scientific and Technical Information of China (English)

    张锋

    2012-01-01

    举办青奥会,事关城市形象和国家利益,安全是关键所在.在公共安全领域,南京青奥会除了借鉴国内外大型体育赛事举办的经验之外,更重要的是根据南京的实际情况,运用风险管理技术,因地制宜地进行风险管理.本文从风险管理的角度出发,对2014年青奥会的公共安全风险进行分析,并结合国内外大型体育活动公共安全风险管理经验,提出南京青奥会公共安全风险防范措施,期望能对南京青奥会公共安全风险管理工作有所借鉴.%Nanjing will hold Youth Olympic Games in 2014, which is the image of the city and the interests of the state, and peace is the key. As the 2014 Youth Olympic Games organizer, Nanjing must draw lessons from others in the area of public security. It is important to apply risk management technology according to Nanjing reality and carry out the risk management to local conditions. The paper applies all kinds of risk management technology, combines successful experience of previous domestic and foreign large-scale sports activities, puts forward some risk defense measures, and hopes it will be helpful to Nanjing Youth Olympic Games, risk management.

  6. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  7. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    CERN Document Server

    Barskar, Raju; Bharti, Jyoti; Ahmed, Gulfishan Firdose

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appropriate to all business transactions and, within e-commerce there is no one technology that can or should be appropriate to all requirements. E-commerce is not a new phenomenon; electronic markets, electronic data interchange and customer e-commerce. The use of electronic data interchanges as a universal and non-proprietary way of doing business. Through the electronic transaction the security is the most important phenomena to enhance the banking transaction security via payment transaction.

  8. Power Enterprise Information System Security Technology Study%电力企业信息系统安全技术的研究

    Institute of Scientific and Technical Information of China (English)

    尚文

    2011-01-01

    In recent years,information technology development,a variety of attack techniques,network intrusion technical level has also been rapid development,which requires electric power industry, computer information systems there is a corresponding change in the structure,the establishment of defense in depth security system that can effective against various types of attack,to improve the power industry the security of information systems.%近年来,在信息技术发展的同时,各种攻击技术、网络入侵技术水平也得到了飞速发展,这就要求电力行业计算机信息系统的结构有相应的变化,建立纵深防御的安全系统,能有效地抵御各类攻击,以提高电力行业信息系统的安全性。

  9. Can Technology Acceptance Model be Applied on the Rural Setting: The Case of Village Development and Security Committee in Malaysia

    Directory of Open Access Journals (Sweden)

    Bahaman A. Samah

    2011-01-01

    Full Text Available Problem statement: Malaysia has come out with a number of strategies such as National Information Technology Center, Universal Services Provider, Rural Internet Center and Rural Info Center to strengthen and encourage ICT usage among the rural community. Besides the efforts that are brought by the government, do the rural community especially their leaders which are the Village Development and Security Committee use ICT? Approach: The main objective of this study was to investigate any relationship that might occur between variables of Technology Acceptance Model and ICT usage among Village Development and Security Committee. A total of 240 Village Development and Security Committees were selected as the respondents for this study where a developed questionnaire was used to gain the data needed. For the purpose of analysis, SPSS was used where descriptive and inferential analyses were performed. Results: Based on the analyses run, it can be concluded that Village Development and Security Committee in Malaysia have a moderate level of ICT usage. Further analyses run showed that all of the three variables of Technology Acceptance Model namely attitude, perceive ease of use and perceive usefulness have a positive and significant relationship with ICT usage while attitude was detected as the main contributor towards ICT usage among Village Development and Security Committee. Conclusion/Recommendation: This study has revealed that Technology Acceptance Model that was used to explain ICT usage can be applied within the Malaysian rural setting. It also can be concluded that Village Development and Security Committee with a high level of attitude, perceive ease of use and perceive usefulness towards ICT will have higher level of ICT usage. To further develop and sustain this high level of attitude, perceive ease of use and perceive usefulness towards ICT usage, Village Development and Security Committee must be frequently exposed to ICT information and

  10. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    OpenAIRE

    Raju Barskar; Anjana Jayant Deen; yoti Bharti; Gulfishan Firdose Ahmed

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appro...

  11. Overview of the Defense Programs Research and Technology Development Program for Fiscal Year 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This documents presents a programmatic overview and program element plan summaries for conceptual design and assessment; physics; computation and modeling; system engineering science and technology; electronics, photonics, sensors, and mechanical components; chemistry and materials; special nuclear materials, tritium, and explosives.

  12. A Methodology for Assessing and Ranking Ballistic Missile Defense Technologies Using a System Performance Index

    Science.gov (United States)

    2007-11-02

    suggestions, and guidance concerning the technology assessment process. References 1. Using ACEIT for Total Ownership Cost Modeling and Analysis...2001 World Population Data Sheet, Population Reference Bureau, Washington, DC List of Acronyms ACEIT – Automated Cost Estimating Integrated

  13. The development of coal-based technologies for Department of Defense facilities. Technical progress report, September 1995 - March 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scaroni, A.W. [and others

    1996-10-01

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, the Phase I final report was completed. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included completing a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work continued on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filtering device will be used to demonstrate a smaller and more efficient filtering device for retrofit applications. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  14. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  15. Trust, Engagement, and Technology Transfer: Underpinnings for U.S.-Brazil Defense Cooperation (Strategic Forum, no. 279)

    Science.gov (United States)

    2012-08-01

    percent of do- mestic defense output. COMDEFESA teaches defense resources management at the National War College, the Escola Superior de Guerra , with the...National Defense Strategy,” 35, 17. 24 Fernando Bustamante, “La Transferencia de Tecnologica Militar desde Estados Unidos al Brasil,” Documento de

  16. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  17. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  18. 校园网安全之ACL技术%ACL Technology of Campus Network Security

    Institute of Scientific and Technical Information of China (English)

    高琳

    2013-01-01

    With the development of large-scale open campus network, campus network is facing more and more threat. On the one hand, in order to develop the foreign exchange in college and universities, we must allow access to network resources development, on the other hand, we must ensure the safety of the campus network data and resources. Network security adopts a lot of technology, and through the access control list (ACL), it can filter the data flow, is a basic one of the campus network security means.%随着大规模开放式校园网络的开发,校园网面临的威胁也越来越多。一方面为了高校对外交流的开展,必须允许对网络资源的开发访问,另一方面,又必须确保校园网数据和资源的尽可能安全。网络安全采用的技术很多,而通过访问控制列表(ACL)可以对数据流进行过滤,是实现基本的校园网安全手段之一。

  19. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  20. 国防科技战略管理的理论探讨%Theoretical Study of Strategic Management of Defense Science and Technology

    Institute of Scientific and Technical Information of China (English)

    林聪榕

    2013-01-01

    Strategic management of defense science and technology (SMDST) is an important guarantee of effective implementation of developing strategy of defense science and technology. The paper studies the relevant theoretical problems of SMDST, including connotation of SMDST, development status of SMDST, basic process of SMDST, several major problems of SMDST in China, it is of important meaning to work out Chinese developing strategy of defense science and technology and speed development of defense science and technology.%国防科技战略管理是国防科技发展战略有效实施的重要保证.系统研究国防科技战略管理的有关理论问题,包括国防科技战略管理的内涵、国防科技战略管理的发展现状、国防科技战略管理的基本过程、我国国防科技战略管理中应重视的问题等,对于科学制定我国的国防科技发展战略,加快国防科技发展具有重要意义.

  1. Handbook for Implementing Agile in Department of Defense Information Technology Acquisition

    Science.gov (United States)

    2010-12-15

    9-42 9.2.2 Storyboarding and Mockups ...Wire-frame Mockup of iTunes Cover Flow Feature (source: http://www.balsamiq.com/products/ mockups /examples#mytunez...patterns. The decision to use web technologies, for instance, implies that the team member have extensive knowledge of the HTTP protocol, HTML, Javascript

  2. DEFENSE SCIENCE AND TECHNOLOGY Adopting Best Practices Can Improve Innovation Investments and Management

    Science.gov (United States)

    2017-06-01

    approach to organizing and executing their technology development activities by grouping them into two portfolios: incremental and disruptive, as shown in...for product development . Disruptive R&D is often sponsored by a corporate research organization , which makes project investment decisions... development investments. To develop these plans, companies solicit ideas and information from people across the organization to determine the

  3. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  4. Defining Moments: Selected Highlights from 25 Years of Missile Defense Technology Development and Transfer. A Technology Applications Report

    Science.gov (United States)

    2006-05-23

    magnetoresistive random access memory ( MRAM ), that might withstand radiation. Although MRAM would com- bine the advantages of existing types of memory, it is...still being developed. However, devices needed for MRAM are being used to improve medical products. Technology Solutions. MRAM uses magnetic fields to...extremely sensitive sensor. Most hard drives use this to read data and NVE has developed several GMR tech- nologies in its push toward MRAM . Cashing In

  5. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  6. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  7. Observations on Japan's New Security Strategy

    Institute of Scientific and Technical Information of China (English)

    Hu Jiping

    2005-01-01

    @@ On December 10, 2004, Japan's Security Council (also called Defense Council before 1986, which is composed of Prime Minister and several important Cabinet members) and Cabinet approved and published a new National Defense Program Guideline ("Defense Guideline" in short), which elaborated not only Japan's defense force construction objectives and its detailed development program in the coming 10 years, but also great changes in its basic defense principles, concept of security threats, security objectives and their corresponding measure.

  8. P2P网络安全及防御技术研究综述%Survey of P2P Network Security and Defense Mechanism

    Institute of Scientific and Technical Information of China (English)

    刘悦; 李强; 李舟军

    2013-01-01

    The applications based on P2P networks have been playing an important role in the Internet. P2P networks with the distributed architecture are scalable and flexible while they are facing the enormous security challenges. This paper began with an overview of the concepts and features of the P2P network,and explained the difference between it and traditional C/S structure, then detailed the three popular methods of attack against the P2P networks:Sybil attack, Eclipse attacks and DDoS attack,and pointed out the relations and differences of the three kinds of attack, finally gave an overview of research on the defensive measures against the attacks.%基于P2P网络的各类应用逐渐占据了互联网应用中的重要地位,其采用的分布式结构在提供可扩展性和灵活性的同时,也面临着巨大的安全风险和挑战.首先概述了P2P网络的基本概念与特点,并说明了P2P系统与传统C/S结构系统的区别;随后详细介绍了目前对P2P网络威胁和影响最大的3种攻击方法:Sybil攻击、Eclipse攻击和DDoS攻击,指出了3种攻击方法的联系与区别;最后分别概述了针对这3种攻击方法相应的防御措施.

  9. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    Energy Technology Data Exchange (ETDEWEB)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  10. AlphaCo: A Teaching Case on Information Technology Audit and Security

    Directory of Open Access Journals (Sweden)

    Hüseyin Tanriverdi

    2006-03-01

    Full Text Available Recent regulations in the United States (U.S. such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal control mechanisms that minimize them have become important and created an urgent need for professionals who are equipped with IT audit and security skills and knowledge. However, there is severe shortage of teaching cases that can be used in courses aimed at training such professionals. This teaching case begins to address this gap by fostering classroom discussions around IT audit and security issues. It revolves around a hacking incident that compromised online order processing systems of AlphaCo and led to some fraudulent activity. The hacking incident raises a series of questions about IT security vulnerabilities, internal control deficiencies, integrity of financial statements, and independent auditors’ assessment of fraud in the context of the Sarbanes-Oxley Act. The case places students in the roles of executives, IT managers, and auditors and encourages them to discuss several important questions: how and why did the hacking incident happen; what harm did it cause to the firm; how can the firm prevent such hacking incidents in the future; if they do happen, how can the firm detect hacking incidents and fraud sooner; how do auditors assess the impact of such incidents in the context of a financial statement audit; and whether the management

  11. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    Electronic Funds Transfer EPC Electronics Product Code FOC Full Operational Capability FPDS-NG Federal Procurement Data System-Next Generation...technology, when they knew that the Electronics Product Code ( EPC ) global Generation 2 (Gen 2) standard had already been developed. Further, DoD...all material with pRFID tags attached. The rationale offered for instituting the change after the deadline was to help ensure that contractors would

  12. Analysis of Expedited Defense Contracting Methods in the Acquisition of Emerging Technology

    Science.gov (United States)

    2016-12-01

    to develop it. Taking a step back requires considering how businesses and market segments view the government as a buying organization. The...government’s purchasing role and magnitude varies by vendor and market segment . Some vendors rely predominantly or almost entirely on government sales. For...cost-effective buyer in the marketplace, especially in crowded and critical market segments like emerging technology. Competing buyers—private firms

  13. 基于大数据的网络安全态势感知技术研究%Research on Network Security Situational Awareness Technology Based on Big Data

    Institute of Scientific and Technical Information of China (English)

    管磊; 胡光俊; 王专

    2016-01-01

    Information security is becoming a big data analysis problem. Based on the current situation of network space security and defense requirements, this paper analyzes the disadvantages of traditional network security defense system and the advantages of network security analysis using big data technology, and proposes a security situational awareness platform which integrates security data collection, processing, analysis and security risks discovery, monitoring, warning and prejudgment. The platform integrates the user terminals, network links, application systems, data lfow and other sensing data sources, and by using machine intelligence analysis technology after storing converged data, combined the analysis algorithms such as data processing, security rule model and attack reasoning model, converts the seemingly unrelated, unordered alarm data and logs into intuitive and visual security event information. The platform mines threat intelligence from massive data, so as to realize the risk discovery, security early warning and situation awareness, enhancing the ability of attack detection and security situation awareness in security monitoring. This paper expounds system platform technology, principle and implementation method from 3 aspects of multi-source security data collection and storage, threat intelligence data analysis and situation awareness application, and describes the system deployment, test run and application conditions.%信息安全问题正在成为一个大数据分析问题。文章从我国当前网络空间安全形势及防御需求出发,分析了传统网络安全防御体系的不足及应用大数据技术进行网络安全分析的优势,并在此基础上提出了一种集安全数据采集、处理、分析和安全风险发现、监测、报警、预判于一体的安全态势感知平台。该平台整合安全区域内用户终端、网络链路、应用系统、数据流量等各类感知数据源,经统一汇聚存储后,

  14. Computer Network Security Protection Technology Analysis%计算机网络安全防护技术探析

    Institute of Scientific and Technical Information of China (English)

    宋朋鸽

    2015-01-01

    本文以计算机网络安全隐患以及网络安全特点作为出发点,分析了影响计算机网络安全的主要因素,并从加密技术、入侵检测技术、病毒防范技术等方面探讨了优化计算机网络安全保护途径,以期为构建计算机网络安全防护体系提供参考。%This article to computer network security risks and characteristics of network security as the starting point, analyzes the main factors that affect computer network security, and explore optimization of computer network security protection by encryp-tion technology, intrusion detection technology, virus protection technology. This paper hopes to provide reference for construction of computer network security protection system.

  15. AlGaInN laser diode technology and systems for defence and security applications

    Science.gov (United States)

    Najda, Stephen P.; Perlin, Piotr; Suski, Tadek; Marona, Lujca; Boćkowski, Mike; Leszczyński, Mike; Wisniewski, Przemek; Czernecki, Robert; Kucharski, Robert; Targowski, Grzegorz; Watson, Scott; Kelly, Antony E.

    2015-10-01

    AlGaInN laser diodes is an emerging technology for defence and security applications such as underwater communications and sensing, atomic clocks and quantum information. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., ~380nm, to the visible ~530nm, by tuning the indium content of the laser GaInN quantum well. Thus AlGaInN laser diode technology is a key enabler for the development of new disruptive system level applications in displays, telecom, defence and other industries. Ridge waveguide laser diodes are fabricated to achieve single mode operation with optical powers up to 100mW with the 400-440nm wavelength range with high reliability. Visible free-space and underwater communication at frequencies up to 2.5GHz is reported using a directly modulated 422nm GaN laser diode. Low defectivity and highly uniform GaN substrates allow arrays and bars to be fabricated. High power operation operation of AlGaInN laser bars with up to 20 emitters have been demonstrated at optical powers up to 4W in a CS package with common contact configuration. An alternative package configuration for AlGaInN laser arrays allows for each individual laser to be individually addressable allowing complex free-space or optical fibre system integration with a very small form-factor.

  16. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    Energy Technology Data Exchange (ETDEWEB)

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  17. Data Security Technology of Cloud Computing%云计算数据安全技术探讨

    Institute of Scientific and Technical Information of China (English)

    吴绘萍

    2014-01-01

    计算机技术发展的过程中,数据安全问题一直是一个重要课题,云计算概念的提出为计算机数据安全工作提供了新的解决办法。文章根据目前计算机网络安全的现状,对云计算数据安全技术的相关工作进行探讨。%The process of development of computer technology, data security issue has been an important topic, proposed the concept of cloud computing computer data safe work provides a new solution to. According to the article the current status of computer network security, cloud computing data security technologies related work are discussed.

  18. Students' Ontological Security and Agency in Science Education--An Example from Reasoning about the Use of Gene Technology

    Science.gov (United States)

    Lindahl, Mats Gunnar; Linder, Cedric

    2013-01-01

    This paper reports on a study of how students' reasoning about socioscientific issues is framed by three dynamics: societal structures, agency and how trust and security issues are handled. Examples from gene technology were used as the forum for interviews with 13 Swedish high-school students (year 11, age 17-18). A grid based on modalities from…

  19. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-03-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  20. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... resources; Date and time of access; Logs of activity of DHS IT resources; IP address of access; Logs of... to the Department that is derived from other sources to facilitate authorized access to DHS... General Information Technology Access Account Records system of records security protocols will...

  1. Investing in Science and Technology to Meet Africa’s Maritime Security Challenges (Africa Security Brief, Number 10, February 2011)

    Science.gov (United States)

    2011-02-01

    collaborative “anchors” to sustain the effectiveness of maritime security efforts. H I G H L I G H T S N O . 1 0 / F E B R U A R Y 2 0 11 continue...endowed. —Nelson Mandela Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated...for assess- ing the most cost- effective strategies for monitoring Africa’s waters for illegal activity. The engagement of African researchers in

  2. Analysis of Network Security and Security Technology%网络安全及保障技术探析

    Institute of Scientific and Technical Information of China (English)

    王淼

    2011-01-01

    In the twenty-first century,along with the rapid development of Internet,computer networks,applications to enterprises and institutions have in-depth field.Computer networks has brought great convenience to mankind,but also information on the human security challenges as well.How to more effectively protect information security computer network to better serve the people and national interests,we now have become urgent problems.%在二十一世纪,伴随着互联网的迅猛发展,计算机网络的应用已经深入到企事业单位领域。计算机网络在给人类带来极大便利的同时,也对人类的信息以及安全提出了挑战。如何更有效地保障计算机网络的信息安全以便更好的为人民以及国家利益服务,便成为我们目前所急需解决的问题。

  3. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    Energy Technology Data Exchange (ETDEWEB)

    Eipeldauer, Mary D [ORNL; Shelander Jr, Bruce R [ORNL

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

  4. APEC energy security and sustainable development through efficiency and diversity - economic issues in technology R & D, adoption and transfer

    Energy Technology Data Exchange (ETDEWEB)

    Hogan, L.; Curtotti, R.; Austin, A.

    2007-04-15

    The Asia Pacific Economic Cooperation forum (APEC) has an important role to play in strengthening regional economic cooperation and in addressing the regional energy security and sustainable energy development issues that have become more prominent in recent years. Key objectives in this report are to present an overview of the challenges facing APEC economies in meeting the region's growing energy requirements, with a focus on the energy requirements of the APEC stationary energy sector, and to assess the role that cleaner fuels and energy technologies can play in achieving a more secure and sustainable energy sector in the APEC region. The report also examines barriers to investment and policy options that encourage the development and deployment of energy technologies that can enhance energy security and environmental sustainability in the APEC region. Appendix D deals with coal fired power generation technologies. The report was prepared in anticipation of the eighth meeting of the APEC Energy Ministers Meeting. To support energy policy formulation by energy ministers, relevant background information is provided on clean and energy efficient technologies, alternative and renewable fuels, and environmentally sustainable energy technologies. 59 refs., 24 figs., 19 tabs., 5 apps.

  5. The Research and Application of Security and Defense System in Regional Service Based on Internet%基于Internet的区域服务安全防御系统的研究与应用

    Institute of Scientific and Technical Information of China (English)

    肖犁

    2011-01-01

    Internet作为信息分享平台越来越受到人们的关注,并在人们的日常生活中占据了重要的一席之地,但是随之而来的安全问题也开始日益严重。如何在实现数据共享的同时保证隐私和信息的可靠性开始成为IT行业研究的对象。本文主要研究了区域网络的安全防御系统,并通过实例证明了安全防御系统的重要性。%Internet has gained more and more attention as an information shared platform,while has taken a great place in people’s daily life.Moreover,the ensuing security problems have begun to increasingly serious.How to achieve data sharing while ensuring privacy and the reliability of the information has become the studying object in IT occupation.This paper studies the regional network security defense system,and demonstrates the importance of security and defense systems by example.

  6. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  7. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three month long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Proceeding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near term, cost effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  8. 电力二次系统主动安全防御策略及实现%An Active Security Defense Strategy and Its Implementation for the Power Secondary System

    Institute of Scientific and Technical Information of China (English)

    冯兆红; 贾铁军

    2015-01-01

    在分析数据安全和业务安全保护侧重点的基础上,结合电力二次系统结构对系统按数密和业密级别高低进行安全分区。针对电力二次系统的业务实际及其运行过程中存在的不安全因素,对内外网之间进行通信安全部署,提出主动安全防御策略,有效地解决了电力二次系统中存在的数据和业务安全保护的矛盾,提高了系统的检测辨识能力及整体防御功效。%On the basis of analyzing the protection sides of data security and business security,the power secondary system is divided into different sections according to the level of data secrecy and business secrecy.Under consideration of actual business of the power secondary system and unsafe factors in its operation,this paper makes a communication security deployment between the internal and external networks and proposes an active security defense strategy,thus effectively resolving the contradiction between data and business security protection in the power secondary system and improving the detection identification ability of the system.

  9. Research on Cloud Computing, SDN and Security Technology%云计算及SDN与安全技术研究

    Institute of Scientific and Technical Information of China (English)

    胡章丰; 郭春梅; 毕学尧

    2013-01-01

    文章重点围绕云计算、SDN及安全这3方面的内容展开讨论,深入分析和研究了3者之间的相互关系,并提出了一种基于SDN的云计算安全架构。%This paper investigates the internal relationships between cloud computing, SDN and security technology, and then proposes a SDN-based security architecture for cloud computing.

  10. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  11. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  12. Arrangement on the Recognition of Common Criteria Certificates In the Field of Information Technology Security

    Science.gov (United States)

    2000-05-01

    Security Establishment from Canada and Ministry of Finance from Finland and Service Central de la Sécurité des Systèmes d’Information from France and...39 HQ Defence Command Norway/Security Division from Norway and Ministerio de Administraciones Públicas from Spain and Communications-Electronics...Canadian Common Criteria Evaluation and Certification Scheme sponsored by Communications Security Establishment, from Canada Schema d’Evaluation et

  13. Manifesto of Technological Culture: a Critically Annotated Defense of Technepolitanism and The Hollow Revolution: Alienation and Manipulation in the Digital Age

    OpenAIRE

    Dagenais, Christopher

    2013-01-01

    Manifesto of Technological Culture: a Critically Annotated Defense of Technepolitanism- A critical analysis of our emerging technocracy unfolds through an annotated commentary on an imagined technocrat’s manifesto. The essay contrasts the romanticization of technology’s liberating qualities with a sober warning about its tendency towards oppression.The Hollow Revolution: Alienation and Manipulation in the Digital Age- Approximately one third of the world’s population uses the Internet. It is ...

  14. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    Energy Technology Data Exchange (ETDEWEB)

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the &apos

  15. Application of the JDL data fusion process model for cyber security

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  16. On the Growth and Welfare Effects of Defense R&D

    OpenAIRE

    Chu, Angus C.; Lai, Ching-Chong

    2009-01-01

    In the US, defense R&D share of GDP has decreased significantly since 1960. To analyze the implications on growth and welfare, we develop an R&D-based growth model that features the crowding-out and spillover effects of defense R&D on civilian R&D. The model also captures the effects of defense technology on (i) national security resembling consumption-type public goods and (ii) aggregate productivity via the spin-off effect resembling productive public goods. In this framework, economic grow...

  17. Study on application of the information security technology. Survey on a technology to assure safety on communication routes; Joho security gijutsu no tekiyo kenkyu. Tsushin keirojo no anzen hosho gijutsu no chosa

    Energy Technology Data Exchange (ETDEWEB)

    Kimura, S. [Kansai Electric Power Co. Inc., Osaka (Japan)

    1998-11-10

    This paper describes the communication information security technology. Encoding is a generic term for the method to make data unreadable to persons other than those authorized. Of the encoding algorithms in the Internet, the common key system uses the same key for both of encoding and decoding, where the same key is shared and maintained confidentially by a transmitter and a receiver. The open key system uses two keys made in two pairs called an open key and a confidential key. Encoding is performed by using the open key possessed by a transmitter and decoding is possible only by the counterpart possessing the confidential key. Good points of both systems are combined and mounted in actual systems. This paper also describes a verification technology as a mechanism to prevent unauthorized data alteration. In security protocols, security function (encoding) is added to a communication protocol. The virtual private network has come recently to the practical application phase to realize such an environment that a dedicated line is installed virtually on an Internet line by applying the encoding technology, making it possible to structure a low-cost and safe communication routes. (NEDO)

  18. Analysis of Key Technologies on Cloud Computing Security%云计算安全关键技术分析

    Institute of Scientific and Technical Information of China (English)

    郭瑞鹏

    2012-01-01

    The emergence of cloud computing enables the enterprises and individuals through the network to use computing resources and storage resources conveniently, cloud computing in data security issues are also increasingly attracted widespread attention. This paper discusses the objectives and requirements of cloud computing security, and analyzes the cloud computing user access, encryption technology, access control, virtualization security and other critical security technologies.%云计算的出现使企业与个人可以通过网络方便地使用云中的计算资源和存储资源,云计算中数据安全问题也越来越引起人们的广泛关注.本文讨论云计算安全的目标和要求,对云计算中的用户接入、加密技术、访问控制、虚拟化安全等关键安全技术进行分析.

  19. Effect of Tri-Staple Technology and Slow Firing on Secure Stapling Using an Endoscopic Linear Stapler.

    Science.gov (United States)

    Hasegawa, Suguru; Nakayama, Shinya; Hida, Koya; Kawada, Kenji; Sakai, Yoshiharu

    2015-01-01

    To evaluate the effect of Tri-staple technology and slow firing using the Endo-GIA endoscopic linear stapler. The cardiac and pyloric portions of porcine stomachs were divided using the endoscopic linear stapler with different reload types. A total of 8 min of waiting time was employed during firing in the slow-firing group and no waiting time was employed in the normal-firing group. The shape of the staples was then evaluated. The length of the staple line and serosal laceration was also determined. There was a moderate negative correlation between tissue thickness and secure staple formation. Tri-staple reloads (purple, black) offered more secure staple formation compared with Universal green reload. Although slow firing enhanced secure staple formation, its effect was greater when using green reload, compared with Tri-staple reloads. Significantly shorter staple line length and longer serosal laceration was observed in the thick tissue. Although the cartridge type did not influence lengths of the staple line or serosal laceration, both were better in the slow-firing group. Tri-staple reloads offered more secure staple formation compared with the Universal reload. Although slow firing improved staple line shortening and serosal laceration, its effect on secure stapling was relatively small when using Tri-staple reloads. © 2015 S. Karger AG, Basel.

  20. Defense technology of phishing attack and design of defense framework%网络钓鱼攻击的防御技术及防御框架设计

    Institute of Scientific and Technical Information of China (English)

    赵跃华; 胡向涛

    2013-01-01

    现有的反钓鱼技术多是通过检测可疑网站与真实网站的URL和网页相似度来检测钓鱼攻击,而对于新出现的在网页中嵌入恶意代码的钓鱼攻击防御效果不佳.在分析当前的网络钓鱼攻击防御技术的基础上,针对传统方法不能防御的新型钓鱼攻击给出了解决方法,并融合传统的防御技术提出了一个防御钓鱼攻击的整体框架,弥补现有防御方法的不足,从而提高了钓鱼攻击的检测率,降低了漏报率.实验结果表明,提出的方法是有效的.%The current anti-phishing technologies detect the phishing attacks through comparing similarity of URL or Web pages between suspect Website and real Website.However,it cannot work effectively on those new attacks by the insertion of malicious code to Web pages.Based on analysis of existing defense technologies of phishing attacks,this paper put forward solutions to those new attacks which couldn't be prevented by traditional methods.It also proposed a further new overall defensive framework which incorporated traditional ones,to make up defects of the original methods,increased the detection rate of phishing attacks,and decreased the false negative rate.Experimental results show that the proposed defense methods are effective.