WorldWideScience

Sample records for f-secure internet security

  1. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  2. Security Issues on the Internet.

    Science.gov (United States)

    Bar-Ilan, Judit

    1996-01-01

    Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)

  3. Security of the Internet Transactions

    Institute of Scientific and Technical Information of China (English)

    Felix Musau; Shengbing Ren; Shouyi Yu

    2002-01-01

    The new generation of networked business solutions brings legacy data and applications to the world wide Web, and lets companies redefine internal and external business processes. The present need for internet transaction has forced many business to adopt the internet forms of distribution of its business items. This has threatened security, hence needs to be given a key priority. This paper alights the key areas on how to protect the information we transact on the internet. It also aims at improving the security of our data and the computers we use to access this data.

  4. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  5. Security in Internet of Things

    OpenAIRE

    Song, Yuanjun

    2013-01-01

    The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the ...

  6. Practical Unix and Internet Security

    CERN Document Server

    Garfinkel, Simson; Spafford, Gene

    2003-01-01

    When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix varia

  7. Commercial Security on the Internet.

    Science.gov (United States)

    Liddy, Carrie

    1996-01-01

    Discusses commercial security on the Internet and explains public key technology as successfully melding the conflicting requirements of openness for practical business applications and isolation and confidentiality for protection of data. Examples of public key value-added products are described, including encryption, digital signature and…

  8. Secure Environment for Internet Browsing

    Directory of Open Access Journals (Sweden)

    Alexandru Tudor Gavrilescu

    2014-03-01

    Full Text Available The Internet is used by a large proportion of the population, but unfortunately their education regarding the usage of the instruments available is poor, resulting in potential informational frauds, especially in the financial field.In this article I have approached a few simple problems, yet very important and frequently occurred, regarding the secure environment for Internet browsing, proposing solutions for each of them. The security methods are: anti-phishing; the prevention of SQL injection, through the verification of the data given as input in the Address Bar and in the password fields and blocking the access in case of a potential threat; a virtual keyboard for preventing the recording of the keys pressed (key loggers; the backup of the credentials in a local file and the encryption of it to prevent unauthorized access, the decryption of the data is made using a unique encryption key, owned by the user.

  9. [The Internet and its security].

    Science.gov (United States)

    Masić, Izet; Ahmetović, Ademir; Jakupović, Safet; Masić, Zlatan; Zunić, Lejla

    2002-01-01

    Internet, is the greatest world net by by means of which nowadays the planet communicates, rapidly goes forward. The last years of the university in USA the commonly develop the more progressive concept of the net (Internet 2), thanks to the constant growing technologies, with the goal to answer the needs of the scientific and the educational institutions, but also the commercial institutions and the organizations. Almost the there is no more significant institution in the world which has not developed their web pages and data bases with the most actual contents available to the wider circle of the users. In this paper we have given the section of the most actual web pages. However, Internet is not immune to those users who are not benevolent and who have developed the different tools in the goal of the destroying or unabling of the normal use of all the Internet conveniences. The authors is considering the protection problem and the data security which get distributed by Internet.

  10. Internet Safety and Security Surveys - A Review

    DEFF Research Database (Denmark)

    Sharp, Robin

    This report gives a review of investigations into Internet safety and security over the last 10 years. The review covers a number of surveys of Internet usage, of Internet security in general, and of Internet users' awareness of issues related to safety and security. The focus and approach...... of the various surveys is considered, and is related to more general proposals for investigating the issues involved. A variety of proposals for how to improve levels of Internet safety and security are also described, and they are reviewed in the light of studies of motivational factors which affect the degree...

  11. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  12. Problem of Information Security Traffic on Internet

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2012-10-01

    Full Text Available Internet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.

  13. Teaching Internet Security, Safety in Our Classrooms

    Science.gov (United States)

    DeFranco, Joanna F.

    2011-01-01

    Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…

  14. Security of Mobile Agents on the Internet.

    Science.gov (United States)

    Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare

    2001-01-01

    Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)

  15. Internet and data communication security

    OpenAIRE

    Zoranović, Tihomir

    2014-01-01

    Digital communication is so common now days that we have almost forgot about any other way to transfer data. Accessibility, simplicity and ease of use of digital devices had lead to very little thinking about the disadvantages or dangers of this type of data transfer. Internet today represents the most commonly used channel for data transmission. However, the transmission of data over the Internet is now one of the most delicate operations of every institution, company, household or individua...

  16. Security Survey of Internet Browsers Data Managers

    CERN Document Server

    Boja, Catalin

    2011-01-01

    The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

  17. Security Survey of Internet Browsers Data Managers

    Directory of Open Access Journals (Sweden)

    Catalin Boja

    2011-09-01

    Full Text Available The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

  18. Implementing Security for Active Networks in Internet

    Institute of Scientific and Technical Information of China (English)

    Tang Yin; Wang Weiran

    2003-01-01

    Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed.

  19. Internet Governance and National Security

    Science.gov (United States)

    2012-01-01

    advanced deploy­ ment of IPv6 in Russia and China and development of new standards by near-peer-competitor countries are creating new technical...edge of developing the standards of next- generation mobile 4G LTE networks.21 One example of how efforts at friendly conquest can backfire and make...Foreseeing this Internet protocol, engineers developed IPv6 , which among other improvements increased the total number of potential Strategic Studies

  20. Engineering secure Internet of Things systems

    CERN Document Server

    Aziz, Benjamin; Crispo, Bruno

    2016-01-01

    This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.

  1. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  2. Trust Management and Accountability for Internet Security

    Science.gov (United States)

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  3. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  4. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  5. Randomness Quality of CI Chaotic Generators: Applications to Internet Security

    CERN Document Server

    Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

    2011-01-01

    Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.

  6. Security incidents on the Internet, 1989--1995

    Energy Technology Data Exchange (ETDEWEB)

    Howard, J.D.

    1995-12-31

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  7. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  8. Security Techniques for Sensor Systems and the Internet of Things

    Science.gov (United States)

    Midi, Daniele

    2016-01-01

    Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…

  9. Model-based security engineering for the internet of things

    OpenAIRE

    NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; Baldini, Gianmarco; VAN HOESEL Lodewijk

    2015-01-01

    We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...

  10. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    OpenAIRE

    Stanislav A. Shikov

    2017-01-01

    Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT), and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of T...

  11. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  12. Can Cyberloafing and Internet Addiction Affect Organizational Information Security?

    Science.gov (United States)

    Hadlington, Lee; Parsons, Kathryn

    2017-09-05

    Researchers have noted potential links between Internet addiction, the use of work computers for nonwork purposes and an increased risk of threat to the organization from breaches in cybersecurity. However, much of this research appears conjectural in nature and lacks clear empirical evidence to support such claims. To fill this knowledge gap, a questionnaire-based study explored the link between cyberloafing, Internet addiction, and information security awareness (ISA). A total of 338 participants completed an online questionnaire, which comprised of the Online Cognition Scale, Cyberloafing Scale, and the Human Aspects of Information Security Questionnaire. Participants who reported higher Internet addiction and cyberloafing tendencies had lower ISA, and Internet addiction and cyberloafing predicted a significant 45 percent of the variance in ISA. Serious cyberloafing, such as the propensity to visit adult websites and online gambling, was shown to be the significant predictor for poorer ISA. Implications for organizations and recommendations to reduce or manage inappropriate Internet use are discussed.

  13. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    Directory of Open Access Journals (Sweden)

    Stanislav A. Shikov

    2017-03-01

    Full Text Available Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT, and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of Things. The author considers security challenges for the “smart home” system. Next section reviews the experiments of the author involved in testing of the Internet of Things devices. Materials and Methods: The subjects of study are the Apple Pay, the ZigBee wireless standard, Tesla Model S electric cars. The main methods for identification of security threats are analysis and comparison. Results: The companies of electronic devices simplify and reduce the price of manufacturing process. The customers and users are rarely interested in levels of electronic devices security policies. This is the weakest link of electronic products in terms of security and safety. The tests demonstrated that modern electronic-based technologies do not reach the 100-percentage security level. Apple Pay mobile payment system demonstrated the highest security rating. Discussion and Conclusions: Modern electronic devices for Internet of Things does not meet all safety requirements, from the point of view of the author. The article recommends analyzing the potential threats and developing new security standards. In addition, the logistics of electronic devices for Internet of Things need to be under control from the manufacturer to equipment installation time.

  14. Security for Multimedia Space Data Distribution over the Internet

    Science.gov (United States)

    Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)

    1995-01-01

    Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.

  15. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  16. A Novel Cyber-Insurance for Internet Security

    CERN Document Server

    Pal, Ranjan; Psounis, Konstantinos

    2011-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

  17. A survey of secure middleware for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Paul Fremantle

    2017-05-01

    Full Text Available The rapid growth of small Internet connected devices, known as the Internet of Things (IoT, is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.

  18. Hardened Client Platforms for Secure Internet Banking

    Science.gov (United States)

    Ronchi, C.; Zakhidov, S.

    We review the security of e-banking platforms with particular attention to the exploitable attack vectors of three main attack categories: Man-in-the-Middle, Man-in-the-PC and Man-in-the-Browser. It will be shown that the most serious threats come from combination attacks capable of hacking any transaction without the need to control the authentication process. Using this approach, the security of any authentication system can be bypassed, including those using SecureID Tokens, OTP Tokens, Biometric Sensors and Smart Cards. We will describe and compare two recently proposed e-banking platforms, the ZTIC and the USPD, both of which are based on the use of dedicated client devices, but with diverging approaches with respect to the need of hardening the Web client application. It will be shown that the use of a Hardened Browser (or H-Browser) component is critical to force attackers to employ complex and expensive techniques and to reduce the strength and variety of social engineering attacks down to physiological fraud levels.

  19. Security Framework and Jamming Detection for Internet of Things

    DEFF Research Database (Denmark)

    Babar, Sachin D.

    The Internet of Things (IoT) consists of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security, trust and privacy perspective. Hence...... the defensive technique for Wireless Sensor Network (WSN)-based IoT. The first part of the thesis proposes the embedded security framework for IoT. The research gives a detailed survey and analysis of embedded security especially in the area of IoT and proposes the security model and threat taxonomy for Io...... of research addresses jamming attack, which is one of the most destructive security attack in the WSN-based IoT. Jamming attack jams the traffic in network by blocking the channel. The different kinds of jamming attack are modelled using unified modelling language (UML). The thesis uses the sequential...

  20. Internet Information:Freedom or Security? A Big Question

    Institute of Scientific and Technical Information of China (English)

    Chih Wang

    2004-01-01

    In the modern democratic society, all people should have freedom of access to, holding, and imparting various formats of information. However, many human fences have limited the freedom of access to information and the free flow of Internet communications. This paper extracts passages from selected international accords and U. S. statutes relating to the people's rights of access to information. It also highlights many U. S. government activities relating to its national security after the September - 11 terrorist attacks and people's reactions with regard to their consequences on the freedom of access to Internet information.

  1. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  2. The security concern on internet banking adoption among Malaysian banking customers.

    Science.gov (United States)

    Sudha, Raju; Thiagarajan, A S; Seetharaman, A

    2007-01-01

    The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.

  3. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these

  4. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Directory of Open Access Journals (Sweden)

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  5. Reliable transmission of security-enabled multimedia over the Internet

    Science.gov (United States)

    Moore, David E.; Ahmed, Farid

    2003-09-01

    In this paper we address the reliable transmission of security-enabled multimedia data over the internet which is becoming increasingly vulnerable to a variety of cyber-attacks. Due to their real-timeliness aspect, multimedia data in Internet mostly uses User Datagram Protocol(UDP) as the transport media as opposed to the Transport Control Protocol (TCP). UDP is inherently an unreliable transport media that results in certain unacknowledged packet losses. Multimedia applications usually can tolerate some packet losses for its rendering at the receiver side. But, for the security-enhanced multimedia that we are talking about, reliability of reception of most of the packets within a certain tolerance time need to be guaranteed. This is where we come in with a new protocol that ensures packet-level reliability as well as stream-level authentication of multimedia.

  6. THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES

    Directory of Open Access Journals (Sweden)

    Mahmoud Elkhodr

    2016-03-01

    Full Text Available The Internet of Things (IoT brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.

  7. Food Security Information Platform Model Based on Internet of Things

    Directory of Open Access Journals (Sweden)

    Lei Zhang

    2015-06-01

    Full Text Available According to the tracking and tracing requirements of food supply chain management and quality and safety, this study built food security information platform using the Internet of things technology, with reference to the EPC standard, the use of RFID technology, adopting the model of SOA, based on SCOR core processes, researches the food security information platform which can set up the whole process from the source to the consumption of the traceability information, provides food information, strengthens the food identity verification, prevents food identification and information of error identification to the consumer and government food safety regulators, provides good practices for food safety traceability.

  8. A Secured Hybrid Architecture Model for Internet Banking (e - Banking

    Directory of Open Access Journals (Sweden)

    Ganesan R

    2009-05-01

    Full Text Available Internet banking has made it easy to carry out the personal or business financial trans action without going to bank and at any suitable time. This facility enables to transfer money to other accounts and checking current balance alongside the status of any financial transaction made in the account. However, in order to maintain privacy and t o avoid any misuse of transactions, it is necessary to follow a secured architecture model which ensures the privacy and integrity of the transactions and provides confidence on internet banking is stable. In this research paper, a secured hybrid architect ure model for the internet banking using Hyperelliptic curve cryptosystem and MD5 is described. This hybrid model is implemented with the hyperelliptic curve cryptosystem and it performs the encryption and decryption processes in an efficient way merely wi th an 80 - bit key size. The various screen shots given in this contribution shows that the hybrid model which encompasses HECC and MD5 can be considered in the internet banking environment to enrich the privacy and integrity of the sensitive data transmitte d between the clients and the application server

  9. ENHANCED ENCAPSULATED SECURITY PAYLOAD A NEW MECHANISM TO SECURE INTERNET PROTOCOL VERSION 6 OVER INTERNET PROTOCOL VERSION 4

    Directory of Open Access Journals (Sweden)

    Rosilah Hassan

    2014-01-01

    Full Text Available A considerable amount of time will be needed before each system in the Internet can convert from Internet Protocol version 4 (IPv4 to Internet Protocol version 6 (IPv6. Three strategies have been proposed by the Internet Engineer Task Force (IETF to help the transition from IPv4 to IPv6 which are dual stack, header translation and tunneling. Tunneling is used when two computers using IPv6 want to communicate with each other and the packet will travel through a region that uses IPv4. To pass through this region, IPv6 packet must be encapsulated in IPv4 packet to have an IPv4 address in order to make it IPv4 routing compatible. Internet Protocol security (IPsec in transport mode carries the payload of the encapsulating packet as a plain data without any mean of protection. That is, two nodes using IPsec in transport mode to secure the tunnel can spoof the inner payload; the packet will be de-capsulated successfully and accepted. IETF mentioned this problem in many RFCs. According to RFC 3964 there is no simple way to prevent spoofing attack in IPv6 over IPv4 tunnel and longer term solutions would have to be deployed in both IPv4 and IPv6 networks to help identify the source of the attack, a total prevention is likely impossible. This study proposed a new spoofing defense mechanism based on IPsec’s protocol Encapsulated Security Payload (ESP. ESP’s padding area had been used to write the IPv6 source address of the encapsulated packet. Simulation is conducted based on two scenarios, one with spoofing attack and one without. The outcome proved that proposed mechanism has managed to eliminate spoofing threat in IPv6 over IPv4 tunnel.

  10. Software Defined Security Service Provisioning Framework for Internet of Things

    Directory of Open Access Journals (Sweden)

    Faraz Idris Khan

    2016-12-01

    Full Text Available Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN have rev-olutionized programmable networks. Designers of networking applications i.e. Internet of things (IoT have started investigating potentials of SDN paradigm in improving network management. IoT envision interconnecting various embedded devices surround-ing our environment with IP to enable internet connectivity. Unlike traditional network architectures, IoT are characterized by constraint in resources and heterogeneous inter connectivity of wireless and wired medium. Therefore, unique challenges for managing IoT are raised which are discussed in this paper. Ubiquity of IoT have raised unique security challenges in IoT which is one of the aspect of management framework for IoT. In this paper, security threats and requirements are summarized in IoT extracted from the state of the art efforts in investigating security challenges of IoT. Also, SDN based security service provisioning framework for IoT is proposed.

  11. Fundamentals for immediate implementation of a quantum secured Internet

    CERN Document Server

    Barbosa, G A

    2006-01-01

    This work shows how a secure Internet for users A and B can be implemented through a fast key distribution system that uses physical noise to encrypt information transmitted in deterministic form. Starting from a shared secret random sequence between them, long sequences of fresh random bits can be shared in a secure way and not involving a third party. The shared decrypted random bits -encrypted by noise at the source- are subsequently utilized for one-time-pad data encryption. The physical generated protection is not susceptible to advances in computation or mathematics. In particular, it does not depend on the difficulty of factoring numbers in primes. Also, there is no use of Linear Feed Back Shift Registers. The attacker has free access to the communication channels and may acquire arbitrary number of copies of the transmitted signal without lowering the security level. No intrusion detection method is needed.

  12. Connecting to the Internet Securely: Windows 2000 CIAC-2321

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W; Call, K; Dias, J

    2002-03-12

    As the threat to computer systems increases with the increasing use of computers as a tool in daily business activities, the need to securely configure those systems becomes more important. There are far too many intruders with access to the Internet and the skills and time to spend compromising systems to not spend the time necessary to securely configure a system. Hand-in-hand with the increased need for security are an increased number of items that need to be securely configured. Windows 2000 has about seven hundred security related policy settings, up from seventy two in Windows NT. While Windows 2000 systems are an extension of the Windows NT 4 architecture, there are considerable differences between these two systems, especially in terms of system and security administration. Operational policy, system security, and file security are other areas where Windows 2000 has expanded considerably beyond the domain model of Windows NT 4. The Windows NT 4 Domain model consists of domains of workstations that, with a single login, share resources and are administered together. The database of user settings and credentials resides in the domain server. Domains can trust other domains to expand the sharing of resources between users of multiple domains. On Windows 2000, the domains still exist but multiple domains that share trust are combined into Domain Trees and Domain Forests depending on how the logical namespace is divided. These trees and forests are combined under a new object called Active Directory. Domains themselves are broken down into Organizational Units. As such, there are more levels at which security policies can be set and for which information sharing can be controlled.

  13. Security Considerations around End-to-End Security in the IP-based Internet of Things

    NARCIS (Netherlands)

    Brachmann, M.; Garcia-Mochon, O.; Keoh, S.L.; Kumar, S.S.

    2012-01-01

    The IP-based Internet of Things refers to the interconnection of smart objects in a Low-power and Lossy Network (LLN) with the Internetby means of protocols such as 6LoWPAN or CoAP. The provisioning of an end-to-end security connection is the key to ensure basic functionalities such as software upda

  14. Security and Privacy Grand Challenges for the Internet of Things

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Zarzhitsky, Dimitri V.; Carroll, Thomas E.; Farquhar, Ethan D.

    2015-08-20

    Abstract— The growth of the Internet of Things (IoT) is driven by market pressures, and while security is being considered, the relationship between the unintended consequences of billions of such devices connecting to the Internet cannot be described with existing mathematical methods. The possibilities for illicit surveillance through lifestyle analysis, unauthorized access to information, and new attack vectors will continue to increase by 2020, when up-to 50 billion devices may be connected. This paper discusses various kinds of vulnerabilities that can be expected to arise, and presents a research agenda for mitigating the worst of the impacts. We hope to draw research attention to the potential dangers of IoT so that many of these problems can be avoided.

  15. Secure management of logs in internet of things

    Directory of Open Access Journals (Sweden)

    Udit Gupta

    2015-07-01

    Full Text Available Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored. With the advent of Internet of Things (IOT it is anticipated that billions of devices will be a part of the internet in another decade. Since those devices will be communicating with each other on a regular basis with little or no human intervention, plethora of real time data will be generated in quick time which will result in large number of log files. Apart from complexity pertaining to storage, it will be mandatory to maintain confidentiality and integrity of these logs in IOT enabled devices. This paper will provide a brief overview about how logs can be efficiently and securely stored in IOT devices.

  16. [Security specifications for electronic medical records on the Internet].

    Science.gov (United States)

    Mocanu, Mihai; Mocanu, Carmen

    2007-01-01

    The extension for the Web applications of the Electronic Medical Record seems both interesting and promising. Correlated with the expansion of Internet in our country, it allows the interconnection of physicians of different specialties and their collaboration for better treatment of patients. In this respect, the ophthalmologic medical applications consider the increased possibilities for monitoring chronic ocular diseases and for the identification of some elements for early diagnosis and risk factors supervision. We emphasize in this survey some possible solutions to the problems of interconnecting medical information systems to the Internet: the achievement of interoperability within medical organizations through the use of open standards, the automated input and processing for ocular imaging, the use of data reduction techniques in order to increase the speed of image retrieval in large databases, and, last but not least, the resolution of security and confidentiality problems in medical databases.

  17. An Efficacious and Secure Registration for Internet Protocol Mobility

    Directory of Open Access Journals (Sweden)

    Senthil Kumar Mathi

    2013-09-01

    Full Text Available For the ample development of mobile internet protocol (IP technology and the recurrent movement of a mobile device, it is necessary for the mobile device to inform their home network where initially registered through an efficient and secured procedure against any sort of attacks. The procedure of registration for IP mobility by the portable system must have a better performance by providing a certain level of security, such as authentication, integrity, replay attack protection, and location privacy. All at once, the extreme security in the registration of IP mobility may cause long registration time, principally for real-time systems. This paper mainly deals with a balanced effort for secure and efficient registration procedure which gives better security and efficiency in terms of registration delay. The proposed work provides an easy and fast registration procedure and lessens the registration delay through the usage of an identity based authenticated key exchange scheme that eliminates expensive pairing operations. The proposed protocol is verified by using AVISPA tool. The performance evaluation reveals that the proposed protocol significantly outperforms the existing protocols in terms of the registration delay.Defence Science Journal, 2013, 63(5, pp.502-507, DOI:http://dx.doi.org/10.14429/dsj.63.4003

  18. Information Security Problem on Internet%因特网上的信息安全问题

    Institute of Scientific and Technical Information of China (English)

    郭晓苗

    2000-01-01

    With the wide use of Internet,the information security problem on Internet becomes more and more serious.The article gives an overall description of the information security problem on Internet,the cause of the problem and some threats to the information security on Internet.

  19. Self Managed Security Cell, a security model for the Internet of Things and Services

    CERN Document Server

    de Leusse, Pierre; Dimitrakos, Theo; Nair, Srijith K; 10.1109/AFIN.2009.15

    2012-01-01

    The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase of their usage make for an augmentation in the number of the security threats and violation attempts that existing security systems do not appear robust enough to address. In this paper, the authors underline this increase in risk and identify the requirements for resources to be more resilient in this type of environment while keeping an important level of flexibility. In addition, the authors propose an architectural model of Self Managed Security Cell, which leverages on current knowledge in large scale security systems, information management and autonomous systems.

  20. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort.

  1. SIT: A Lightweight Encryption Algorithm for Secure Internet of Things

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2017-01-01

    Full Text Available The Internet of Things (IoT being a promising technology of the future is expected to connect billions of devices. The increased number of communication is expected to generate mountains of data and the security of data can be a threat. The devices in the architecture are essentially smaller in size and low powered. Conventional encryption algorithms are generally computationally expensive due to their complexity and requires many rounds to encrypt, essentially wasting the constrained energy of the gadgets. Less complex algorithm, however, may compromise the desired integrity. In this paper we propose a lightweight encryption algorithm named as Secure IoT (SIT. It is a 64-bit block cipher and requires 64-bit key to encrypt the data. The architecture of the algorithm is a mixture of feistel and a uniform substitution-permutation network. Simulations result shows the algorithm provides substantial security in just five encryption rounds. The hardware implementation of the algorithm is done on a low cost 8-bit micro-controller and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms. The MATLAB code for relevant simulations is available online at https://goo.gl/Uw7E0W.

  2. The Internet Inter-Orb Protocol Security Bridge

    Directory of Open Access Journals (Sweden)

    Pawel Slowikowski

    1999-01-01

    Full Text Available In this paper, we present a security bridge for the Internet protocol of interoperability amongst CORBA objects and the Internet inter-ORB Protocol (IIOP. The bridge helps in making accessible objects in the Internet and makes possible the access control to them. The bridge was realized in the popular request broker the Visigenic's VisiBroker under Windows 95/NT and Solaris 2.X operating systems. We describe two ways of locating the bridge in the request broker. The first means uses one name domain of broker and is not transparent for client. The second one uses two name domains and provides objects protection on the level of the Naming Service and is transparent lor the client. We also describe the variant ofthe second means with using GateKeeper server to support IIOP tunneling within HTTP. We emphasize the importance of a firewall, cooperating with a bridge. which is required for the purpose of providing object protection. The paper presents an original conception of security managing, basing on the ideas of users, groups and resources defined using the standard terms of CORBA, IIOP and TCP/IP, that allows to control positively and negatively the access to classes (interfaces, objects and also to their individual methods. This conception was effectively implemented in a functioning bridge. Further chapters describe the foundations and some details of the bridge implementation sueli as the use ofthe Interface Repository, cache memory application, thread synchronization and the way of synchronization of the configuration applet with the bridge's objects. We discuss the influence of these solutions on the efficiency ofthe bridge and its source code portability. We also present the general structure of the component objects ofthe bridge with a scheme. ln the next part we characterize the implementation foundations ofthe bridge manager, realized as an applet in Java, with the stress on the possibility of the bridge configuration through the

  3. Secure Internet Voting System based on Public Key Kerberos

    Directory of Open Access Journals (Sweden)

    Hussein Khalid Abd-Alrazzq

    2012-03-01

    Full Text Available Electronic voting system is an important tool which allows voters to vote over the Internet without the geographical restrictions with considers important criteria in evaluating electronic voting schemes such as the mobility, democracy, and privacy. In this paper secure remote voting system has been presented. The proposed system uses public key Kerberos which is another form of traditional Kerberos as infrastructure deal with voters. The public key is used in all steps of Kerberos (not only in initial. The proposed system utilizes the advantages of threshold cryptography to prevent anyone to decrypt or sign the ballot alone without agreement all authorities, and use threshold blind signature to prevent discovers the vote or the identity of voter and protect the content of the ballot during casting and provide verifiable and discourages ballot buying.

  4. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  5. The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know

    CERN Document Server

    Pal, Ranjan

    2012-01-01

    In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the problems posing a challenge to successful cyber-insurance markets. In this regard we model OS platform switching dynamics using a \\emph{social gossip} mechanism and study three important questions related to the nature of the dynamics, for Internet-like distributed systems: (i) which type of networks should cyber-insurers target for insuring?, (ii) what are the bounds on the asymptotic performance level of a network, wher...

  6. Innovative Way of Internet Voting - Secure On-line Vote - SOLV

    Directory of Open Access Journals (Sweden)

    Shalini Vermani

    2012-11-01

    Full Text Available With the rapid growth in Information Technology, internet voting system has been evolved. This is a web based system that must provide high level of security. In this paper we have proposed Secure On-line Vote (SOLV, an internet voting system. SOLV gives voters a reliable and highly secure environment to cast their vote on web. This system ensures authentication of voters and guarantees the secrecy and integrity of each vote.

  7. Research on Lightweight Information Security System of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Ying Li

    2013-05-01

    Full Text Available In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used to verify the legality of access device and to protect the confidentiality and integrity of transformation data. This study analyzes the security and performance of the system.

  8. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    National Research Council Canada - National Science Library

    Stanislav A. Shikov

    2017-01-01

    .... Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of Things...

  9. What we talk about when we talk about cybersecurity: security in internet governance debates

    Directory of Open Access Journals (Sweden)

    Josephine Wolff

    2016-09-01

    Full Text Available At meetings of internet governance organisations, participants generally agree that improving security is an important goal, but these conversations rarely yield consensus around how to achieve this outcome. One reason security plays this paradoxical role—as both a universal point of agreement and a continued source of contention—in these debates is that it has significantly different meanings to different stakeholders involved in these governance forums. In this paper, we discuss how different stakeholders define and frame internet security issues in the context of governance debates and analyse how these conflicting notions of security continue to shape emerging controversies.

  10. Probe into the Internet of Things Security%物联网安全的探讨

    Institute of Scientific and Technical Information of China (English)

    闵存高

    2012-01-01

      首先介绍了物联网的发展和体系结构,接着分别从感知层、传输层、应用层分析了物联网的安全威胁,最后提出了物联网的安全体系架构,并对物联网的关键安全技术进行了分析。%  This paper first introduced the development and architecture of IOT(Internet of Things), and then analysis the security threats from the perception layer, transport layer, application layer of the Internet of things, and finally propose the security archi⁃tecture for the Internet of Things, and analysis critical security technology for the Internet of Things.

  11. DESIGN OF A SECURE FRAMEWORK TO SECURELYEXCHANGE(XML-BASED) DOCUMENTS OVER THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    安南; 张申生

    2002-01-01

    This paper designed and implemented a secure framework that provides XML signature function, XML element-wise encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for e-commerce application.

  12. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  13. Teleradiology mobile internet system with a new information security solution

    Science.gov (United States)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiko; Kaneko, Masahiro; Moriyama, Noriyuki

    2014-03-01

    We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC

  14. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  15. 移动互联网安全分析%Analysis of Mobile Internet Security

    Institute of Scientific and Technical Information of China (English)

    王黎璐; 王鸿宇

    2013-01-01

    As a new kind of technology industry, the powerful effects of the mobile internet is increasingly apparent. The article,in the background of the development of mobile internet in 2010-2013, analyzed the security development trend of the mobile Internet, elaborated the security situation and technical dififculties of the mobile Internet in current.Finally,put forward the ideas of security measure from the four aspects of terminal security, core integrated network security,application security and security evaluation.%移动互联网作为一个新兴产业,其对人们日常生活的影响日益突显。文章以2010-2013年移动互联网发展情况为背景,通过分析移动互联网的安全发展趋势,阐述目前移动互联网的安全形势和技术难点,进而从终端安全、核心集成网络安全、应用安全和安全测评等四个层面提出加强移动互联网安全的具体措施。

  16. Software Defined Security Service Provisioning Framework for Internet of Things

    OpenAIRE

    Faraz Idris Khan; Sufian Hameed

    2016-01-01

    Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking applications i.e. Internet of things (IoT) have started investigating potentials of SDN paradigm in improving network management. IoT envision interconnecting various embedded devices surround-ing our environment with IP to enable internet connectivity. Unlike traditional net...

  17. Zephyr: A secure Internet process to streamline engineering

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  18. Security Issues and Challenges in Internet of Things – A Review

    Directory of Open Access Journals (Sweden)

    Lilima Jain

    2016-04-01

    Full Text Available The Internet of Things (IoT alludes to the continually developing system of physical articles that component an IP address for web availability, and the correspondence that happens between these items and other Web empowered gadgets and frameworks. The security issues of the Internet of Things (IoT are straight forwardly identified with the wide utilization of its framework. IoT securities and enhancing the design and several elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues under the advancements included. Here we are going to do a study of all the security issues existing in the Internet of Things (IoT alongside an examination of the protection issues that an end-client might confront as an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over access of individual data relating to gadget and individual protection. This review tells about the security and protection issues of IoT

  19. A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial

    Institute of Scientific and Technical Information of China (English)

    CAO Feng; CAO Zhenfu

    2006-01-01

    In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.

  20. Security Framework of Mobile Internet%移动互联网安全框架

    Institute of Scientific and Technical Information of China (English)

    魏亮

    2009-01-01

    The article describes the layered model of network and information security, and gets the security framework of mobile Internet according to the structure of mobile Internet. The mobile Internet has three parts, i.e. terminal, network and service system, and the network and information security; and it can be studied in 4 layers: equipment/environment security layer, service and application security layer, information security layer and information content security layer.%文章认为应当采用物理与信息安全分层,依据移动互联网网络结构,构建移动互联网安全架构.按照网络特征,移动互联网可以分终端、网络以及业务系统3个部分;网络与信息安全分设备/环境安全、业务应用安全、信息自身安全以及信息内容安全4个层面.移动互联网安全应将终端、网络以及业务系统分别在设备/环境、业务应用、信息自身以及信息内容安全层面加以研究.

  1. Norton Internet Security2001全方位的网络安全

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    千禧年底,赛门铁克公司以优惠的价格推出其最新网络安全产品Norton Internet Security2001(诺顿网络安全特警2001)简体中文版,该软件同时包含了Norton Antvirus2001(诺顿防毒2001)简体中文版和Norton Internet Security2001(诺顿个人防火墙2001)简体中文版。

  2. Compartive study of Internet of Things infrastructure and security

    DEFF Research Database (Denmark)

    Singh, Bhupjit; Kaur, Bipjeet

    With increasing use of IoTs in diverse fields has increased the demands of different parameters for high level of security, trust and applications. Several companies have invested millions of dollar to fulfill the needs of the market which has given rise variant infrastructures of Io......Ts. In this paper we have compared the different infrastructures and their parameters along with establishing the requirements of security in IoTs. The various vulnerabilities in the IoTs architecture and consideration for privacy control is also discussed. After identifying the security issues in IoTs , this paper...

  3. Securing Internet Protocol (IP) Storage: A Case Study

    CERN Document Server

    Somayaji, Siva Rama Krishnan; 10.5121/ijngn.2010.2102

    2010-01-01

    Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others. In order for a Storage Area Network (SAN) to be secure, each of these threats must be individually addressed. In this paper, we present a comparative study by implementing different security methods in IP Storage network.

  4. INTERNET OF THINGS IN MARKETING: OPPORTUNITIES AND SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Irakli ABASHIDZE

    2016-10-01

    Full Text Available Internet of Things (IoT affects different areas of human activities: everyday life of ordinary citizens, work style of mar-keting teams, factories and even entire cities. Large companies try to implement the technology in their marketing strat-egy that reshapes not only communication style and product promotion but consumers’ expectations, perceptions and requirements towards companies. IoT is expected to become a huge network that will encompass not only smart devic-es but significantly influence humans’ behavior, in this particular case – decision making style in different phases of pur-chase process. Therefore, the need for comprehensive scientific research is necessary. The issue needs to be reviewed from various points of view, such as opportunities, advantages, disadvantages, legal and technical considerations. The paper is an attempt to review different aspects of using Internet of Things for marketing purposes, identify some of the major problems and present possible ways of solution.

  5. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  6. 移动互联网安全综述%Overview of Mobile Internet Security

    Institute of Scientific and Technical Information of China (English)

    孙其博

    2016-01-01

    移动互联网是传统移动通信网络与互联网融台的产物,能够为用户提供更具移动特性、更深入到日常工作生活的应用支撑。针对移动互联网的发展,在介绍移动互联网功能架构的基础上,从传统移动通信网以及传统互联网的角度简要介绍了移动互联网安全问题产生的根源,详细分析了移动互联网智能终端、接入网络以及应用服务面临的主要安全问题,提出了静态安全体系框架与动态主动安全防御相结合的移动互联网安全体系研究思路。%Mobile Internet is a product from the fusion of mobile communication network and traditional Internet. It can provide users with the application support which has higher mobility and can penetrate into people's daily work and life.Based on introduction of functional architecture of mobile Internet,this paper describes in detail mobile Internet security problems and their origin. This paper analyzes in detail the main security challenges come from mobile devices, access network, application service, and puts forward the research thinking of mobile Internet security security system based on combination of static security architecture and dynamic active security defense.

  7. SANA - Security Analysis in Internet Traffic through Artificial Immune Systems

    CERN Document Server

    Hilker, Michael

    2008-01-01

    The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local Installation. Therefore, we introduce a novel Framework for Network Security which is called SANA. SANA contains an artificial Immune System with artificial Cells which perform certain Tasks in order to to support existing systems to better secure the Network against Intrusions. The Advantages of SANA are that it is efficient, adaptive, autonomous, and massively-distributed. In this Article, we describe the Architecture of the artificial Immune System and the Functionality of the Components. We explain briefly the Implementation and discuss Results.

  8. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  9. Internet of things: emerging and future scenarios from an information security perspective

    CSIR Research Space (South Africa)

    Dlamini, MT

    2009-08-01

    Full Text Available Information security is becoming a major concern for most worldwide telecommunication companies and more so as we move towards the future Internet of Things. In this era, a plethora of digital devices, people and other physical objects have...

  10. Where Did All the Data Go? Internet Security for Web-based Assessments.

    Science.gov (United States)

    Shermis, Mark D.; Averitt, Jason

    2002-01-01

    Outlines a series of security steps that might be taken by researchers or organizations that are contemplating Web-based tests and performance assessments. Focuses on what can be done to avoid the loss, compromising, or modification of data collected by or stored through the Internet. (SLD)

  11. OBSTACLES TO ONLINE SHOPPING: IMPACT OF GENDER AND INTERNET SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    AHU GENİS-GRUBER

    2013-06-01

    Full Text Available In the latest technology era, the widespread usage of internet enabled individuals to interact continuously and led to altered buying behavior patterns. Literature focuses on the critical effects in the field. Among many antecedents to online shopping, previous studies point out two important obstacles:  (i acceptance and tendency to use technology in accordance with gender perceptions and (ii internet security problems. This study analyzes the impact of these two prominent factors on e-commerce utilization by studying the effects of these factors through primary and secondary data; a survey designed specifically for this analysis and the cross-country data from Eurostat. The findings show that while internet security problems significantly impact online shopping behavior, the evidence is mixed for the impact of gender. The results of this paper provide insights for a successful e-commerce transaction and identify important obstacles to be avoided for an efficient e-commerce system.

  12. On Securing Real-Time Speech Transmission over the Internet: An Experimental Study

    Directory of Open Access Journals (Sweden)

    Alessandro Aldini

    2003-09-01

    Full Text Available We analyze and compare several soft real-time applications designed for the secure transmission of packetized audio over the Internet. The main metrics we consider for the purposes of our analysis are (i the computational load due to the coding/decoding phases, and (ii the computational overhead of the encryption/decryption activities, carried out by the audio tools of interest. The main result we present is that an appropriate degree of security may be guaranteed to real-time audio communications at a negligible computational cost if the adopted security strategies are integrated together with the playout control mechanism incorporated in the audio tools.

  13. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devic

  14. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devic

  15. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  16. An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security

    OpenAIRE

    Pathan, Al-Mukaddim Khan; Mottalib, Md. Abdul; Zibran, Minhaz Fahim

    2006-01-01

    To bring coherence between Wireless Access Protocol (WAP) and Hyper Text Transfer Protocol (HTTP), in this paper, we have proposed an enhanced Internet framework, which incorporates a new markup language and a browser compatible with both of the access control protocols. This Markup Language and the browser enables co-existence of both Hyper Text Markup Language (HTML) and Wireless Markup Language (WML) contents in a single source file, whereas the browser incorporates the ability to hold con...

  17. Secure Web-based Ground System User Interfaces over the Open Internet

    Science.gov (United States)

    Langston, James H.; Murray, Henry L.; Hunt, Gary R.

    1998-01-01

    A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.

  18. Secure Web-based Ground System User Interfaces over the Open Internet

    Science.gov (United States)

    Langston, James H.; Murray, Henry L.; Hunt, Gary R.

    1998-01-01

    A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.

  19. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

    Directory of Open Access Journals (Sweden)

    Luca Veltri

    2013-04-01

    Full Text Available The Internet of Things (IoT refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.

  20. Beyond the Convenience of the Internet of Things: Security and Privacy Concerns

    CSIR Research Space (South Africa)

    Moganedi, Mapoung S

    2017-06-01

    Full Text Available ] J. A. Stankovic, “Research Directions for the Internet of Things,” Internet Things Journal, IEEE, vol. 1, no. 1, pp. 3–9, 2014. [4] A. D. Miyazaki and A. Fernandez, “Consumer Perceptions of Privacy and Security Risks for Online Shopping,” J... stream_source_info Moganedi_18649_2017.pdf.txt stream_content_type text/plain stream_size 33071 Content-Encoding UTF-8 stream_name Moganedi_18649_2017.pdf.txt Content-Type text/plain; charset=UTF-8 Beyond the Convenience...

  1. A Fuzzy Set-Based Approach for Model-Based Internet-Banking System Security Risk Assessment

    Institute of Scientific and Technical Information of China (English)

    LI Hetian; LIU Yun; HE Dequan

    2006-01-01

    A fuzzy set-based evaluation approach is demonstrated to assess the security risks for Internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify the behavior and state of the system on the base of analyzing the existing qualitative risk assessment methods. And a quantitative method based on fuzzy set is used to measure security risks of the system. A case study was performed on the WEB server of the Internet-banking System using fuzzy-set based assessment algorithm to quantitatively compute the security risk severity. The numeric result also provides a method to decide the most critical component which should arouse the system administrator enough attention to take the appropriate security measure or controls to alleviate the risk severity. The experiments show this method can be used to quantify the security properties for the Internet-banking System in practice.

  2. Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty

    CERN Document Server

    Pal, Ranjan

    2011-01-01

    Modern distributed communication networks like the Internet and censorship-resistant networks (also a part of the Internet) are characterized by nodes (users) interconnected with one another via communication links. In this regard, the security of individual nodes depend not only on their own efforts, but also on the efforts and underlying connectivity structure of neighboring network nodes. By the term 'effort', we imply the amount of investments made by a user in security mechanisms like antivirus softwares, firewalls, etc., to improve its security. However, often due to the large magnitude of such networks, it is not always possible for nodes to have complete effort and connectivity structure information about all their neighbor nodes. Added to this is the fact that in many applications, the Internet users are selfish and are not willing to co-operate with other users on sharing effort information. In this paper, we adopt a non-cooperative game-theoretic approach to analyze individual user security in a co...

  3. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Bruce Ndibanje

    2014-08-01

    Full Text Available Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. According to our analysis, Jing et al.’s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  4. WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES

    Directory of Open Access Journals (Sweden)

    Muhammad A. Iqbal

    2016-09-01

    Full Text Available The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT, where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT paradigm. It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet

  5. Current Status of Mobile Internet Protocol version 4 and its Security Issues

    Directory of Open Access Journals (Sweden)

    Susanna S Henry

    2012-03-01

    Full Text Available Many consumers have moved from stationary personal computers to cellular mobile devices. These mobile devices permit change of location while staying connected to the network. To sustain stable communication with the receiver, Mobile Internet Protocol (Mobile IP was developed. Mobile IP is intended to afford absolutely automated and non interactive reconfiguration at any point. Mobile IP is considered to be a routing protocol thus solving the primary problem of routing IP packets to mobile nodes, which is a first step in providing mobility on the internet. Mobile IP is a secure, robust, and medium-independent protocol whose scaling properties make it applicable throughout the entire Internet. Mobile IP has two versions, Mobile IPv4 and Mobile IPv6.This paper analysis the current status of Mobile IPv4 which is on the verge of exhaustion and announces the urgent need to upgrade IP layer to Mobile IPv6.

  6. Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem

    CERN Document Server

    Pal, Ranjan

    2012-01-01

    Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as \\emph{self-defense} mechanisms. However, according to security experts, such software (and their subsequent advancements) will not completely eliminate risk. Recent research efforts have considered the problem of residual risk elimination by proposing the idea of \\emph{cyber-insurance}. In this regard, an important research problem is resolving information asymmetry issues associated with cyber-insurance contracts. In this paper we propose \\emph{three} mechanisms to resolve information asymmetry in cyber-insurance. Our mechanisms are based on the \\emph{Principal-Agent} (PA) model in microeconomic theory. We show that (1) optimal cyber-insurance contracts induced by our mechanisms only provide partial...

  7. Safeguarding the User - Developing a Multimodal Design for Surveying and Raising Internet Safety and Security Awareness

    DEFF Research Database (Denmark)

    Gjedde, Lisa; Sharp, Robin; Andersen, Preben

    2009-01-01

    Internet safety and security for the user is an issue of great importance for the successful implementation of ICT, but since it is a complex field, with a specialist vocabulary that cannot immediately be understood by the common user, it is difficult to survey the field. The user may not underst......Internet safety and security for the user is an issue of great importance for the successful implementation of ICT, but since it is a complex field, with a specialist vocabulary that cannot immediately be understood by the common user, it is difficult to survey the field. The user may...... describes an ICT-based research method that combines a verbal mode of inquiry with a visual mode employing illustrations, animations and simulations to provide the user with a multimodal media experience. The rationale for this is that we are working in a complex technical field with a specialist vocabulary...

  8. In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions

    OpenAIRE

    Chen, Jie; Huang, Yan

    2009-01-01

    International audience; In the process of realization Internet-based visualization system of the protein molecules, system needs to allow users to use the system to observe the molecular structure of the local computer, that is, customers can generate the three-dimensional graphics from PDB file on the client computer. This requires Applet access to local file, related to the Applet security restrictions question. In this paper include two realization methods: 1.Use such as signature tools, k...

  9. Towards Formal Validation of Trust and Security of the Internet of Services

    DEFF Research Database (Denmark)

    Carbone, Roberto; Minea, Marius; Mödersheim, Sebastian Alexander

    2011-01-01

    that can arise from this panoply of choices. This often results in the release of flawed products to end-users. This issue can be significantly mitigated by empowering designers and developers with tools that offer easy to use graphical interfaces and notations, while employing established verification...... techniques to efficiently tackle industrial-size problems. The formal verification of trust and security of the Internet of Services will significantly boost its development and public acceptance....

  10. In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security

    Science.gov (United States)

    Danidou, Yianna; Schafer, Burkhard

    This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). It is argued that TC constitutes such a dramatic shift in power away from users to the software providers, that it is necessary for the legal system to respond. A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security.

  11. 移动互联网的信息安全探析%Analysis of mobile internet security

    Institute of Scientific and Technical Information of China (English)

    赵书峰

    2011-01-01

    With the popularity of mobile internet,mobile internet information security risk is always present,re-sulting in serious safety consequences and hindering the development of mobile internet.Therefore,in order to ensure mobile internet information security,appropriate measures must be proposed and put into action.This ar-ticle focuses on the analysis of the mobile internet security architecture,the status of mobile internet security,and mobile internet information security policy.%随着移动互联网的普及,移动互联网信息安全始终存在隐患.为了确保移动互联网的信息安全,针对移动互联网安全构架、安全现状及信息安全策略进行分析,重点加强移动互联网信息安全立法建设、互联网信息安全机构建设和加强对移动终端的管理,对移动互联网信息安全提出建设性意见,达到保证移动互联网的信息安全.

  12. Security Camera System can be access into mobile with internet from remote place

    Directory of Open Access Journals (Sweden)

    Dr. Khanna SamratVivekanand Omprakash

    2012-01-01

    Full Text Available This paper represents how camera can captured the images and video into the database and then it may transformed to the mobile with help of Internet. Developing mobile applications how the data can be viewed on the mobile from the remote place. By assigning real IP to the storage device from ISP and connected to the internet . Developing mobile applications on windows mobile which runs only on the windows mobile . Wireless camera in terms of 4 , 8, 12, 16 are connected with the system. Windows based application develop for 4 , 8 , 12,16 channels to see at a time on desktop computer . The PC is connected with internet and having Client server application which is connected to the Windows Web hosting Server through the internet. With the help of ISP server we can assign IP to the Window Web Server with domain name . Domain name will be access from the world. By developing mobile applications on web we can access it on mobile . Separate setup of windows .exe develop for the Windows Mobile phone to access the information from the server. Client setup can be installed on the mobile and it fetches the data from server and server is based on real IP with domain name and connected with Internet . Digital Wireless cameras are connected & data is stored in Digital Video Recorder having 1 Terabyte of hard disk with different channel like 4, 8, 12,16. We can see Video output in mobile by installing the client setup or by accessing directly from web browser which supports the application for mobile. The beauty of this software is that we can access security camera system into the mobile with internet from remote place.

  13. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Doohwan Oh

    2014-12-01

    Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  14. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  15. Implementation of a Secure Internet/Mobile Banking System in Iran

    Directory of Open Access Journals (Sweden)

    Javad Soroor

    2005-12-01

    Full Text Available Modern fast-evolving technology is constantly bringing new dimensions to our daily life. In Iran, electronic banking systems provide customers with easy access to banking services. ATMs, phone banking, Internet banking, and more recently, mobile banking have considerably improved the interaction between user and bank. This paper discusses the security of today’s electronic banking systems in Iran. We focus on Internet and mobile banking and present an overview and evaluation of the techniques that are used in current Iranian systems. The best practice is indicated, together with improvements for the future. The issues discussed in this paper are generally applicable in other electronic services such as e-commerce and e-government.

  16. Research of Secure Intranet/Internet Access Platform Based on Ontology

    Directory of Open Access Journals (Sweden)

    Shigen Shen

    2009-12-01

    Full Text Available Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterprise's businesses. To solve this problem, an Ontology-based Secure intranet/Internet Access Platform (OSAP is presented. Ontology has been applied to the field of software resources sharing. Software resource ontology is defined for building the foundation of Software Resource Ontology Sharing Model (SROSM and the OSAP. The OSAP framework is presented by semantic modeling based on SROSM for providing users with better and higher QOS in sharing software resources. The OSAP is designed with OSAP Portal, Connection Module, Session Management Module, Security Module, RDP Module, and Bitmap Caching Module. The design ideas and functionalities of all modules are introduced. Based on the open Remote Desktop Protocol (RDP, the OSAP prototype is realized and key technologies including client display, data compression and security are described. To guarantee data transmission security and avoid access problem due to the firewall obstructing port 3389, the SSL protocol is employed to encapsulate RDP data packages between clients and OSAP as the RDP is used between OSAP and Terminal Services servers. Experimental results demonstrate that the OSAP has better performance involving response time, network usage, RAM usage and CPU usage.

  17. Development of an Attack-Resistant and Secure SCADA System using WSN, MANET, and Internet

    Directory of Open Access Journals (Sweden)

    N. Rajesh kumar

    2014-06-01

    Full Text Available Industrial Control Systems (ICS are open to security attacks when they are integrated with IT systems and wireless technologies for enhanced processing and remote control. These Critical Infrastructures (CIs are highly important as they provide service for an entire nation and causes serious danger even when interrupted for a while. Some of the common SCADA (Supervisory Control and Data Acquisition systems involve energy and water distribution systems. In this paper, the energy distribution SCADA system comprising several substations is considered. A secure framework is proposed that combines the energy control system with Wireless Sensor Networks (WSNs, Mobile Ad hoc Networks (MANETs, and the Internet, providing anomaly prevention and status management. SCADA attacks occur at the state estimators of the power systems which are used to route power flows and detect faulty devices. These estimators are located in the SCADA control center which is a sensitive area and measurements must be transmitted over a secure communication channel. The attack-resistance of the SCADA system is enhanced by increasing the hardness and complexity of the attack problem. The Attack-Resistant and Secure (ARS SCADA system is evaluated against existing techniques like NAMDIA (Network-Aware Mitigation of Data Integrity Attacks, Retrofit IDS (Intrusion Detection System, and CSBF (Critical State-Based Filtering for enhancing the attack-resistance and security of SCADA systems. It is found that the performance of ARS SCADA system is good compared to the existing methods in terms of maximum normalized attack impact and latency.

  18. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  19. Study on Security of Internet Banking System%网银系统安全研究

    Institute of Scientific and Technical Information of China (English)

    曾曙; 吴海生

    2012-01-01

    随着Internet的普及,网银的使用者越来越多。网上银行拥有方便、高效、低成本的特点,极大地提高了银行业的服务效率和服务质量,网上交易已经非常普及。由于互联网的传播,黑客技术正具有更大的普及性和破坏性,网银客户的信息和企业机密信息被泄露或被监听的事件频发,网银的安全性越来越受到重视。文中分析了目前网银存在的各种安全隐患,从客户、网银系统、安全技术等角度对如何保证网银系统安全提出了一些建议。%With the popularity of Internet, more and more people use online banking. Online banking, with convenience, high performance, low cost and other advantages, could greatly improve the banking service efficiency and service quality. Online trading is now very popular. Due to the spread of Internet technology, hacking technology becomes more and more popular and destructive. There exist various information leakage incidents among online banking customers and corporates, and the security of online banking system draws more and more attention. From angles of customers, online banking system and security technology, this paper analyzes various hidden dangers of the current banking system and proposes some suggestions on how to guarantee the security of Internet banking system.

  20. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System

    Directory of Open Access Journals (Sweden)

    V. A. Alexandrov

    2016-01-01

    Full Text Available This paper comprises the development and implementation of systems using the concept of Internet of Things. In terms of active development of industries, use the concept of the Internet of Things, the information security problem is urgent. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing GOST standards when choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. A feature of the work is an integrated approach to the design with the use of the intruder models, analysis of the system’s assets and evaluation of their security.

  1. Chaos Encryption Algorithm to Deal with Security Threat to Internet of Things RFID

    Directory of Open Access Journals (Sweden)

    Tian Xiaoyong

    2013-05-01

    Full Text Available Internet of Things RFID system is mainly studied problem in current communication area, where the safety of code message become rather important. Chaos encryption algorithm can disperse not only the time area but the scale, which is suitable for computer to deal with and overcome the limitation of block encryption in DES and AES. Using Sequence of the digital to deal with initial value and combining the one dimensional Logistic chaos and three dimensional Lorenz algorithm realize common encryption algorithm of these two chaos methods to calculate the long-term random sequence under the limitation of precision and improve the security.

  2. 物联网安全性研究%Research on Security of Internet of Things

    Institute of Scientific and Technical Information of China (English)

    李燕; 冯谦

    2015-01-01

    With the development of Internet of Things (IoT) technology,the problem of information security faced by IoT is complicated.Based on the IoT architecture and key technologies,the IoT security requirements and related features are analyzed.This paper summarizes IoT security threats and corresponding security measures.The security threats of perception layer,network layer and application layer in IoT architecture are studied based on the current IoT architecture.This paper provides the security frame for various layers to solve those problems in IoT,so as to provide positive suggestions for IoT security construction.%随着物联网技术的不断发展,物联网面临的信息安全问题也日渐增长.基于物联网的体系结构和关键技术,分析了物联网的安全需求与相关特性,总结了物联网面临的安全威胁以及相应的安全措施.从物联网当前的构建体系出发,对物理网理论体系中感知层、网络层和应用层存在的安全威胁进行研究,分层次对物联网面临的问题给出了相应的安全框架,从而对物联网安全方面的建设积极建言.

  3. Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

    Science.gov (United States)

    Collmann, Jeff; Cooper, Ted

    2007-01-01

    This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

  4. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  5. Secure and privacy-preserving data communication in Internet of Things

    CERN Document Server

    Zhu, Liehuang; Xu, Chang

    2017-01-01

    This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

  6. Experimentation Using Short-Term Spectral Features for Secure Mobile Internet Voting Authentication

    Directory of Open Access Journals (Sweden)

    Surendra Thakur

    2015-01-01

    Full Text Available We propose a secure mobile Internet voting architecture based on the Sensus reference architecture and report the experiments carried out using short-term spectral features for realizing the voice biometric based authentication module of the architecture being proposed. The short-term spectral features investigated are Mel-Frequency Cepstral Coefficients (MFCCs, Mel-Frequency Discrete Wavelet Coefficients (MFDWC, Linear Predictive Cepstral Coefficients (LPCC, and Spectral Histogram of Oriented Gradients (SHOGs. The MFCC, MFDWC, and LPCC usually have higher dimensions that oftentimes lead to high computational complexity of the pattern matching algorithms in automatic speaker recognition systems. In this study, higher dimensions of each of the short-term features were reduced to an 81-element feature vector per Speaker using Histogram of Oriented Gradients (HOG algorithm while neural network ensemble was utilized as the pattern matching algorithm. Out of the four short-term spectral features investigated, the LPCC-HOG gave the best statistical results with R statistic of 0.9127 and mean square error of 0.0407. These compact LPCC-HOG features are highly promising for implementing the authentication module of the secure mobile Internet voting architecture we are proposing in this paper.

  7. 浅析移动互联网安全%A Brief Analysis on the Mobile Internet Security

    Institute of Scientific and Technical Information of China (English)

    顾玮

    2016-01-01

    中国移动互联网市场也已成为拥有全球最多的手机用户数和具有最大发展潜力的移动互联网市场。但是,移动互联网的信息安全问题也日益凸显。黑客在对传统互联网服务发起挑战的同时,移动互联网也成为了黑客新的攻击目标,移动互联网的安全问题,不仅影响了移动互联网产能释放和正面价值的发挥。也牵涉国家和民族信息安全产业。因此,研究移动互联网安全的整体架构和安全部署,研究移动互联网可能存在的流量攻击、不健康内容等问题,通过安全设计、安全部署保证移动互联网安全,通过监控和内容过滤的技术手段。保障相关内容的安全与健康,是摆在人们面前的一些关键问题。%China Mobile Internet market has become the world largest number of mobile phone users and mobile Inter-net market has the greatest potential for development. However,the information security problem of mobile Internet has become increasingly prominent. Hackers in the challenge to the traditional Internet service at the same time,the mobile Internet has also become a new target for hackers,the security problem of mobile Internet,not only affects the mobile Internet release of production capacity and the positive value of play, but also involves the state and national information security industry. Therefore,research on mobile Internet Security Architecture and security deployment,research on mobile Internet possible attack traffic,unhealthy content,through the safety design and safety deployment of security of mobile Internet,through monitoring and content filtering technology. Safety and health related content,is placed in front of people and some key problems.

  8. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    Science.gov (United States)

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  9. To the Question of Information Security and Providing State and Municipal Services by Means of the Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-09-01

    Full Text Available In the present article author investigates interconnected questions of information security and providing state and municipal services by means of the global information Internet. Author analyzes opinions of the number of leading Russian and foreign experts and scientists. In the summary author draws a conclusion that implementation of rules of law answering to modern realities and also fruitful work of law enforcement and supervisory authorities regarding law application practice improvement is necessary for information security and human rights protection.

  10. Primary Discussion on Information Security of the Internet of Things%物联网信息安全初探

    Institute of Scientific and Technical Information of China (English)

    郝锋钢

    2012-01-01

    The rapid development of the internet of things makes the security to the material world. The coming information security threat has been found range of network security and the management difficulty. The internet of threat extend from network world in our life, which increases the is generally divided into three layers, namely the perception layer, transport layer and application layer. The information security of each layer and the whole system must be guaranteed and the information security of the whole network must be studied to guarantee the business security of the internet of things.%物联网的快速发展使其安全威胁也由网络世界延伸到物质世界,未来信息的安全威胁已经走进我们的生活,加大了网络安全防范的范围和治理难度。物联网在逻辑上一般分为3个层,即感知层、传输层和应用层,在保障各层信息安全的基础上更要保障整个系统的安全,必须研究规划整个大网的信息安全体系,保障物联网业务的安全。

  11. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Waqas Aman

    2015-07-01

    Full Text Available In Internet of Things (IoT, the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS model for IoT. EDAS aims to observe security events (changes generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

  12. 新特警 新气象 Norton Internet Security 2008

    Institute of Scientific and Technical Information of China (English)

    吴敌

    2007-01-01

    近期是各大反病毒厂商新作频发的一段日子,作为安全防护软件的老牌厂商,赛门铁克也发布了他们的新款网络安全特警—Norton Internet Security 2008。诺顿网络安全特警2008重要功能涵盖浏览器防护的BroWser Defender、提供身份安全保护的Norton Identity safe功能、Home NetWork家庭网络状态检测与防护、

  13. Secure Internet video conferencing for assessing acute medical problems in a nursing facility.

    Science.gov (United States)

    Weiner, M; Schadow, G; Lindbergh, D; Warvel, J; Abernathy, G; Dexter, P; McDonald, C J

    2001-01-01

    Although video-based teleconferencing is becoming more widespread in the medical profession, especially for scheduled consultations, applications for rapid assessment of acute medical problems are rare. Use of such a video system in a nursing facility may be especially beneficial, because physicians are often not immediately available to evaluate patients. We have assembled and tested a portable, wireless conferencing system to prepare for a randomized trial of the system s influence on resource utilization and satisfaction. The system includes a rolling cart with video conferencing hardware and software, a remotely controllable digital camera, light, wireless network, and battery. A semi-automated paging system informs physicians of patient s study status and indications for conferencing. Data transmission occurs wirelessly in the nursing home and then through Internet cables to the physician s home. This provides sufficient bandwidth to support quality motion images. IPsec secures communications. Despite human and technical challenges, this system is affordable and functional.

  14. To The Question Of Information Security During Rendering State And Municipal Services Through The Global Information And Telecommunication Network Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-01-01

    Full Text Available In the present article author analyzes some aspects of providing the state and municipal services by means of the global information and telecommunication network Internet. Author proves the need of ensuring information security and counteraction of cyberespionage, gives own offers.

  15. Compact Extensible Authentication Protocol for the Internet of Things: Enabling Scalable and Efficient Security Commissioning

    Directory of Open Access Journals (Sweden)

    Marcin Piotr Pawlowski

    2015-01-01

    Full Text Available Internet of Things security is one of the most challenging parts of the domain. Combining strong cryptography and lifelong security with highly constrained devices under conditions of limited energy consumption and no maintenance time is extremely difficult task. This paper presents an approach that combines authentication and bootstrapping protocol (TEPANOM with Extensible Authentication Protocol (EAP framework optimized for the IEEE 802.15.4 networks. The solution achieves significant reduction of network resource usage. Additionally, by application of EAP header compacting approach, further network usage savings have been reached. The EAP-TEPANOM solution has achieved substantial reduction of 42% in the number of transferred packets and 35% reduction of the transferred data. By application of EAP header compaction, it has been possible to achieve up to 80% smaller EAP header. That comprises further reduction of transferred data for 3.84% for the EAP-TEPANOM method and 10% for the EAP-TLS-ECDSA based methods. The results have placed the EAP-TEPANOM method as one of the most lightweight EAP methods from ones that have been tested throughout this research, making it feasible for large scale deployments scenarios of IoT.

  16. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  17. Leadership and New Technologies. New Security Issues for Management of Internet Connectivity and Remote Control in Automotive Industry

    Directory of Open Access Journals (Sweden)

    Cosmin Cătălin Olteanu

    2015-05-01

    Full Text Available The main purpose of the paper is to illustrate the importance of implementing new security policies for infotainment systems in automotive industry. A car is full of technology and is easier today to control car systems through an internet connection linked to car system infotainment. This is how it is possible to gain control of critical car systems. More than 84% of users doesn’t even know the risk of remote control of the car in the presence of Internet connection.

  18. Key Technologies of Security Test for Mobile Internet%移动互联网安全测评关键技术研究

    Institute of Scientific and Technical Information of China (English)

    范红; 杜大海; 王冠

    2015-01-01

    In this paper, we discuss five key areas of mobile internet security testing: physical security, mobile terminals ’security, network security, application security and network security management. Detailed test guidance is given in this paper. The security problem of mobile internet has attracted much attention. Sniffing, malicious charge, information theft, position leakage, financial stealing and other security incidents occur frequently. Security of the mobile Internet affects national security, financial security, social stabilization and people's interest. Therefore, some measures need to be carried out for the security of Mobile Internet.%探讨了移动互联网安全测评的5个重要方面:物理安全、移动智能终端安全、网络安全、应用安全和网络安全管理;给出了具体的测评指导内容;认为窃听、恶意吸费、信息窃取、位置信息泄漏、金融窃取等安全事件频发,移动互联网的安全问题严重威胁到国家安全、金融安全、社会稳定和人民的根本利益,采取相应措施来保障移动互联网的安全必须得到高度重视。

  19. Security Development Trend and its Countermeasure Analysis for Mobile Internet%移动互联网安全发展趋势及对策分析

    Institute of Scientific and Technical Information of China (English)

    翟世俊; 姚一楠

    2015-01-01

    Developmental status of mobile Internet and its security threat were summarized. Security development trend of mobile Internet was analyzed and corresponding proposals to guarantee information security of mobile Internet were presented.%在总结移动互联网的发展现状和其所面临的安全威胁的基础上,分析移动互联网安全发展趋势,并提出了保障移动互联网信息安全的建议.

  20. Smartphone-based secure authenticated session sharing in Internet of Personal Things

    Science.gov (United States)

    Krishnan, Ram; Ninglekhu, Jiwan

    2015-03-01

    In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.

  1. Internet Banking

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available Internet Banking (known also as online banking allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short and banking from anywhere where internet access is available. In most cases a web browser such as Internet Explorer or Mozilla Firefox is utilized and any normal internet connection is suitable. No special software or hardware is usually needed.

  2. Devising a Secure Architecture of Internet of Everything (IoE to Avoid the Data Exploitation in Cross Culture Communications

    Directory of Open Access Journals (Sweden)

    Asim Majeed

    2016-04-01

    Full Text Available The communication infrastructure among various interconnected devices has revolutionized the process of collecting and sharing information. This evolutionary paradigm of collecting, storing and analyzing data streams is called the Internet of Everything (IoE. The information exchange through IoE is fast and accurate but leaves security issues. The emergence of IoE has seen a drift from a single novel technology to several technological developments. Managing various technologies under one infrastructure is complex especially when a network is openly allowing nodes to access it. Access transition of infrastructures from closed networked environments to the public internets has raised security issues. The consistent growth in IoE technology is recognized as a bridge between physical, virtual and cross-cultural worlds. Modern enterprises are becoming reliant on interconnected wireless intelligent devices and this has put billions of user’s data in risk. The interference and intrusion in any infrastructure have opened the door of public safety concerns because this interception could compromise the user’s personal data as well as personal privacy. This research aims to adopt a holistic approach to devising a secure IoE architecture for cross-culture communication organizations, with attention paid to the various technological wearable devices, their security policies, communication protocols, data format and data encryption features to avoid the data exploitation. A systems methodology will be adopted with a view to developing a secure IoE model which provides for a generic implementation after analyzing the critical security features to minimize the risk of data exploitations. This would combine the ability of IoE to connect, communicate, and remotely manage an incalculable number of networked, automated devices with the security properties of authentication, availability, integrity and confidentiality on a configurable basis. This will help

  3. Secure Optical Internet: A Novel Attack Prevention Mechanism for an OBS node in TCP/OBS Networks

    Directory of Open Access Journals (Sweden)

    K. Muthuraj

    2013-01-01

    Full Text Available Optical Internet has become a strong development and its commercial use is growing rapidly. Due to transparency and virtual sharing infrastructure, they provide ultra-fast data rates with the help of optical burst switching technology, which transmits data in the form of bursts. From the security perspective, one of the OBS nodes in the optical network is compromised, causes the vulnerability. This paper is dealt to identify the vulnerabilities and named as burst hijacking attack and provide the prevention mechanism for the same. The NSFnet 14 nodes and the ns2 simulator with modified nOBS patch is used to simulate and verify the security parameters.

  4. 物联网技术及安全问题%Technology and Security Issues of Internet of Things

    Institute of Scientific and Technical Information of China (English)

    朱新良

    2015-01-01

    物联网被称为继计算机和互联网之后的第三次信息技术革命,其应用无处不在,而物联网的安全问题直接关系到它的广泛应用。从物联网的安全构架和特点出发,阐述了物联网三层体系结构中存在的安全问题,提出了解决方案和涉及到的关键技术,对感知层的安全措施进行了具体的阐述,包括密钥管理算法、安全路由协议、数据融合技术以及身份认证和访问控制,等等。最后介绍了物联网的典型应用和发展前景。%Internet of things is called the third IT revolution following the computer and the internet, and now it is everywhere.The security issues of the Internet of Things (IoT)are directly related to the wide application of its system.Beginning with introducing the architecture and features of IoT security,this paper expounds several security issues of IoT that exist in the three-layer system structure,and comes up with solutions coupled with key technologies involved.Among these safety measures concerned,those in perception layer are particularly elaborated,including key management and algorithm,security routing protocol,data fusion technology,as well as authentication and access control,etc.The paper also presents the typical application and future prospect of the internet of things.

  5. The Importance of Information Security for Financial Institutions and Proposed Countermeasures --With a Focus on Internet-Based Financial Services--

    OpenAIRE

    Bank of Japan

    2000-01-01

    In recent years, the development of information technology (IT) has brought with it a rapid increase in the use of open network systems, as typified by the Internet, to provide financial services. Concurrently, proper management of information security risks such as the risk of service interruptions, theft or alteration of data, impersonation and other events resulting from unauthorized access to the computer system is rapidly becoming critical. If these risks should occur and cause unauthori...

  6. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.

    Science.gov (United States)

    Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona

    2003-01-01

    The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.

  7. A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

    OpenAIRE

    Ilioudis, Christos; Pangalos, George

    2001-01-01

    Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy...

  8. Internet密钥IKE协议安全性分析%Security Analysis for Internet Key Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    马萌; 王全成; 康乃林

    2013-01-01

    To deal with complex metwork threats and attacks faces by Internet Key Exchange protocol, this paper analyzes the essential thoughts of Internet Key Exchange protocol and four main security defects in detail, and helps making up possible security vulnerabilities and hidden dangers through adopting more effective information security technology and methods, and thus meets increasing need in network security applications.%为了应对Internet密钥交换协议面临的复杂多样的网络威胁和攻击手段,本文详细分析了IKE协议的基本思想和主要存在的四个方面的安全缺陷,为采取更加有效的信息安全技术和方法,堵塞可能的安全漏洞和隐患提供帮助,从而满足日益增长的网络安全应用要求。

  9. European Trends in Privacy: How can we increase internet security and protect individual privacy?

    Directory of Open Access Journals (Sweden)

    Soren Duus Ostergaard

    2004-04-01

    Full Text Available In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases through gateways has become a standard way of doing things. Legislation has been put in place which in many countries give the authorities increased right to analyze personal data ? In some cases overriding existing privacy legislation. >In a networked world everybody leaves traces that are personally individually identifiable (PII. When we use our mobile phone, the cell network provider knows the location you are in and the time of the call. When you browse a bookstore on the internet, an applet will tell the web-site owner of your buying habits - and the moment you make a purchase on the net, you leave behind a sign of your reading habits and intellectual preferences. When you use your credit card on the net to buy flowers, the address of the receiver is recorded and related to your ID. If you are under medical treatment and receive medicine, the prescription will inform about your deceases. Under which circumstances do you want this information to be revealed? Most countries as well as the European Union and its member countries have since long been aware of the potential threat against personal integrity in case a malevolent organization got hold of all this information. And now Governments in most countries are becoming increasingly interested in accessing personal information to prevent terrorism and establish an electronic surveillance of dubious elements in the society. This paper intends to describe how IT solutions with a special focus on the public sector could be developed and deployed that will help organizations as well as individuals to protect their personally identifiable information, set up policies that will be translated to watch dogs that will ensure that these policies are

  10. European Trends in Privacy: How can we increase internet security and protect individual privacy?

    Directory of Open Access Journals (Sweden)

    Soren Duus Ostergaard

    2004-04-01

    Full Text Available In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases through gateways has become a standard way of doing things. Legislation has been put in place which in many countries give the authorities increased right to analyze personal data ? In some cases overriding existing privacy legislation. >In a networked world everybody leaves traces that are personally individually identifiable (PII. When we use our mobile phone, the cell network provider knows the location you are in and the time of the call. When you browse a bookstore on the internet, an applet will tell the web-site owner of your buying habits - and the moment you make a purchase on the net, you leave behind a sign of your reading habits and intellectual preferences. When you use your credit card on the net to buy flowers, the address of the receiver is recorded and related to your ID. If you are under medical treatment and receive medicine, the prescription will inform about your deceases. Under which circumstances do you want this information to be revealed? Most countries as well as the European Union and its member countries have since long been aware of the potential threat against personal integrity in case a malevolent organization got hold of all this information. And now Governments in most countries are becoming increasingly interested in accessing personal information to prevent terrorism and establish an electronic surveillance of dubious elements in the society. This paper intends to describe how IT solutions with a special focus on the public sector could be developed and deployed that will help organizations as well as individuals to protect their personally identifiable information, set up policies that will be translated to watch dogs that will ensure that these policies are

  11. Secure transfer of surveillance data over Internet using Virtual Private Network technology. Field trial between STUK and IAEA

    Energy Technology Data Exchange (ETDEWEB)

    Smartt, H.; Martinez, R.; Caskey, S. [Sandia National Laboratories (United States); Honkamaa, T.; Ilander, T.; Poellaenen, R. [Radiation and Nuclear Safety Authority, Helsinki (Finland); Jeremica, N.; Ford, G. [Nokia (Finland)

    2000-01-01

    One of the primary concerns of employing remote monitoring technologies for IAEA safeguards applications is the high cost of data transmission. Transmitting data over the Internet has been shown often to be less expensive than other data transmission methods. However, data security of the Internet is often considered to be at a low level. Virtual Private Networks has emerged as a solution to this problem. A field demonstration was implemented to evaluate the use of Virtual Private Networks (via the Internet) as a means for data transmission. Evaluation points included security, reliability and cost. The existing Finnish Remote Environmental Monitoring System, located at the STUK facility in Helsinki, Finland, served as the field demonstration system. Sandia National Laboratories (SNL) established a Virtual Private Network between STUK (Radiation and Nuclear Safety Authority) Headquarters in Helsinki, Finland, and IAEA Headquarters in Vienna, Austria. Data from the existing STUK Remote Monitoring System was viewed at the IAEA via this network. The Virtual Private Network link was established in a proper manner, which guarantees the data security. Encryption was verified using a network sniffer. No problems were? encountered during the test. In the test system, fixed costs were higher than in the previous system, which utilized telephone lines. On the other hand transmission and operating costs are very low. Therefore, with low data amounts, the test system is not cost-effective, but if the data amount is tens of Megabytes per day the use of Virtual Private Networks and Internet will be economically justifiable. A cost-benefit analysis should be performed for each site due to significant variables. (orig.)

  12. A Review of Security Threats of Mobile Internet%移动互联网安全威胁研究

    Institute of Scientific and Technical Information of China (English)

    王学强; 雷灵光; 王跃武

    2014-01-01

    移动智能终端的广泛应用以及其与互联网技术的融合,推动了移动互联网时代的到来。移动互联网带来新技术、新用户体验和新商业模式的同时,也面临着一系列的安全威胁。移动终端和通信网络等构成了移动互联网的基本架构,攻击可能发生在系统中的每个层面。文章通过广泛调研,在理解移动互联网不同层次的安全机制的基础上,总结并简要分析各个层次所面临的安全威胁。%The era of Mobile Internet has come with the broad adoption of mobile intelligent terminal and its integration into Internet. However, accompanying the new technology, novel user experience and revolutionized business model that Mobile Internet brings us, there also arise some severe threats to user’s information and property security. Attacks could happen in each layer of mobile terminal and communication network, which make up the main architecture of Mobile Internet. In this paper, a multilayer analysis of security threats about Mobile Internet is proposed based on an extensive research process.

  13. Government internet secure access technical architecture%政府部门互联网安全接入技术架构

    Institute of Scientific and Technical Information of China (English)

    刘盛辉; 朱志祥; 任学强

    2012-01-01

    In view of government internet access situation, it presents the Government Internet Secure Access Technical architecture. By constructing the Government Internet Secure Access Point Government Internet Secure Access Operation Center, it achieves the goals of manageability, controllability, scalability of E-government network.. It also takes Shaanxi Province for example and describes Shaanxi Government Internet Secure Access technical architecture, which is mainly relying on the E-Government unified platform, by constructing six Government Internet Secure Access Points and one Government Internet Secure Access Operation Center, can we realize the secure access and centralized supervision of Government Internet.%针对我国政府部门互联网接入现状,提出了政府部门互联网安全接入技术架构。通过建立政府部门安全接入点和安全接入管理中心,实现对电子政务网络的可管、可控和可剥离。并以陕西省为例,详细介绍了陕西省政府部门互联网安全接入技术架构,依托电子政务统一平台,通过建立6个互联网安全接入点和1个安全接入管理中心,实现了政府部门互联网安全接入和集中监管。

  14. 物联网安全威胁与措施%Security threats and measures for the Internet of Things

    Institute of Scientific and Technical Information of China (English)

    杨光; 耿贵宁; 都婧; 刘照辉; 韩鹤

    2011-01-01

    Governments,companies and research institutions are pressuring research and development of the Internet of Things.However,the development of the Internet of Things will be constrained by security and privacy threats.This paper summarizes security threats to the Internet of Things to provide a theoretical reference for study of the Internet of Things and to provide useful security measures.The architecture of the Internet of Things is used to classify threats for the perception layer,transport layer and application layer.The perception layer threats include security threats for Radio Frequency Identification,Wireless Sensor Networks and mobile intelligent terminals.Transport layer threats include data leakage or damage and security issues during massive data integration.Application layer threats include the loss of user privacy,incorrect access control policies and inadequate security standards.Finally,this paper gives security measures and recommendations for all types of security threats.%随着物联网概念的提出,各国政府、企业和科研机构纷纷加入物联网的研究和建设工作。物联网的建设与发展必然受到物联网安全和隐私问题的制约,为理清物联网目前存在的安全威胁、为物联网安全与隐私保护提供理论参考,该文总结了物联网面临的安全威胁即相应安全措施。根据物联网目前主流体系架构,分别从感知层、传输层和应用层对安全威胁进行研究。感知层安全威胁研究主要针对射频识别安全威胁、无线传感网安全威胁和移动智能终端安全威胁。传输层安全威胁研究主要针对数据泄露或破坏以及海量数据融合等安全问题进行研究。应用层安全威胁研究主要针对用户隐私泄露、访问控制措施设置不当与安全标准不完善等问题。最后,针对各类安全威胁给出了相应的安全措施及建议。

  15. 物联网感知层安全性研究综述%Review on security research of the Internet of things perception layer

    Institute of Scientific and Technical Information of China (English)

    王素苹

    2015-01-01

    Large-scale application of the Internet of things cannot do without security. The perception layer is at the bottom of architecture of Internet of things that assumes heavy responsibility of information perception. The security of perception layer is the main difference between Internet security and Internet of things security,and it is the focus of Internet of things security. Summarize security architecture of the Internet of things perception layer and security threats of perception layer;perception layer security includes RFID security and wireless sensor networks( WSNs)security and summarize the recent research achievements on this two aspects;put forward future research direction of RFID security and WSNs security;it can provide a reference for researchers who research on Internet of things security field.%物联网的大规模应用离不开安全性的保障。感知层在物联网体系结构中处于底层,承担信息感知的重任。感知层的安全问题是物联网安全与互联网安全主要的差别所在,是物联网安全的重点。针对物联网感知层的安全架构、感知层的安全威胁进行了分析总结;从无线射频识别( RFID)安全、无线传感器网络安全两个方面总结了近年来物联网感知层的安全性研究成果;提出了RFID安全和无线传感器网络安全的未来研究方向;给物联网安全领域的研究者提供一定的参考。

  16. Research on Security Threats and Strategy of Mobile Internet%移动互联网安全威胁及策略研究

    Institute of Scientific and Technical Information of China (English)

    李勇辉; 王晓箴; 贾亦辰

    2013-01-01

    It first summarizes the development trends and characteristics of mobile internet. According to the characteristics of mobile in-ternet, it analyzes the security threats from the aspect of network, application platform and cellphones. Then, it lists several common security techniques for mobile internet. On this basis, it proposes a security model of mobile internet and elaborates the security architecture from security objectives, security levels and security measures.%首先总结了移动互联网的发展趋势和特点,根据移动互联网的特性,分析了移动互联网面临的网络安全威胁、业务平台威胁和终端安全威胁;然后,研究了几种常见的移动互联网安全防护技术,在此基础上,构建移动互联网的安全架构及模型,从安全目标、安全层次与安全措施3个维度具体阐述了安全架构的防护体系。

  17. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...... a detailed survey and analysis of embedded security especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis , isolation...... , and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices Finally, this paper proposes the embedded security framework as a feature of software/hardware co...

  18. Research on Security Evaluation and Risk Assessment for Internet of Things%物联网安全测评和风险评估技术研究*

    Institute of Scientific and Technical Information of China (English)

    雷王景

    2013-01-01

    The main technology,platform framework and system realization of Internet of Things(IOT)security test with evaluation and risk assessment service platform are presented,which is realized based on information security simulation,Internet of Things security test with evaluation,security risk assessment technology. The platform can test and evaluate the construction scheme,security technology means of Internet of Things,and can also promote China′s Internet of Things construction and security industry development.%  提出采用信息安全仿真、物联网安全测评和安全风险评估技术实现的物联网安全测评和风险评估服务平台的主要技术、平台结构和系统实现。此平台能够为物联网建设方案、安全技术手段进行测试与评估,推动我国物联网建设和物联网安全产业的发展。

  19. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a...

  20. 浅析计算机网络安全与防范措施%Analysis of Internet Security and Effective Measures

    Institute of Scientific and Technical Information of China (English)

    王建云

    2016-01-01

    计算机网络安全已经成为网络环境面临的严重问题,这主要是发达的网络技术和具有各种各样网络技术人员的诸多操作造成的。简要介绍计算机网络安全的现象,浅析我们要如何采取预防措施,用行之有效的办法对计算机网络安全进行维护。%The internet security has become a serious problem in the internet environment,which is mainly caused by the advanced internet technology and many improper operations given by inter-net technicians.This article will briefly introduce all kinds of phenomena of internet security and what measures we need to take to maintain internet security effectively.

  1. 云计算环境下移动互联网安全问题研究%Mobile Internet Security in Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    刘权; 王涛

    2015-01-01

    基于云计算的特点和移动互联网存在的安全问题,提出了云计算环境下移动互联网应用的新特点,指出了由此带来的新的安全问题,如通过移动互联网对云服务的攻击、云服务可用性面临严峻考验、企业的业务流程和业务数据面临更大风险等,并指出移动互联网一些固有安全问题更为突出,如个人隐私泄露、不良信息传播、个人信息滥用、综合信息挖掘等;从终端安全、网络通信安全、云端安全等方面,提出了提升云计算环境下移动互联网安全防护能力的对策与建议。%In this paper, according to the characteristics of cloud computing and information security issues of mobile Internet, we discuss the new characteristics of mobile Internet application in cloud computing and new information security issues in cloud computing environment, such as attacks on cloud services via mobile Internet, severe chal enges to the availability of cloud services, and the high risk of business process and data face risks. Some existing information security issues of mobile Internet are more serious in cloud computing environment, such as personal privacy leakage, proliferation of bad information, misuse of personal information and information mining. We propose countermeasures and suggestions to enhance mobile Internet security in cloud computing from aspects such as terminal security, network security and cloud security.

  2. 浅析移动互联网信息安全威胁与应对策略%Analysis of mobile Internet information security threats and countermeasures

    Institute of Scientific and Technical Information of China (English)

    宋光泽

    2016-01-01

    当今世界,移动互联网已然发展成一个十分开放的信息技术平台,为人们日常生活、工作、学习等带来了巨大的冲击。然而伴随移动互联网技术的不断发展,移动互联网也面临着一系列信息安全威胁。文章通过阐述移动互联网带来的信息安全威胁,开展移动互联网发展趋势及案例分析,对强化移动互联网信息安全防护策略展开探讨,旨在为促进全面移动互联网有序健康发展提供一些思路。%In the world today, the mobile Internet has become a very open platform of information technology, which has brought people's daily life, work, learning with tremendous impact, but with the continuous development of mobile Internet technology, mobile Internet is also facing a series of security threats of information security. This paper described the information security threat brought by mobile Internet, to carry out analysis of the development trend of mobile Internet and case discussion on strengthening the mobile Internet information security strategies, to aim at provide some ideas of promoting the orderly and healthy development of the mobile Internet comprehensive research .

  3. Big Data, Internet of Things and Cloud Convergence--An Architecture for Secure E-Health Applications.

    Science.gov (United States)

    Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian

    2015-11-01

    Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.

  4. Internet of people, things and services - the convergence of security, trust and privacy

    CSIR Research Space (South Africa)

    Eloff, JHP

    2009-12-01

    Full Text Available , the patient may request that his/her health data should exclude his/her biographical details and may be released only to trustable health organizations. The IoPTS (security, trust, privacy) structure presented in this paper is a first attempt in simplifying...

  5. How Secure is the Next-Generation Internet? An Examination of IPv6

    Science.gov (United States)

    2013-10-01

    9 2.7 Mobile IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3 Security Vulnerabilities and Countermeasures...19 3.5 Tunnelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.6 Mobile IPv6 ...Message Digest Algorithm MIPv6 Mobile IPv6 MitM Man in the Middle MLD Multicast Listener Discovery MLDv2 Multicast Listener Discovery version 2 MTU

  6. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices

    Science.gov (United States)

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor

    2016-01-01

    The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things. PMID:27754378

  7. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.

    Science.gov (United States)

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor

    2016-10-13

    The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things.

  8. 网上考试系统中的安全机制%Security Mechanism of Exam-System on Internet

    Institute of Scientific and Technical Information of China (English)

    郝莹

    2001-01-01

    In this paper, the security problems of Exam-System are described on Internet, including design and implement about network security and database security and other sensitivity information protective.%本文主要论述基于Internet的网上考试系统所涉及的安全问题,包括网络安全、数据库安全及其它敏感信息保护的解决方案与具体实现。

  9. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

    Science.gov (United States)

    Park, Namje; Kang, Namhi

    2015-12-24

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  10. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

    Directory of Open Access Journals (Sweden)

    Namje Park

    2015-12-01

    Full Text Available The Internet of Things (IoT, which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  11. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  12. 移动互联网信息安全威胁与漏洞分析%Analysis of Mobile Internet Information Security Threats and Vulnerabilities

    Institute of Scientific and Technical Information of China (English)

    李勇

    2014-01-01

    With the convergence of communication and Internet technologies, mobile Internet develops quickly and has become the hot topic of industry and academic community. More and more smart mobile devices are produced and new mobile Internet business is created, at the same time, mobile Internet is fa-cing more new security threats. This paper summarizes the threats to end users, enterprise information se-curity, network infrastructure and national information security, analyses the information security vulnera-bilities from aspects of network access, mobile operating system, mobile application and end users, finally emphasizes the importance of the whole industry chain for working together to maintain a secure mobile In-ternet ecosystem.%随着通信技术和互联网技术的深度融合,移动互联网快速发展,无疑已成为业界和学术界共同关注的热点。但伴随着智能移动终端的普及和移动互联网业务的不断创新,移动互联网也面临着新的安全威胁。总结了移动互联网给终端用户、企业信息安全、网络基础设施和国家信息安全带来的威胁,并从入网方式、移动操作系统、移动应用和终端用户四个方面分析移动互联网目前存在的信息安全漏洞,强调整个产业链必须共同努力来构建移动互联网信息安全体系。

  13. Design and Implementation of A DICOM PACS With Secure Access Via Internet

    Science.gov (United States)

    2007-11-02

    Digital Radiology Department”. [Last access 05/28/2001]. Available URL: http://ej.rsna.org/EJ_0_96/0051-97.fin/Pacs97.html [13] B. Parker. “ Estudio ...de un caso de implantación de [Last access 05/25/2001]. Available URL: http://www.vcgimagen.com.ar./EspPACS3.htm [14] “Apache secured by SSL” [Last

  14. A Security Concern in MS-Windows: Stealing User Information From Internet Browsers Using Faked Windows

    Directory of Open Access Journals (Sweden)

    Lior Shamir

    2006-04-01

    Full Text Available A simple method that might be used by malicious attackers for stealing usernames, passwords, credit card numbers or other valuable small pieces of information is described. Hidden processes running on Windows-based machines might create faked controls and place them on the browser exactly on top of the real controls of web pages such as on-line banking account login pages. Users might then type in their passwords or credit card numbers into the faked controls, allowing the malicious process to capture the data. Since spyware is a large and growing threat to internet users, it is not unlikely that such a technique will be used for stealing valuable information. An example based on Hotmail web-based email service is demonstrated, but this technique might be used for a variety of password-protected web services. The paper also discusses different approach of protection against the described attack.

  15. Security of Internet Banking based on Cost/Efficiency Analysis%基于成本/收益分析的网银安全

    Institute of Scientific and Technical Information of China (English)

    班晓芳; 佟鑫

    2012-01-01

    文中通过分析造成网上网银安全事件的外因——网银攻击和内因——网银系统漏洞,运用风险管理的思想分析了攻防双方的成本和收益,进而给出了网银安全的必要条件,并从技术、管理和业务3个方面研究了网银系统漏洞,最后对网银系统安全保障工作提出了安全应对措施的建议。%Through discussing the causes resulting in security events of the internet banking, in clouding external factor-system attack and internal factor-system vulnerabilities, and analyzing the costs and benefits of both offensive and defensive sides with risk management theory, the necessary condition for security of the internet banking are thus given. And then the vulnerabilities of the internet banking system are studied in detail from three aspects including technology, management and business. Finally, some recommendations and countermeasures for safeguarding the internet banking security are also suggested in this paper.

  16. Internet Banking and Jordanian Co rporate Customers: Issues of Security and Trust

    Directory of Open Access Journals (Sweden)

    MUHAMMED S. ALNSOUR

    2011-04-01

    Full Text Available Research on the acceptance behaviour of technology is sizeable, yet it is relatively heterogeneous and fragmented in the context of developing economies like Jordan. The paper tries to offer insights about two critical factors in acceptance behavior of Jordanian customers, namely, security and trust. This article puts together an integrated conceptual model for acceptance behavior of Jordanian Corporate customers that includes these two critical issues. Hypoth eses are developed from extant literature, these indicate possible associations among the constructs of the model. Based on input received from 353 corporate customers, the proposed model is empirically tested using structural equation modeling. Of the hypothesized associations examined, five were found to be statistically significant and in the right direction. The results confirm most of the findings of previous research on the subject, while some fresh insights on the interrelationships of the constructs used are also revealed. The results of the study have serious implications for bankers, corporate online users, and business educators, who may use the empirically tested model as a di agnostic and monitoring tool in explaining the acceptance behavior of Jordanian business users of online banking. This paper concludes that security and trust should be integrated to perceived usefulness and perceived ease of use in explaining acceptance behaviour of corporate customers.

  17. Network security of mobile Internet era%移动互联网时代的网络安全初探

    Institute of Scientific and Technical Information of China (English)

    王伟成; 全宇; 刘政

    2015-01-01

    我国目前已进入移动互联网时代,随着手机用户的爆发式增长,移动互联网的安全问题也越来越突出,成为人们网络生活中的巨大威胁。%China has entered the era of mobile Internet, with the explosive growth of mobile phone users, mobile internet security issues become increasingly prominent, become a great threat to people's network life.

  18. Security Analysis and Countermeasure Research of Internet of Things%物联网安全问题的分析与对策研究

    Institute of Scientific and Technical Information of China (English)

    倪红军; 李霞; 周游

    2013-01-01

    物联网终端设备的数量急剧增加,终端设备无人值守,终端设备本身的安全及信息传递过程中的安全无法保障,用户隐私信息被泄露等,本文将上述问题归类为物联网自身安全问题和网络应用安全问题.在介绍了物联网概念和体系结构的基础上对各种安全问题存在的原因进行了详细的分析,提出了终端设备与感知节点本地安全对策、物联网核心网络安全对策、物联网的加密机制安全对策、用户隐私安全对策.%According to the dramatic increasing number of terminal equipments for the Internet of Things applications, unattended terminal equipments, inability to safeguard the security of terminal equipment and user privacy information leakage during information transfer process, the paper classified them as its own security problems and network application security issues of the Internet of Things. In a detailed analysis of the various security problems on the basis of the concept of things and architecture, terminal device with perceived the node local security countermeasures, IOT core network security countermeasures, IOT encryption mechanisms security countermeasures and user privacy security countermeasures.

  19. 移动互联网安全问题及防护措施探讨%Discussion of Mobile Internet Security Issues and Protection Measures

    Institute of Scientific and Technical Information of China (English)

    王红凯; 王志强; 龚小刚

    2014-01-01

    With the rapid development of broadband wireless access technologies and mobile terminal technology, terminal mobility becomes increasingly apparent, the mobile Internet in the aspect of mobile terminal, access network, information security and application server data protection will face a series of new more severe challenges. Starting from the development status and characteristics of mobile Internet, this article studies current typical mobile Internet applications, analyzes the security threats and risks in the mobile Internet environment, and presents a security risk control measures and protection means for the mobile Internet environment.%随着宽带无线接入技术和移动终端技术的飞速发展,终端移动化趋势日趋明显,移动互联网在移动终端、接入网络、应用服务端的信息安全与数据保护等方面面临一系列新的、更严峻的挑战。文章主要从移动互联网的发展现状与特性入手,以当前典型移动互联网应用作为研究对象,分析了移动互联网环境下的安全威胁与风险,提出了移动互联网环境下的安全风险控制措施与防护手段。

  20. 移动互联网安全问题与对策思考%Situation and Suggestions to Mobile Internet Security in China

    Institute of Scientific and Technical Information of China (English)

    杜跃进; 李挺

    2013-01-01

    This paper analyzes current mobile security situation and problems of China based on the research and data of NINIS on mobile security, presents a three-level-structure technical framework which includes source-path-terminal, and makes suggestions about mobile internet security management from mobile application store security regulation. Hope to provide new references to mobile internet security.%以国家网络信息安全技术研究所的研究数据为依据,介绍我国移动互联网安全现状与问题,从“源头→路径→终端”三个层次提出移动互联网安全技术框架,从移动应用商店安全监管提出移动互联网安全管理建议,为提高我国移动互联网安全水平提供新的思路。

  1. 基于互联网的移动应用安全管理研究%Research on Security Management of Mobile Application Based on the Internet

    Institute of Scientific and Technical Information of China (English)

    张懿

    2016-01-01

    伴随着互联网网络与移动网络的融合,移动互联网网络变得更加开放,其可以对用户开展的业务也更加的丰富多彩,终端智能手持设备逐渐占领了移动设备市场。智能设备突出的特点、应用以及娱乐性能在移动互联网网络中变得越来越明显。但是,伴随着新型的移动互联网服务模式的出现,文章研究的移动互联网网络安全问题也出现了新的形式和特点,应用安全问题已经成为移动互联网网络推广的主要问题。%With the fusion of Internet network and mobile network, mobile Internet network become more open, so the business to be carried out for users also be more rich and colorful. Terminal intelligent handheld devices gradually occupied the market of the mobile devices. The outstanding performance characteristics, application and entertainment of the intelligent equipment is becoming more and more obvious in the mobile Internet network. However, with the advent of new model of mobile Internet services, mobile Internet network security issues have appeared in the new form and characteristics, application security problem has become the main problem of the mobile Internet network popularization.

  2. Discussion on Information Security Problem in Mobile Internet Era%移动互联网时代信息安全问题浅谈

    Institute of Scientific and Technical Information of China (English)

    朱靖

    2015-01-01

    移动互联网时代智能手机成为人们随时获取信息、传递信息、存储信息的有力工具。但是越来越多的个人隐私信息从手机外泄,被非法利用,个人信息危机重重,安全状况令人担忧。文章主要针对移动互联网时代存在的信息安全问题进行分析,进而提出相关的解决措施,以期提高互联网时代的个人信息安全。%The mobile Internet era of smart phones makes people obtain information at any time,is a powerful tool to convey information,storage information.But a growing number of personal privacy information from mobile phones are leaked,illegally used, personal information crisis,the security situation is worrying.This paper focuses on information security problems of mobile Internet era, and then puts forward relevant solving measures,in order to improve the personal information security of the Internet era.

  3. Research on Security Model in Internet of Things for Tobacco Companies%烟草物联网网络安全模型研究

    Institute of Scientific and Technical Information of China (English)

    陈子弘

    2015-01-01

    现在物联网技术已经实现了网络中的物物相联.然而在物联网的发展过程中,除了存在传统网络管控等一系列安全问题,也呈现出新的网络安全问题.文章以烟草商业企业物联网的网络安全为研究目标,分析现有烟草物联网安全架构的特点,探讨其中存在的安全问题,并提出一种基于P2DR2思想的烟草物联网安全架构模型.%The development of modern Internet of Things (IoT) has realized the connections between objects via Internet preliminarily. In the IoT, we would face the security issues that appeared in the early Internet, also some new issues which would lead to a big risk. In this paper, the related secure threats in the IoT for tobacco companies are analyzed. Finally, security architecture of IoT for Tobacco companies based on P2DR2 model is presented.

  4. Research on RFID Security Mechanism Based on Internet of Things%物联网射频识别技术安全机制研究

    Institute of Scientific and Technical Information of China (English)

    卢炼

    2015-01-01

    随着科学技术的发展,物联网的研究和应用也越来越广泛,RFID作为物联网的重要组成部分,其安全问题一直没有得到应有的重视.本文首先阐述了RFID系统及其存在的安全问题,然后讨论了现有的安全防御策略,最后针对物联网和RFID的特点,设计了一种混合加密模式.%With the development of science and technology, the research and application of Internet of things are becoming more and more popular. As an important part of the Internet of things, the security issue of RFID has not received the proper attention. This paper states the RFID system and its security problems, and discusses the existing strategies of security defense, and finally designs the mixed encryption mode according to the characteristics of the Internet of things and RFID.

  5. Perspective Internet Evolution of Computer Network Security Management%Internet演变视角下计算机网络安全管理的发展

    Institute of Scientific and Technical Information of China (English)

    白宇

    2014-01-01

    Internet has a greater openness, therefore, the development process has become increasingly complex computer networks, the Internet constantly upgrading today, computer network security has become in today's society in general at ention. In this paper, the development and evolution of the Internet and computer network security management to analyze and explore the prospects for the development of computer network technology and security management tradition.%Internet具有较大的开放性,因此计算机网络的发展过程也越来越复杂,在互联网应用不断发展的今天,计算机网络安全成为当今社会普遍重视的问题。文章就对Internet和计算机网络安全管理的发展和演变过程进行分析,并探究了计算机网络安全管理的传统技术和发展前景。

  6. Research on the Key Technology of Security of Mobile Internet Authentication and Security Applications%移动互联网络安全认证及安全应用中若干关键技术研究

    Institute of Scientific and Technical Information of China (English)

    张莹

    2016-01-01

    随着时代的发展和技术的进步,移动互联网在人们的生活中扮演着越来越重要的角色。从目前的趋势看来,移动互联网的普及度还会越来越高。移动互联网普及的同时,也由于互联网的开放性较强而产生了安全问题,尤其是涉及用户隐私安全的方面近年来诸见报道。这是我们迫切需要解决的问题。除了有关部门需要做好信息保护的工作外,安全技术方面也极其重要。文章根据现实情况对安全身份认证、文档保护、签名服务技术等等方面分析移动互联网络安全认证及安全应用中的关键技术进行阐述。%Along with the time development and the technical progress, the mobile Internet in the people's life plays a more and more important role. From the point of view of the current trend, mobile Internet popularization degree will be getting higher and higher. The popularity of mobile Internet at the same time, due to the Internet open strong and produced security issues, in particular to user privacy and security in recent years found in newspapers. This is we urgently need to solve the problem. In addition to the relevant departments need to do a good job in the work of information protection, security technology and its important. This paper according to the reality of the situation of security authentication, document protection signature service technology and so on analysis of mobile Internet The key technologies of network security authentication and security application are described.

  7. An Examination of Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce: Using An Extension of the Technology Acceptance Model

    Directory of Open Access Journals (Sweden)

    Muniruddeen Lallmahamood

    2007-12-01

    Full Text Available This study explores the impact of perceived security and privacy on the intention to use Internet banking. An extended version of the technology acceptance model (TAM is used to examine the above perception. A survey was distributed, the 187 responses mainly from the urban cities in Malaysia, hav e generally agreed that security and privacy are still the main concerns while using Internet banking. The research model explains over half of the variance of the intention to use Internet banking [R 2 = 0.532 (adjusted], the unexplained 47 percent of variance suggests that the model may have excluded other possible factors influencing the acceptance of Internet banking. Interaction in the local language (Bahasa Malaysia did not have an impact on the ease of use of Internet banking. Internet security, Internet banking regulations and customers’ privacy would remain future challenges of Internet banking acceptance. The value of this study may provide an updated literature in the field of Internet banking acceptance in Malaysia

  8. Research and Application of College Mobile Internet Information Security Risk Assessment System%高校移动互联网信息安全风险评价系统研究及应用

    Institute of Scientific and Technical Information of China (English)

    张淋江; 刘志龙

    2016-01-01

    Along with the increase of college students users of mobile Internet, colleges and universities in China need to strengthen the mobile Internet security management in the development and operation and establish efficient mobile Internet information security management system to deal with the security risks existing in the mobile Internet application services. In this paper, combined with the new requirements of the current mobile Internet security in colleges and universities, the information security risk assessment system based on mobile Internet is developed. The uncertain mobile Internet security risk factors existing in colleges and universities are collected to form a classified, quantitative and systematic risk assessment system, so as to provide basis for mobile Internet information security risk management in colleges and universities.%随着移动互联网大学生用户群体的逐渐增多,我国高校在发展和运行中亟需加强移动互联网安全管理, 建立系统高效的移动互联网信息安全管理体系,应对移动互联网应用服务中存在的诸多安全风险.本文结合当前高校移动互联网安全的新需求,开发基于移动互联网的信息安全风险评价系统,针对高校存在的不确定移动互联网安全风险因素,进行收集整理,形成分类、量化、系统的风险评价体系,为高校移动互联网信息安全风险管理决策提供依据.

  9. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    OpenAIRE

    Mihai-Gabriel IONITA; Victor-Valeriu PATRICIU

    2016-01-01

    Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices aroun...

  10. 爱憎分明响应快速——卡巴斯基Internet Security 6.0杀毒软件

    Institute of Scientific and Technical Information of China (English)

    小洋

    2006-01-01

    正如你已离不开Windows、Office、Internet、QQ一样,安全软件早就成为咱们三餐不可或缺的开胃菜了。不过萝卜、白菜各有所爱,大家几乎都有自己钟爱的产品,对于众“卡友”来说,新鲜出炉的卡巴斯基Internet Security 6.0(以下简称KIS6.0)无疑是最好的年中大礼。

  11. Internet of Things Security Models and Encryption Algorithm%物联网安全模型与加密算法应用

    Institute of Scientific and Technical Information of China (English)

    叶质刚

    2015-01-01

    物联网包含嵌入式计算机、不显眼的传感器、全球系统以及大数据分析环境,这些系统、传感器和设备都在进行互相通信,构建了一个与生活无缝连接的无处不在的网络。安全问题已经成为制约物联网发展的一个瓶颈,通过分析物联网的安全性和可能面临的攻击,对物联网的安全模型进行分析研究,讨论了同态加密在其中的应用。%IOT contains embedded computer,sensors, global system and the analysis of the big data environment. These systems,sensors and devices to communicate with each other are doing,build a ubiquitous network seamlessly connected to our lives. Safety problem has become a bottleneck restricting the development of the Internet of things,through the analysis of the security of the Internet of things and could face attack,the security model of IOT is studied the application of Homomorphic encryption is discussed.

  12. 高铁线路物联网安防系统设计%Design of High-Speed Rail Line Security System Based on Internet of Things

    Institute of Scientific and Technical Information of China (English)

    赵凌

    2016-01-01

    针对高铁线路的低矮桥梁、路基、贯通地线、疏散通道和在建高铁线路建材设备面临的入侵破坏或被盗隐患等问题,分析了在这些方面安全防范发展物联网的需求。而无线传感器网络和射频识别技术是物联网的关键技术,在缺乏持续电源供电的情况下对于入侵报警、被盗信息的采集和物体自身信息识别方面具有十分重要的应用空间,由此提出了高铁线路物联网安防系统。该系统结合物联网体系结构,具有实时报警监控、及时反应制止的功能,有效地提升了高铁线路技术防范能力,增强了高铁线路民警治安防控战斗力,最后讨论了在实施过程中面临的问题。%Low bridges,subgrade,the links up of grounding wire,evacuation exits,materials and equipment in construction of the high-speed rail line are confronting problems of intrusion and being stolen,or some other problems,which are later analyzed on requirement of developing internet of things in security protection.As we known,WSN and RFID are key technologies of internet of things which have very important amplitude application in intrusion alarm,stolen information collection and objects self-recognition in lack of sustainable power supply circumstances.By referring to these,it put forward high-speed rail line security system based on internet of things.This system combined with architecture of internet of things,and has the function in real-time alarm supervision and response suppression,which will hoist capacity of technique prevention in high-speed rail line,and what’s more,the security prevention and control ability to the high-speed rail line police.At last,problems which will be faced with during the implementation process were discussed.

  13. 论因特网与公安网条件下公安院校教育信息资源共享%Discussion on Internet and Education Information Resources Sharing in Public Security Colleges

    Institute of Scientific and Technical Information of China (English)

    宋波

    2014-01-01

    Realizing the public security education information resources sharing is a formidable task .On how public security education uses the advanced Internet and public security network to realize public security education information resource sharing issues ,this paper has made preliminary discus-sions .%实现公安教育信息资源共享是一项艰巨的任务。文章就公安教育如何利用发达的互联网和公安网,实现公安教育信息资源共享问题,进行了初步探讨。

  14. Design of a cyber security awareness campaign for internet Cafés users in rural areas

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2011-05-01

    Full Text Available Africa may have the lowest number of Internet users in the world, but it also has the highest growth rate and the number of users is steadily growing. A majority of the African population is still excluded from global cyber networks and thus have...

  15. The Development and Evaluation of a Peer-Training Program for Elementary School Students Teaching Secure Internet Use

    Science.gov (United States)

    Korkmaz, Murat; Esen, Binnaz Kiran

    2013-01-01

    The aim of this study is to design and evaluate a peer-training program about changing students' internet use habits. This study was conducted with students from two different elementary schools in Mersin, Turkey, who were enrolled in 7th or 8th grade in the 2009-2010 academic year. A total of 24 students participated in the program, 12 of whom…

  16. 物联网感知层信息安全分析与建议%Analysis and suggestion on information security of Internet of Things perceptual layer

    Institute of Scientific and Technical Information of China (English)

    马纪丰; 梁浩

    2012-01-01

    Internet of Things (IOT) , with the help of perception technology, aims to build a total connection network between human and things. Since the conception of IOT was proposed, IOT has been largely promoted and actively developed by the governments, research institutions and enterprises. As perception layer is the major source of IOT information, its information security is the most important issue during the development of IOT. This paper studies the key information technologies and security threats of perception layer, and then analyzes and summarizes the existing security mechanism. Finally, this paper gives security measures and suggestions on the current security concerns on the perception layer.%物联网是以感知为目的,实现人与人、人与物、物与人全面互联的网络.其概念一经提出,得到了各国政府、科研机构以及各类企业的大力推广和积极发展.感知层作为物联网信息获取的主要来源,其信息安全问题是物联网发展所面临的首要问题.对物联网感知层的信息获取方式以及存在的安全威胁进行了研究,并对现有的安全防护机制进行了分析和总结.最后,针对感知层目前存在的信息安全问题及其技术的发展趋势,提出了相应的应对建议措施.

  17. 物联网安全问题研究及解决措施%Security Problems in Internet of Things and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    贾保先; 谢圣献; 李俊青; 贾仰理

    2012-01-01

    对物联网应用领域面临的主要问题进行了研究,指出了物联网安全的现状.分析了物联网安全需求方面的特点,对于不同的安全问题给出了相应的安全解决对策.利用基于本体的跨域授权管理模型,解决物联网中不同主体授权难的问题.该问题的解决对物联网应用领域的安全起到了保障作用.%The main problems existing in Internet of things (IoT) application field are analyzed, and the current safety status of IoT is pointed out. The features of security demand for IoT is analyzed, and the relevant solutions to various security problems are given. By adopting the ontology-based cross-domain authorization management model, the difficulty for authorization of different main subject is solved, and the security of the application field for IoTs is guaranteed.

  18. The Reserch of Internet of Things Security Issues%物联网安全问题研究

    Institute of Scientific and Technical Information of China (English)

    李志清

    2011-01-01

    物联网的安全问题是关系物联网产业能否安全可持续发展的核心技术之一,从信息安全的机密性、完整性和可用性等三个基本属性出发,分析了物联网安全需求和面临的安全问题,研究了物联网的安全模型,并对物联网的安全机制进行了探讨,希望为建立物联网可靠的信息安全体系提供参考依据。%The security of the IOT is one of the core technologies that will influence the security and sustainable development of the IOT.Based on confidentiality,integrity and availability,this paper analyzes the security demand and problems in IOT.It proposes a security model and discusses the security of the IOT,expecting to offer a reference for the establishment of reliable security systems of information for the IOT in the future.

  19. Internet+era Securities Company Long Tail Market Development Status, Conditions, Strategies%互联网+时代证券公司长尾市场拓展现状、条件、策略

    Institute of Scientific and Technical Information of China (English)

    袁金宇

    2015-01-01

    互联网的飞速发展使证券公司生存环境发生巨大改变,同时也为证券公司长尾市场拓展准备了充分条件。证券公司调整发展策略,利用互联网便利助推公司拓展长尾市场是证券公司发展的必经之路。%The rapid development of the Internet makes a huge change in the living environment of securities companies, but also for the long tail of the securities companies to expand the market to prepare the full condition. Securities companies to adjust the development strategy, the use of the Internet to facilitate the development of the long tail of the company's long tail market is the development of a securities company.

  20. Review and Prospect on the Research of Internet Culture Security at Home and Abroad in Recent Ten Years%近十年国内外网络文化安全研究的评述与展望∗

    Institute of Scientific and Technical Information of China (English)

    宋红岩; 汪向红

    2016-01-01

    随着网络产业革命、文化创新与社会变革的不断协同演进,网络文化安全问题越来越受到社会、政府、学界乃至社会公众的关注,但是国内外对网络文化安全内涵并没有定论。当前国内外学者对网络文化安全的定义、内容与要素进行了多元的诠释,学界对网络文化安全建设的政策机制、媒介融合、内容分级分类与社会公众素质等发展现状进行了探讨,各国也从国家顶层设计、技术创新与素养提升等层面进行了建设。应在梳理国内外网络文化安全发展建设的基础上,从我国网络文化安全战略要求提出理论构建、战略安排与协同创新路径安排。%With the co-evolution of the internet industrial revolution, cultural innovation and social change, internet culture secur⁃ity is attracting attention from the society, government, academic circles and the public, but there is not an unified definition at home and abroad on the connotation of internet culture security. Current domestic and foreign scholars have illustrated plurally the definition, content and elements of internet culture security, with discussing the construction of internet culture safety′s policy mechanism, media convergence, content classification and the public as well as the literacy of the public. Countries all over the world also are constructing their internet culture security from the national top layer design, technological innovation and quality improvement. On the basis of com⁃bing the domestic and abroad internet culture security construction and development, from the security strategy of China′s Internet cul⁃ture requirements, the paper will put forward the theoretical framework of ideas, strategic arrangement and collaborative innovation path arrangement for the internet culture security in China.

  1. 基于移动互联网的高校信息安全问题对策探讨%Countermeasures of the College Information Security Based on Mobile Internet

    Institute of Scientific and Technical Information of China (English)

    刘志龙; 张淋江; 周红雷

    2016-01-01

    With the fierce development of the mobile Internet technology and the unceasing strengthening of the function of intelligent terminal equipment, the application scope of the college mobile Internet is more and more widely, college students have become the most active users of mobile Internet applications. The application of olleges mobile Internet face the threat from the intelligent terminal system security vulnerabilities, mobile Internet service platform in universities, the network environment security, that makes the mobile Internet applications and information security faces the severe test, the study of the college mobile Internet and information security problems and countermeasures is imperative.%随着移动互联网技术的猛发展和智能终端设备功能的不断强大,高校移动互联网应用范围越来越广,大学生群体成了移动互联网应用最活跃的用户群体。高校移动互联网应用面临着来自智能终端系统安全漏洞、高校移动互联网业务平台、网络环境安全等方面的威胁,使得高校移动互联网应用信息安全面临严峻的考验,高校移动互联网信息安全问题及对策研究势在必行。

  2. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  3. 等级保护在物联网数据安全中的应用研究%Research on Application for Classiifed Protection in Data Security of the Internet of Things

    Institute of Scientific and Technical Information of China (English)

    李国琴

    2013-01-01

    Combining with the existing classified criteria of computer information system and based on the architecture of the internet of things, this paper analyses the data security requirements in the internet of things and the relationship between the architecture of the internet of things and the data security requirements. By grading for the internet of things,this paper proposes the application method for classiifed protection in data security of the internet of things.%文章结合现有的计算机信息系统等级划分方法,在物联网体系架构的基础上,分析了物联网中的数据安全需求,以及物联网体系架构和数据安全需求之间的关系。通过对物联网系统进行等级划分,提出了等级保护在物联网数据安全中的应用方法和思路。

  4. On Information Security in the Era of Mobile Internet%移动互联网时代信息安全探讨与研究

    Institute of Scientific and Technical Information of China (English)

    武钊

    2015-01-01

    Along with the fast development of mobile internet technology,especially the popularization of 4G mobile phone network,people’s life is becoming more and more convenient,even shopping and e-government can be paid or per-formed through apps. Through analysis of the characteristics of both smart phones and mobile internet,this paper discusses information security for mobile phone users and presents relevant solutions.%随着移动互联网技术的不断发展,特别是4G 手机网络逐渐普及之后,人们日常的生活变得越来越便利,无论是购物支付,还是网上政务都可以通过智能手机的应用程序来实现。对智能手机和移动互联网的特点进行了分析,探讨了手机信息安全问题,并提出了相应的解决方案。

  5. Exploration on graded protection strategies of mobile internet information security in 4G era%4G时代移动互联网信息安全分等级防护策略探讨

    Institute of Scientific and Technical Information of China (English)

    陈霖

    2014-01-01

    进入4G时代,移动互联网“路”更宽了,从移动互联网威胁的来源来看,其不但来源于传统的互联网,越来越多的威胁将出现在移动互联网内部。基于4G时代移动互联网面临的信息安全风险、威胁,对移动互联网信息安全防护体系进行分析,提出了分等级防护的防护策略。%In the 4G era, the“road”of mobile internet has become wider. The mobile internet threats come from not only the traditional internet but also the internal of the mobile internet. Based on the information security risks and threats of mobile internet in the 4G era, this paper analyzes the information security protection system of the mobile internet and puts forward the graded protection strategies.

  6. Security Analysis on Logistics System on the Internet of Things Mode%物联网模式下物流信息系统安全性分析

    Institute of Scientific and Technical Information of China (English)

    孙刚; 闫军; 程敏

    2014-01-01

    Internet of Things technology has broad space on development and application requirements in various fields,especially logistics industry.The Internet of Things in the logistics industry is mainly used in the foundation and part of the logistics business which mainly refers to applying of electrnoic label and RFID technology ,etc.In the future,the logistics industry will be combined logistics business level and supply chain level with the Internet of Things application,eventually formed intelligent logistics application system development.At the same time,system security problems are inevitable,including the Internet of Things security and Internet of Things application on the logistics industry the security problems.This article will analyze Internet of Things security problems,combined with the present situation of the application of Internet of things technology in the logistics industry,put forward a Internet of Things mode of logistics system security architecture,and presente design of security mechanism.%物联网技术在各领域都具有广泛的发展空间和应用需求,特别是物流行业。目前物联网在物流行业主要应用在基础级、部分物流业务级,即电子标签和RFID射频技术应用等方面。未来物流业将是物流业务层级和供应链层级与物联网应用结合,最终发展形成智能物流应用系统。同时,系统安全问题也不可避免,包含物联网自身的安全问题和物联网在物流业应用的安全问题。本文将针对物联网的安全问题进行分析,结合物联网技术在物流行业的应用现状,提出一种物联网模式下的物流系统的安全架构,并给出安全机制的设计思路。

  7. “互联网+”环境下的电子文件信息安全风险的界定%Definition of Information Security Risks of Electronic Records under"Internet+"Environment

    Institute of Scientific and Technical Information of China (English)

    史杰

    2016-01-01

    This article is started with the concept of the information security, information security risks, information se-curity of electronic records, electronic records of information security risks, discussed the information security of elec-tronic records and electronic records information security risks difference and relationship. Summarized the"Internet+"form of electronic records information security risks environment, put forward the concept of"protogenous risks","asso-ciated risks","congenital risks", and"posteriority risks". and pointed out in the"Internet+"environment, identifying information security risks elements of electronic records, under the"Internet+"environment of information security risks assessment and control, it possesses important practical significance.%文章从信息安全、信息安全风险、电子文件信息安全、电子文件信息安全风险的概念入手,讨论了电子文件信息安全与电子文件信息安全风险的区别与关系。归纳了“互联网+”环境下电子文件信息安全风险的表现形式,提出了“原生风险”、“伴生风险”、”先天风险“、”后天风险“的概念。指出在“互联网+”环境下,理清电子文件信息安全风险要素,对“互联网+”环境下电子文件信息安全风险进行评估与控制,具有重要的现实意义。

  8. 移动互联安全之无线网络的安全探析%Analysis of the Security of Wireless Network Security of Mobile Internet

    Institute of Scientific and Technical Information of China (English)

    任锦

    2014-01-01

    With the rapid development of intelligent mobile phone, computer flat mobile equipment of electronic equipment and the popularity of wireless networks, emerge as the times require, played an important role in people's life, solves the problem of cable network. But with the development of wireless network is applied more and more widely, also appeared a lot of security problems. CCTV"consumer advocate"program on the topic"dangerous Wife", a huge hidden security problems reported daily use wireless network, not only let people know the security of wireless network to trap, more let people realize the importance of the correct use of wireless network.%随着智能手机、平板电脑等移动设电子设备的飞速发展和普及,无线网络应运而生,在人们的生活中发挥了重要作用,解决了有线网络的不足。但随着无线网络应用越来越广泛,同时也出现了不少的安全问题。央视《消费主张》节目以“危险的Wife”为题,报道了人们日常使用无线网络时存在的巨大安全隐患,不仅让民众了解到了无线网络的安全陷阱,更让大家意识到了正确使用无线网络的重要性。

  9. 对非传统安全威胁的应对策略--以网络安全为例%Solutions to Nontraditional Security Threats---A Case Study of Internet Security

    Institute of Scientific and Technical Information of China (English)

    时亚梅

    2015-01-01

    非传统安全是在和平与发展逐渐成为时代主题、经济全球化进程日益加速的大背景下渐渐“出炉”的,在这种背景下,对非传统安全问题的研究成为中国在21世纪初的重要课题。非传统安全对国家安全和“人的安全”的影响,已经引起了我国党和政府的高度关注,并把它列为国家安全体系的基本要素,在党和国家的指导思想和具体政策上反映了出来。文章以网络安全为例,论述党和国家在全球化大背景下对非传统安全问题的重视,以及应对非传统安全威胁的策略。%Non-traditional security “appears” at the time when peace and development is the theme and under the background of rapid globalization.This study is one of the most impor-tant research subjects in the 21st China.The impact of nontraditional security issue on the na-tional and the individual security has aroused the attention of the government.Taking the Inter-net security as an example,this study concerns the solutions and strategies to this threat.

  10. Internet移动代理技术中的安全性研究%Study on security of Internet mobile agents technology

    Institute of Scientific and Technical Information of China (English)

    王常杰; 张方国; 王育民

    2001-01-01

    主要针对Internet的移动代理技术中的安全问题进行研究,介绍了移动代理技术的概念及目前主要的应用范畴,对该技术中的安全问题作了系统的分析.另外,对现有的移动代理系统的安全性能作了全面的比较,提出了后续的研究方向.%A research of security of Internet mobile agents technology ispresent in the paper. The conception of mobile agents and its main applications are introduced first and then we analyze the secruity questions in the mobile agents systems comprehensively. In addition, a general comparison of the security performance of the exiting mobile agents systems is given. As a result, we suggest the future study about the technology.

  11. Coverage of the Test of Memory Malingering, Victoria Symptom Validity Test, and Word Memory Test on the Internet: is test security threatened?

    Science.gov (United States)

    Bauer, Lyndsey; McCaffrey, Robert J

    2006-01-01

    In forensic neuropsychological settings, maintaining test security has become critically important, especially in regard to symptom validity tests (SVTs). Coaching, which can entail providing patients or litigants with information about the cognitive sequelae of head injury, or teaching them test-taking strategies to avoid detection of symptom dissimulation has been examined experimentally in many research studies. Emerging evidence supports that coaching strategies affect psychological and neuropsychological test performance to differing degrees depending on the coaching paradigm and the tests administered. The present study sought to examine Internet coverage of SVTs because it is potentially another source of coaching, or information that is readily available. Google searches were performed on the Test of Memory Malingering, the Victoria Symptom Validity Test, and the Word Memory Test. Results indicated that there is a variable amount of information available about each test that could threaten test security and validity should inappropriately interested parties find it. Steps that could be taken to improve this situation and limitations to this exploration are discussed.

  12. Research of public security platform software architecture based on internet of things%物联网公共安全平台软件体系架构研究

    Institute of Scientific and Technical Information of China (English)

    王晶; 全春来; 周翔

    2011-01-01

    针对现有公共安全管理平台的弊端,通过对物联网技术特征的分析,提出了将物联网技术应用于公共安全应急管理即建设物联网公共安全平台的思路.结合物联网体系结构,建立了物联网公共安全平台层次模型.该模型中,每层利用紧邻的下层服务,各层之间定义标准接口,方便了平台的模块化设计.基于物联网公共安全平台层次模型及对公共安全管理重点业务的分析,设计了物联网公共安全平台软件体系架构.%To overcome the disadvantages of the existing public security management system, by analyzing the technical features of the internet of things, a solution applying the internet of things into public security emergency management which means actually establishing a public security management platform based on the internet of things is presented. Referring to the structure of the internet of things, the platform multi-layer reference model is constructed. In this model, each layer utilizes services provided by its next down-layer and standard interfaces between layers, which has made the task of the platform modularization design easier. According to the multi-layer reference model and the key business about public security management, a public security platform software architecture based on the internet of things is designed.

  13. 我国“互联网+政务”系统安全体系研究%"Internet+government affairs"System Security Architectural Study in China

    Institute of Scientific and Technical Information of China (English)

    许翔燕

    2015-01-01

    “互联网+政务”是新一代信息技术手段,是国家实施政府组织机构职能转变,工作流程优化重组,提高政府管理、公共服务和应急能力的重要措施,有利于带动整个国民经济和社会信息化的发展。政务数据涉及国家基础数据、宏观经济数据和地理信息数据等国家核心机密及很多各个行业的重要数据,直接关系到一个国家的政治、军事、经济等领域的安全和稳定。新的技术带来新的安全隐患。构建安全管理保障体系能让互联网+政务系统保持畅通,提高政府政务能力,提高政府公信力。%"Internet+government affairs"is a new generation of information technology, is the national implementation of the gov⁃ernment function change in your organization, workflow optimization restructuring, improve the government management, public service and emergency ability of the important measures, to promote the development of the whole national economy and social in⁃formatization.E-government data involving state data, macroeconomic data and geographic information data such as core state se⁃crets and a lot of important data in a wide range of industries, is directly related to a country's political, military, economic and oth⁃er fields of safety and stability.New technology brings new security hidden danger.Building security management security system can keep Internet+e-government system, improve the government administrative ability, improve the government's credibility.

  14. Internet上的数据安全传输与身份鉴别%Secure transfer & identical authentication on Internet

    Institute of Scientific and Technical Information of China (English)

    叶忠杰

    2003-01-01

    随着Internet/Intranet在社会各领域应用的拓展,特别是电子商务和电子政务的应用实施,信息传输的安全和身份鉴别问题成为这些应用能否成功的关键.本文围绕这两个问题,分析在不安全的网络上实现安全传输和身份鉴别的基本原理和方法,同时也给出了解决这些问题的体系结构,对于电子商务和电子政务的成功实施提供保障手段.

  15. 基于身份位置分离系统的互联网安全模式研究%Research on Internet Security Model Based on ID/Locator Split Architecture

    Institute of Scientific and Technical Information of China (English)

    吴强; 陈琳

    2011-01-01

    As intelligent pipeline, basic network should in the technical advantage for the purpose of open, simple and sharing based on, to establish a complete and perfect security system, to ensure the true source of network information by means of the network architecture, to achieve reliable comprehensive management capabilities for network, service and subscriber. This paper analyses the internet security problem, proposes an internet security model based on ID/locator split architecture, through the establishment of internet unified identity management system, gradually forms a credible ecological system of internet events causal relationship logical structure.%基础网络作为智能管道,应该在以开放、简单和共享为宗旨的技术优势基础上,建立完备的安全保障体系,从网络体系结构上保证网络信息的真实来源,实现可靠的网络、业务和用户综合管理能力.本文分析互联网安全问题的同时,提出了基于身份位置分离系统的互联网安全模式,通过建立互联网统一标识管理体系,逐步形成互联网事件因果关系逻辑结构的可信的生态系统.

  16. 物联网系统安全威胁与应对措施初探%Research on the Internet of Things System Security Threats and Response Measures

    Institute of Scientific and Technical Information of China (English)

    王自力; 郑鑫

    2012-01-01

    As a new generation of information technology, the Internet of Things technology gets the atten- tions from all over the world and be practiced energetically, and China is vigorously developing. The development of the Internet of Things, security and privacy issues can't be avoided. In or- der to solve the security issues of the Internet of Things, starting from the architecture of the Internet of Things, analyses the security threats and gives the corresponding response.%物联网技术作为新一代信息技术,得到世界各国的高度重视并大力实践,我国也正在大力发展物联网产业。物联网的发展、安全和隐私问题不容回避。为解决物联网的安全问题,从物联网的体系架构出发,分层分析相应的安全威胁。并给出对应的应对措施。

  17. Importance of Cyber Security

    National Research Council Canada - National Science Library

    Rajesh Kumar Goutam

    2015-01-01

    ... to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information...

  18. Design and Implementation of Security Monitor for Mobile Internet%移动互联网监控仪的设计与实现

    Institute of Scientific and Technical Information of China (English)

    李军; 张清盛

    2014-01-01

    移动互联网监控仪由嵌入式硬件和监控软件两部分组成,嵌入式硬件由CPU、Flash存储器、以太网接口卡、无线网卡组成,监控软件由基于Linux内核的主程序和分析程序组成,主程序捕捉经过网络终端传输的数据包,分析程序把过滤所得的数据包发送给后台服务器存储。在移动互联网中进行数据链路层监控,用户自定义需要监控的关键字,对数据进行关键字和主题领域的列表进行字符匹配,对敏感信息数据包或者不和谐内容的数据包进行监控并存储。%Designs and implements mobile Internet security monitor based on embedded Linux, by listening on the network packets, containing a set of sensitive information packet uploaded to the storage server for evidence. The embedded development board used for network monitor client, based on system kernel Linux 2.6.30, CPU S3C2440(400MHz), with Ethernet interface, the equipment has low cost, small volume and light weight, convenient carrying and installation, especially suitable for public sites and small office. The monitor does not affect the speed of Internet access, and the energy consumption is low, more energy saving and environmental protection.

  19. 移动互联网能力开放平台的层次安全服务模型%Level Security Service Model for Capability Open Platform Based on Mobile Internet

    Institute of Scientific and Technical Information of China (English)

    李敏; 秦志光

    2013-01-01

    By analyzing the security issues and security demand of mobile internet capability open platform, this paper introduces an architecture of mobile internet capability open platform and proposes a hierarchical security service model and the key technology in detail. The hierarchy security service model has been applied in a related project, the application shows that the security model can provide with perfect safety protection and flexible security services etc.%  从分析面向移动互联网能力开放平台的安全问题及安全需求入手,介绍了面向移动互联网能力开放平台的架构,提出了适用于该架构的层次安全服务模型,对其中的关键技术做了详细说明。该安全服务模型已经在相关项目中得以应用,在应用中体现出了该安全模型具有完善的安全防护并能灵活的提供安全服务等特点。

  20. 移动网络技术与通讯安全%Mobile Internet Technology and Communication Security

    Institute of Scientific and Technical Information of China (English)

    郑宗晨; 朱振华

    2014-01-01

    The technology of mobile communication and network coalesced to form the mobile internet technology. As this technology grows continually, the roles played in the society increased continually. Since the 21st century, with the research and development of network technology, the demand for communication has increased continually. That makes the combination between mobile communication and network.%移动通信和网络两种技术结合形成了移动通信与网络技术,随着其不断地推广,在社会中起到的作用也在不断的增加。进入21世纪以来,随着网络技术的不断研发,人们对于通信的要求不断增加,通信技术方面也得到了很快的发展,促进了二者的结合。

  1. Design of Railway Freight Transport Security System Based on Internet of Things%铁路货运物联网安防系统的设计

    Institute of Scientific and Technical Information of China (English)

    赵凌

    2013-01-01

    According to the characteristics of railway freight traffic accidents,internet of things technology is put forward on railway freight transport security,such as RFID,wireless sensor networks,Zigbee,ect.The integrative design of railway freight transportation security system includes RFID identity recognition system,infrared alarm and fire alarm system in train boxcar,important devices' maintenance management system,and so on.The whole system will provide practical application with some relative reference,such as preventing freight stolen and fire happening,monitoring maintenance and inventory management state of important devices,standardizing working habits of staff,and improving economic benefits of safety.%针对铁路货运事故特点,提出了将射频识别、无线传感器网络、Zigbee等物联网技术应用到铁路货运安防中,设计了包含RFID人员身份识别系统、车厢内红外入侵报警和火灾报警系统、机车重点设备检修管理系统等多个子系统的整体化铁路货运安防系统,在防止铁路货运物资被盗和火灾事故的发生,监控货运机车重点设备检修与库存管理状态,规范工作人员工作习惯,提高安全经济效益等方面提供了相应参考.

  2. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  3. 互联网金融的网络安全与信息安全要素分析%An Analysis of the Factors of Cyber and Information Security of the Internet Finance

    Institute of Scientific and Technical Information of China (English)

    谢尔曼; 黄旭; 周杨

    2015-01-01

    Based on the analysis of the concept of the Internet finance,the paper first of all proposes that the Internet financial industry should not ignore risks of cyber and information security incurred by the factor of“Internet”.Then it delves comprehensively into the four information security threats confronted by the internet financial industry in terms of the Internet system framework,user privacy,network platform usability,enter-prise internal risk,combining with the Internet risk cases that are closely related to the Internet Financial busi-nesses.Finally,the paper puts forward network and information security factors of China′s Internet Financial development from five aspects,namely,enterprise strategy,cooperation strategy,law and discipline,the bal-ance between the ease of use and safety,and the enhancement of user information security education.%基于对互联网金融的概念剖析,提出互联网金融行业不可忽视由“互联网”这一要素所引入的网络安全和信息安全风险。进而从互联网体系本身、用户隐私、网络平台可用性、企业内部风险四个方面,结合与互联网金融业务密切相关的互联网风险事件案例,全面梳理互联网金融行业所面临的四大信息安全威胁。在此基础上,从企业战略、合作策略、法律与自律、权衡易用性与安全性、加强用户信息安全教育等五个方面,提出我国互联网金融发展的网络安全要素。

  4. The reasonable limit on the security obligation of Internet banking under the background of path dependence%路径依赖视野下网上银行安全保障义务的理性之维

    Institute of Scientific and Technical Information of China (English)

    曾维亮

    2012-01-01

    网上银行安全保障义务以普通经营者的安全保障义务为前提,只是因为网上银行的特殊性具有了一定的差异性。对于网络信息技术的路径依赖使得网上银行的风险处于动态的过程之中,其安全保障义务的合理限度必须在当前技术水平下,结合网上银行的特殊性,按照低概率事件的可能性,以一个正常认知能力的人可接受程度为限综合考虑各种因素加以判断。配套设施达标和防范措施到位是合理划定网上银行安全保障义务的重要标准。%The security obligation of Internet banking is based on the like obligations as ordinary operators, but it is different from the latter because of the particularity of Internet banking. Path dependence on the information technology leads the risks of Internet banking into a dynamic process. Reasonable limit of the security obligations must take various factors into consideration. Firstly the limit should base on the current scientific and technological level, combining with the particularity of Internet banking, and in accordance with the possibility of low-probability events. Moreover, it also should within the acceptable limits of a person who has a normal cognitive ability. Supporting facilities and protection measures in place is an important standard to reasonably delimit the security obligations of Internet banking.

  5. Retailing and Shopping on the Internet.

    Science.gov (United States)

    Rowley, Jennifer

    1996-01-01

    Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)

  6. Analysis on the Era of Mobile Internet Information Security Strategy%移动互联网时代的信息安全应对策略探析

    Institute of Scientific and Technical Information of China (English)

    赵玉科

    2016-01-01

    With the rapid development of information and communication technology and Internet technology, 4G network and mobile intelligent terminal has been widely used and widely used. However, information security threats and hidden dangers are also increasing. Based on this, this paper work experience, of the mobile Internet information security issues do preliminary analysis, and for the formulation of some strengthening of the mobile Internet information security management and protection strategy, for reference.%随着信息通信技术和互联网技术的飞速发展,4G网络及移动智能终端等得到了广泛普及与应用,居民在生产生活中获得了诸多便利。然而信息所受安全威胁和隐患也日益增多。基于此,文章结合工作经验,对移动互联网的信息安全问题做初步探讨分析,并有针对性地制定一些加强移动互联网信息安全管理与防护的策略,以供参考。

  7. Strategic Thinking on the Ideological Security in Internet Age%网络时代意识形态安全的战略思考∗

    Institute of Scientific and Technical Information of China (English)

    秦国民; 刘子晨

    2016-01-01

    意识形态是重要的思想政治资源,可为政治稳定凝聚思想共识,为政治统治正当性合理性提供论证,为政治发展道路指明方向。互联网时代,我国意识形态面临西方自由主义意识形态渗透、社会价值观多元化、主流意识形态话语体系创新转换复杂艰难等诸多问题。维护网络时代的意识形态安全,应该坚持马克思主义的指导地位,增强社会主义意识形态诠释力、影响力;认清西方自由主义意识形态输出的教条主义、工具主义及霸权主义本质,自觉抵制西方意识形态渗透侵蚀;维护互联网信息安全,提升我国意识形态网络传播能力。%Ideology is an important ideological and political resource, which can unite ideological consensus for political stability, provide demonstrations with justifiability and rationality of political domination, and indicate the direction for political development . In Internet Age, there are lots of problems we faced about ideology in our country, including ideological penetration of Western liberalism, diversification of values in society, complicated innovation and transformation in ideological mainstream discourse system. To effectively deal with them, we should uphold the guiding role of Marxism and enhance the influence and explanatory power of socialist ideology. We should recognize the nature of dogmatism, instrumentalism and hegemonism in Western liberal ideology outputting, and resist West⁃ern ideological penetration. We should protect the Internet information security and increase propagation capability of ideological net.

  8. Research of public security platform cloud computing architecture based on internet of things%基于物联网的公共安全云计算平台

    Institute of Scientific and Technical Information of China (English)

    白蛟; 全春来; 郭镇

    2011-01-01

    Internet of things is introduced into the field of public safety technology, and the applications of the distributed computing, virtualized storage and cloud computing technology are discussed. To overcome the disadvantages of the existing public security platform, Internet of things five layers the public safety platform architecture is designed, and all levels of features and technology application are described, which provides a new way for the future construction of Internet of things for police. In order to achieve the business data sharing and security, based on this architecture the data supporting platform is proposed based on cloud computing, which supports vir-tualization of data storage and management, and meanwhile offers high performance computing power and storage equipment dynamic expansion ability. Security and computing power of Internet of things are improved.%将物联网技术引入到公共安全领域,重点研究了分布式计算和虚拟化存储及云计算的技术特点和应用,针对目前公共安全平台的不足,设计了5层的物联网公共安全平台架构,为以后警用物联网的建设提供了新的思路,同时结合该架构,提出了一种基于云计算的数据支撑平台,为该公共安全平台提供虚拟化的数据存储和管理,以实现各业务数据的共享和安全,提高了物联网应用的安全和计算能力.

  9. Research on the Stucture of the Integrated Security Precautions System Based on the Internet of Things%基于物联网的一体化安全防范技术体系研究

    Institute of Scientific and Technical Information of China (English)

    谭建平; 柔卫国; 余敏; 胡钟宇; 冯学华

    2011-01-01

    物联网的出现给安全防范技术和系统带来了新的思路和建设内容,本文提出了基于物联网的一体化安全防范技术和系统,探讨了一体化安全防范技术体系结构,并对基于物联网的一体化安全防范系统的建设内容和建设方法进行了研究.实际系统在岳阳烟草专卖局的应用表明,相对于传统的多个单一安全防范技术平台,基于物联网的一体化安全防范技术体系有更多的优势.%The internet of things(loT) brings new concept and content for the technology and system of security precautions. The integrated security precautions system based on the loT is promoted in the paper. The stucture of the integrated security precautions system was discussed, and the development content and method of the system construction were studied in detail. The application of the integrated security precautions system in Yue Yang Tabacco Monopoly Bureau shows that the integrated security precautions system based on the internet of things has much benefit than the traditional multiple single security precautions syetems.

  10. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  11. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  12. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  13. 甘肃省14-20岁学龄青少年网络行为与信息安全意识调查分析%The investigation and analysis of Internet behavior and information security awareness of Gansu school-age adolescents aged 14-20 years old

    Institute of Scientific and Technical Information of China (English)

    童红梅

    2011-01-01

    A sampling survey was conducted on Internet behavior and information security awareness of Gansu school-age adolescents aged 14-20 years old. The paper analyzes the causes of their Internet behavior and information security awareness and proposes corresponding countermeasures to guide teenagers' effective use of Internet resources and set up Internet information security and precaution awareness.%通过对甘肃省14-20岁学龄青少年使用互联网的行为特征与信息安全意识抽样调查,分析了其网络行为及信息安全意识的原因,并提出了相应对策,以正确引导青少年有效利用网络资源,树立网络信息安全与防范意识.

  14. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  15. The SWOT Analysis of Developing the Local“Internet + Securities Industry”in Jiangxi Province%江西发展本土“互联网+证券业”的 SWOT 分析

    Institute of Scientific and Technical Information of China (English)

    彭明旭; 张玉颖

    2016-01-01

    文章介绍了“互联网+证券业”的发展背景和江西本土证券公司的特点,采用 SWOT 框架,分析了在江西省本土发展“互联网+证券”的优势、劣势、机会和威胁,据此提出了政府要加强政策支持,明确发展战略规划,本土券商要进行机构调整、改善服务、鼓励创新、自建渠道、发展众筹、加强风险控制,对外加强合作、并购整合等八项发展措施,实现本土“互联网+证券业”的突破,改变江西互联网金融发展落后的态势,更好服务本土经济。%This paper introduces the background of the“Internet + Securities Industry”and the features of the local securities companies in Jiangxi province. We analyzed the strengths,weaknesses,opportunities and threats for the development of the“Internet + Securities Industry”in Jiangxi province. Based on this,eight development meas-ures are put forward:the government should strengthen the policy support,clear development strategy planning;the local brokers should adjust internal organization,improve services,encourage innovation,self - built channels,devel-op crowdfunding,and strengthen risk control;strengthen cooperation and merger integration with the outside world. Then,the“Internet + Securities Industry”may achieve a breakthrough in Jiangxi,and the lagging economic devel-opment situation of the internet finance can be changed,which can serve the local economic better.

  16. 一种基于谱聚类分析的物联网节点安全控制域划分算法%A Security Domain Division Algorithm of the Internet of Things Based on Spectral Clustering

    Institute of Scientific and Technical Information of China (English)

    范一鸣; 屠雄刚

    2014-01-01

    In the Internet of Things( IoT) ,the property of multi-source and heterogeneity bring more challenges to its security. In order to attain cross-layer security control and deploy multi-layer combined security control strategy,an algorithm based on spectral clustering is proposed to divide nodes into several security domains. In the algorithm, through statistics about which sensor nodes are involved in history security events, correlations of sensor nodes to history events are calculated and then nodes are divided accordingly using spectral clustering method. The dipartition can serve strong support for deployment of security control strategy within domain and between different domains,thus improve overall security level of IoT.%物联网的多源异构性使其安全面临更多的挑战,为实现跨层安全控制,部署多层融合的安全控制策略,提出了一种基于谱聚类的节点安全域分类算法。通过对物联网感知节点在历史安全事件中的波及状态统计,确定感知节点与攻击事件之间的相关性,进而利用谱聚类方法将节点划分为若干个安全控制域。基于事件相关性的谱聚类节点安全域划分,将为部署域内和域间的安全控制策略提供依据,从而整体提升物联网安全防护水平。

  17. Older Adults' Knowledge of Internet Hazards

    Science.gov (United States)

    Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L.

    2010-01-01

    Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…

  18. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  19. Internet access to ionosondes

    Science.gov (United States)

    Galkin, I. A.; Kitrosser, D. F.; Kecic, Z.; Reinisch, B. W.

    1999-01-01

    Connecting ionosondes to the Internet gives easy access to real-time information on ionospheric conditions. Some of the ionosonde sites provide just the ionogram displays, others give in addition the scaled ionospheric characteristics directly usable for frequency management and HF channel assessment. Some sounders also store days or months of station data, which makes it possible remotely to evaluate the time history of geophysical events. The Internet link is also a convenient means for remote system maintenance and control. The paper addresses various aspects of the Internet ionosonde scenario, including data base support, WWW publishing, user interface, security, and data format. A list of Internet accessible ionosonde stations is provided with a brief description.

  20. The Era of Mobile Internet Mobile Phone Information Security Strategy of Shallow Research%移动互联网时代手机信息安全策略

    Institute of Scientific and Technical Information of China (English)

    黄赛

    2015-01-01

    Articles focus on mobile Internet hand on behalf of the smartphone security issues, from the communication network selection strategy, the mobile terminal selection strategy, the use of mobile phones security policy, social information security environment to create four latitude on smartphone security strategy for full range analysis, introduce, strive for ordinary readers fully understand the safety problem of the intelligent mobile phone and application in the reality of life and learning, so that everyone's smartphone safer and more at ease.%文章聚焦于移动互联网手代智能手机安全问题,从通信网络选择策略、手机终端选择策略、手机使用安全策略、社会信息安全环境营造四个纬度对智能手机安全策略进行全方位的分析、介绍,力求让普通读者全面了解掌握智能手机安全问题,并应用于现实生活学习中,从而使大家的智能手机更安全、使用更放心。

  1. Information Platform Model for Food Security Based on Internet of Things and Service Architecture%物联网和服务架构的食品安全信息平台模型

    Institute of Scientific and Technical Information of China (English)

    蒋文贤; 许晓璐; 赖超; 林翠萍; 曾鹏远

    2013-01-01

    According to the tracking and tracing requirements of food supply chain management and quality and safety,using Internet of Things technologies,referring to the EPC standards,a food security information system platform model that based on Internet of Things and service oriented architecture has been put forward.The design describes E-R model,network architecture,technology framework and functional modules of achieving food tracking management by RFID technologies on the basis of Internet.Detailed electronic trace information about food could be inquired through Web Service or intelligent mobile phones or other devices.%针对食品供应链管理和质量安全的跟踪和追溯需求,利用物联网技术,参照EPC标准,提出了一种基于物联网和服务架构的食品安全信息平台模型,描述了RFID技术在Internet基础上实现食品的全程跟踪管理的E-R模型、网络架构、技术框架和功能模块,可通过Web Service和智能手机等多种方式查询追溯详细的电子信息.

  2. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    Directory of Open Access Journals (Sweden)

    Oviliani Yuliana

    2000-01-01

    Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran

  3. The Internet of things connecting objects

    CERN Document Server

    Chaouchi, Hakima

    2013-01-01

    Internet of Things: Connecting Objects… puts forward the technologies and the networking architectures which make it possible to support the Internet of Things. Amongst these technologies, RFID, sensor and PLC technologies are described and a clear view on how they enable the Internet of Things is given. This book also provides a good overview of the main issues facing the Internet of Things such as the issues of privacy and security, application and usage, and standardization.

  4. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  5. Functional Internet Literacy: Required Cognitive Skills with Implications for Instruction

    Science.gov (United States)

    Johnson, Genevieve Marie

    2007-01-01

    Patterns of typical Internet use provide the basis for defining "functional Internet literacy." Internet use commonly includes communication, information, recreation, and commercial activities. Technical competence with connectivity, security, and downloads is a prerequisite for using the Internet for such activities. Bloom's taxonomy of cognitive…

  6. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  7. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  8. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  9. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  10. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  11. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  12. Internet marketing

    OpenAIRE

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  13. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  14. Internet Accounting

    NARCIS (Netherlands)

    Pras, Aiko; Beijnum, van Bert-Jan; Sprenkels, Ron; Párhonyi, Robert

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  15. Novel Security Trend Tracking and Business Benchmarking Analysis of "Internet+"%“互联网+”新型安全趋势跟踪及业务标杆分析

    Institute of Scientific and Technical Information of China (English)

    周丽莎; 杨广龙; 沙庆良

    2016-01-01

    In response to new information security threats posed by new technology and business in the era of "Internet+", and to meet enterprises' increasing demand for business safety, an introduction to domestic policy environment for security industry, technology innovation, the security risk faced by government and enterprises customers currently and the future business development was made. Meanwhile, the research on the security service system of some global leaders, domestic leading enterprises and international operators was made in efforts to point out that the systematic, intelligent, integrated and ecological development should be highlighted during enterprises' planning for new-type security business.%为应对“互联网+”时代新技术新业态带来的新型信息安全威胁,满足企业不断增长的安全业务需求,概括介绍了国内安全产业政策环境、技术创新、政企客户当前面临的安全风险及业务发展趋势,并选取部分全球领导厂商、国内龙头企业、国际运营商的安全业务体系开展研究,指出企业新型安全业务规划应重点关注体系化、智能化、集成化、生态化等方向。

  16. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  17. 76 FR 34658 - The Internet Assigned Numbers Authority (IANA) Functions

    Science.gov (United States)

    2011-06-14

    ... CCTLD operators and the need to ensure the stability of and security of the DNS, are there changes that... security of the Internet DNS. As stated earlier, NTIA plans to conduct public consultation next year to... global Internet users and not jeopardize the security and stability of the DNS. Accordingly, the...

  18. Security Requirements and Security Solutions For Community Administrations

    OpenAIRE

    Koneva, Natalia

    2003-01-01

    The Internet is slowly becoming a mirror of the society. Everything we do in the real world, we want to do out on the Net: conduct private conversations, keep personal papers, sign letters and contracts, shop, publish documents etc. All these things require security, but we go ahead using the net without asking too many questions. Today security issues are not a fundamental starting point. This also means that the limits of security are the limits of the Internet. There are several reaso...

  19. Information Security Risks and Countermeasures of Mobile Internet%移动互联网的信息安全风险及对策

    Institute of Scientific and Technical Information of China (English)

    陈昱

    2015-01-01

    This paper briefly describes the development process of mobile communication security technology, analyze the security threats in mobile communication technology and intrusion detection technology, has conducted the research to the information security risk, and puts forward the Countermeasures of prevention and control of information security threats.%本文简述了移动通信安全技术的发展历程,分析了移动通信技术中的安全威胁和入侵检测技术,对信息安全风险进行了研究,并提出防制信息安全威胁对策。

  20. The Research and Application of Security and Defense System in Regional Service Based on Internet%基于Internet的区域服务安全防御系统的研究与应用

    Institute of Scientific and Technical Information of China (English)

    肖犁

    2011-01-01

    Internet作为信息分享平台越来越受到人们的关注,并在人们的日常生活中占据了重要的一席之地,但是随之而来的安全问题也开始日益严重。如何在实现数据共享的同时保证隐私和信息的可靠性开始成为IT行业研究的对象。本文主要研究了区域网络的安全防御系统,并通过实例证明了安全防御系统的重要性。%Internet has gained more and more attention as an information shared platform,while has taken a great place in people’s daily life.Moreover,the ensuing security problems have begun to increasingly serious.How to achieve data sharing while ensuring privacy and the reliability of the information has become the studying object in IT occupation.This paper studies the regional network security defense system,and demonstrates the importance of security and defense systems by example.

  1. Research on Evolution of the Next Generation Internet Security Deployment Strategy%下一代互联网安全演进部署策略研究

    Institute of Scientific and Technical Information of China (English)

    王晓箴; 贾亦辰; 唐磊

    2013-01-01

      根据不同阶段网络的特性,对网络过渡阶段和IPv6网络所面临的安全威胁进行了全面分析,构建了IPv6网络演进的安全技术体系框架,从网络、用户、业务3个方面提出了安全解决方案,根据骨干网、城域网和接入网升级后的特点,提出了相应的安全机制,针对IPv6网络中用户和常用业务可能存在的安全问题,提出了安全防护建议。%It analyzes the security threats of the transition network and IPv6 network. According to different specificities in different peri-ods of network, it concludes the security threats. On the basis of the analysis, it then establishes the security technology framework of evolution of IPv6 network. It proposes a security solution in network security, user security and application secu-rity. It also proposes the protection mechanism for upgraded backbone network, MAN and access network. In addition, it gives the security suggestion for users and services in IPv6 network. In this way, operators can develop the IPv6 network services safely.

  2. To Ensure that the Internet Security Experiment with ISA Server%用ISA Server确保Internet的安全性实验

    Institute of Scientific and Technical Information of China (English)

    贺军忠

    2012-01-01

    迅速发展的Internet给人们的生活、工作带来了巨大的方便,人们可以坐在家里或办公室通过Internet收发电子邮件、打电话、网上聊天、进行网上购物、银行转帐等等.正因为网络的开放性,给黑客攻击企业内部数据等机密文件提供了方便.为了保护内部数据,在工作期间禁止用户上互联网的硬件和软件很多,其中ISA Server就是其中最安全也最简单的路由级网络防火墙之一.%The rapid development of the Internet to people's lives,the work has brought great convenience,people can sit at home or office through the INTERNET e-mail,phone calls,online chat,online shopping,bank transfer,etc.,precisely because of the opening of the network sex.To hacker attacks,internal data and other confidential documents provided for convenience.Prohibited during working in order to protect the internal data users on the Internet hardware and software,in which the ISA Server is one of the safest and easiest route level one of the network firewall.

  3. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  4. Cyberspace security: How to develop a security strategy

    CERN Document Server

    Raggad, Bel G

    2007-01-01

    Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

  5. 移动互联网环境下终端与服务器安全交互的研究%Secure communication between terminal and server in the mobile internet environment

    Institute of Scientific and Technical Information of China (English)

    陈遥; 夏亮亮; 谭辉

    2015-01-01

    The rapid development of mobile Internet and the continuing decline of intelligent terminal cost attract more and more users,thus the user's privacy and information security becomes significant in the mobile Internet era. In this paper,we analyze the weak link in user's information security in WiFi hotspot environment,then compare the application effect of two conventional encryption algorithms,thereafter propose a secure communication based on to-ken mechanism in OAuth protocol,which can ensure the security of user privacy,keep the server at high response speed,even can timely remind and guide the user in case of information risk or abnormality in the user's application. Finally,this design is applied in the system,and the stress test results show that the proposed design is effective.%移动互联网的飞跃式发展与智能终端成本的降低,惠及了众多的普通消费者,移动互联时代用户的隐私与信息安全变得更为重要.针对WiFi热点环境下用户隐私与数据容易泄露的环节,对比传统的常用加密算法与使用效果,提出了一种基于OAuth 协议的令牌机制的安全交互方式,它可以在保证用户相关隐私与信息安全的同时,保证服务器的响应速度,且在用户的应用存在风险或异常时,可及时提醒并引导用户进行相关安全操作.压力测试结果表明该设计是有效可行的.

  6. 物联网安全关键技术研究%Research on the Key Technology of the Security of the Internet of Things

    Institute of Scientific and Technical Information of China (English)

    马卫

    2013-01-01

    Security issue of the IoT is directly related to the development and application. On the basis of discussion on the archi?tecture of the IoT, the paper analyze the security needs of it, and give the further study on the key technology, expect to provide certain reference to the establishment of reliable and secure networking system.%物联网的安全问题直接关系到物联网技术的发展和应用,在讨论了物联网体系架构的基础上,分析了物联网的安全需求,并对物联网安全的关键技术进行了研究,希望为建立可靠安全的物联网体系提供一定的参考作用.

  7. Volume of Requests for Internet Medicare Replacement Cards

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2008 onwards for Internet Medicare Replacement Card. The dataset includes only...

  8. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  9. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  10. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  11. Earth Observations and the Water-Energy-Food Security Nexus

    Science.gov (United States)

    Lawford, R. G.; Marx, S.

    2013-12-01

    The Water-Energy-Food (W-E-F) Security Nexus has received a great deal of attention internationally since 2011 when the World Economic Forum identified it as one of the three largest threats to the global economy. Since then several international conferences and research initiatives have focused on the linkages and synergies between these sectors. In addition, it has been recognized that land and/or ecosystems must also be considered as part of this nexus to fully understand the linkages between the sectors. The Global Water System Project carried out a preliminary assessment of the role of basin management on W-E-F security in a number of transboundary basins to determine the factors that drive this nexus, to understand how W-E-F security is perceived; to evaluate the degree to which data are used in making decisions related to this nexus; and to identify opportunities for enhancing the role of Earth Observations in making decisions relevant to W-E-F security. This assessment which relied on expert surveys is supplemented by a more in-depth case study in the Lake Winnipeg Basin which includes the basin of the Red River of the North. This paper provides a summary of the results of this assessment with an emphasis on the actual and potential roles of Earth Observations. In particular, their possible role is discussed in both national and transboundary basin contexts. Recommendations arising from the study deal with data sets and information systems, the need for targets related to the W-E-F Nexus, and possible new approaches for enhancing W-E-F resilience through the use Earth Observations to better plan and monitor the movement of water on the landscape.

  12. Factors and Predictors of Online Security and Privacy Behavior

    OpenAIRE

    Goran Bubaš; Tihomir Orehovački; Mario Konecki

    2008-01-01

    Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills) that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscienti...

  13. Framework and Security Threats on Internet of Things and Survey of Corresponding Strategies%物联网框架安全威胁及相应策略研究

    Institute of Scientific and Technical Information of China (English)

    李园园; 毕晓冬; 张永胜; 韩贝贝

    2011-01-01

    Compared with traditional Internet, Internet of Things (IoT) has higher security needs. In the context of IoT, the basic management work will be handled by intelligent device software,so that people are free from redious low-level management,pouring more human and material resources into research of new technologies,resulting in huge economic and social benefits. However,once IoT is at stake or attacked,the loss will be immeasurable. Security is the premise of rapid development of IoT. On the basis of concept,structure and technology framework of IoT ,analyzed characteristics on IoT. Aiming at the characteristics of levels on IoT, analyzed the safety problems of perception layer,network layer and application layer,put forward relevant countermeasures for different security problems.%与传统的互联网相比,物联网具有更高的安全需求.在物联网环境下,基本的管理工作由智能设备软件去处理,使人们从繁琐的低层次管理中解脱出来,将更多的人力、物力投入到新技术的研发中,产生巨大的经济和社会效益.然而一旦物联网的安全受到威胁、遭到攻击,损失将是不可估量的.物联网的健康迅猛发展,安全保障是其重要的前提.通过对物联网的基本概念、结构框架、技术框架的阐述,分析了物联网的相关特征,针对物联网各层的特点,分析了感知层、网络层、应用层存在的安全问题,并提出了一些解决思路.

  14. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  15. Internet Predictions

    OpenAIRE

    Estrin, Deborah; Chandy, K. Mani; Young, R. Michael; Smarr, Larry; Odlyzko, Andrew; Clark, David; Reding, Viviane; Ishida, Toru; Sharma, Sharad; Cerf, Vinton G.; Hölzle, Urs; Barroso, Luiz André; Mulligan, Geoff; Hooke, Adrian; Elliott, Chip

    2010-01-01

    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section.

  16. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  17. 基于虎符TePA的物联网安全接入机制研究%Research on secure access mechanism in internet of things based on TePA

    Institute of Scientific and Technical Information of China (English)

    杨年鹏; 龙昭华; 蒋贵全; 马艳

    2012-01-01

    以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制.该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须通过其它两方的身份验证.从性能和安全等方面分析了该机制的可行性和可靠性,增强了物联网下对接入访问的安全控制,从而对物联网的建设发展起到了一定的建言作用.%Based on elliptic curve cryptography (FCC) public-key algorithms and tri-element peer authentication (TePA), the basic concept and the architecture of internet of things (IoT) are analyzed, a secure access mechanism of IoT with tri-element authentication method is proposed. This mechanism strengthen authentication for all the entities in IoT, any party's identity should be checked by others when associating. From the performance and security, the feasibility and reliability of the mecha nism is discussed. The security of access control in IoT is enhanced Finally, these will play a positive and active influence for IoT.

  18. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  19. 物联网应用中有源RFID标签的EAL4安全要求%Assurance level 4 security requirements of active radio frequency identification tags in the Internet of Things

    Institute of Scientific and Technical Information of China (English)

    高金萍; 石竑松; 王宇航; 杨永生; 张翀斌

    2012-01-01

    A framework is given for evaluation assurance level 4(EAL4) security requirements for radio frequency identification(RFID) active tags in applications for the Internet of Things(IOT).The evaluation assurance level and the security assurance requirements are chosen based on ISO/IEC standard 15 408 and an analysis of the asset value and potential threat.Then,the potential threats are related to the active tags to set security objectives for the target to resist potential attacks.A minimal set of security function requirements is given to specify the functionality of active tags.Finally,the consistency between the Abstractions is analyzed to justify the rationale behind the framework.This work provides a reference for designers of security mechanisms for active tags and a basis for the evaluation and procurement of active tags.%该文为物联网应用中安全要求较高的有源RFID标签类产品建立了一套满足评估保证级(EAL)4级的一组安全要求。此安全要求的建立,以通用评估准则(ISO15408)为依据,通过对有源标签保护的资产价值和潜在威胁的分析,为有源标签界定了合理的评估保证级别及相应的安全保证要求,并通过分析其在物联网应用中可能面临的潜在威胁,导出了有源标签需要满足的安全目的,进一步得出了需要满足的最小安全功能要求,并论证了它们之间的对应性。建立的安全要求框架可以作为指引研发者对有源标签进行全面安全性设计考量的重要参考,也可以为有源标签类产品的采购、测评提供依据。

  20. Multi-cultural network security

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, D.F.

    1996-04-01

    Education and awareness are widely acknowledged to be among the fundamental issues of Internet security, but only in the sense of making Internet users more security conscious. For the Internet to achieve its promise as an information highway, however, a complementary education effort is needed. If adequate Internet security is to be achieved, we must also increase the awareness of the professional security community of the requirements, attitudes, and habits of the many different cultures that participate in the Internet. Discussions of {open_quotes}the Internet{close_quotes} encourage the misapprehension that there is a single, uniform user community instead of a loose alliance of many cultures that differ in many fundamental aspects. This is true even if we limit our consideration to ethical cultures. At this Workshop alone we have representatives of administrative and military cultures, Governmental and commercial cultures, profit-cultures and non-profit cultures, research and operational cultures. Internet cultures are united in their desire to exploit the connectivity, flexibility, and rapidity of communication provided by the net, but differ greatly in their motivations, their attitudes towards authority, their willingness to cooperate within their own communities, their interest in technical arcana, and the patience with which they will put up with - or the enthusiasm with which they will embrace - the growing list of procedures deemed necessary for acceptable security. They even differ in how they define {open_quotes}acceptable security{close_quotes}.

  1. An Analysis of Fraud on the Internet.

    Science.gov (United States)

    Baker, C. Richard

    1999-01-01

    Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)

  2. An Analysis of Fraud on the Internet.

    Science.gov (United States)

    Baker, C. Richard

    1999-01-01

    Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)

  3. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  4. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  5. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  6. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  7. 物联网中RFID节点通信安全研究%The Research of RFID Nodes Communication Security in Internet of Things

    Institute of Scientific and Technical Information of China (English)

    何伟刚

    2011-01-01

    物联网的不断发展和应用,在带给我们生活便利的同时,也给信息安全带来了挑战。介绍了物联网的体系结构和RFID系统面临的通信安全问题;重点研究了物联网感知层中RFID系统的通信安全,引入了一种2层的RFID体系结构,并基于此结构给出了相应的身份认证和数据加密解决方案。%With the development and application of IOT,our lives are becoming more and more convenient,but there are also challenges against information safety.This paper introduces the system structure of lOT and communication security problems existed in RFID system;and focuses on communication security problems existed in sensing layer of IOT,and finally designs identity authentication and data encryption solutions based on a 2-layer RFID system structure.

  8. Internet Activities among Malaysian Insurance Companies

    Directory of Open Access Journals (Sweden)

    Tee Chee Kiat

    2005-01-01

    Full Text Available Many studies have been conducted to study Internet usage. Most of them focused on SMI/SME, individuals, services organisations including the financial sector. Previous studies on Internet usage in the financial sector in Malaysia were more focused towards the banking institutions. Not much information is available with regards to the Internet usage among insurance companies. Recognizing the potential of the Internet to insurance companies, the Central Bank of Malaysia (Bank Negara of Malaysia has established guidelines that allow insurers to offer their services online. This study describes the extent of Internet usage among Malaysian insurers. Some insurers have already begun to use the Internet to conduct their daily business transactions, some are in the midst of planning to use and some do not have plan to use at all. Many of them stated that security, customer readiness and cost of initial investment were important considerations when deciding to adopt Internet technologies.

  9. 互联网众筹融资的《证券法》适用问题研究%The Legal Research on Internet-based Crowdfunding and The Security Law

    Institute of Scientific and Technical Information of China (English)

    刁文卓

    2015-01-01

    Crowdfunding ,the use of Internet to raise money through small contributions from a large number of investors ,could cause a revolution in small‐business financing .However ,crowdfunding also poses some problems under The Interpretation of the Supreme People's Court of Several Issues on the SpecificApplicationofLawintheHandlingofCriminalCasesaboutIllegalFund‐raising.Inthisarti‐cle ,the author proposed that crowdfunding sometimes involves the sale of securities ,triggering the regis‐tration requirements of T he Security L aw .As a result ,the definition of security should be enlarged under The Security Law .We need to learn overseas experience represented by the JOBS Act ,and accurately de‐fine the legal status and characteristics of crowdfunding .We also need to make the appropriate response to the legal structure and regulatory system of crowdfunding based on the proper coordination between the capital formation and investor protection .%众筹融资作为一种处于萌芽期的互联网金融模式,由于面临数量众多的投资者且融资金额较大,极易触碰非法集资的红线。通过分析,众筹融资本质是一种证券发行行为,筹资者、众筹平台、投资人这三方参与主体分别对应着发行人、证券交易所和投资者这三种《证券法》下的特定主体。但由于我国《证券法》的适用范围过窄,导致众筹融资无法适用《证券法》而被冠以“非法集资”的罪名。因此,扩大“证券”的范围是为众筹融资“正名”的直接途径,同时借鉴美国2012年JOBS法案中对众筹融资注册豁免的经验,在妥善协调资本形成与投资者保护关系的基础上,针对众筹融资的法律构造和监管制度作出相应的回应。

  10. Secure Mobile Trade Agent

    Directory of Open Access Journals (Sweden)

    Musbah M. Aqe

    2007-01-01

    Full Text Available E-commerce on the internet has the ability to produce millions of transactions and a great number of merchants whose supply merchandise over the internet. As a result, it is difficult for entities to roam over every site on the internet and choose the best merchandise to trade. So, in this paper we introduced a mobile trade agent that visit the sites to gather and evaluate the information from merchant servers and decide to trade goods on behalf of the user. We observed that the combination of public key cryptosystem with distributed object technology make this proposed scheme more secure and efficient than the already existed schemes.

  11. Secure Cloud Architecture

    Directory of Open Access Journals (Sweden)

    Kashif Munir

    2013-02-01

    Full Text Available Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activitiesfrom illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.

  12. Beidou Satellite Positioning System for Personnel Security Based on the Internet of Things and Cloud Computing%基于物联网和云计算中心的北斗卫星人员安全定位系统

    Institute of Scientific and Technical Information of China (English)

    杨奎

    2015-01-01

    为了解决地质探矿野外人员与车辆安全问题,在大数据大系统的背景下,结合单位实际与未来网络技术发展规划,提出了基于物联网和云计算中心的北斗卫星人员安全定位系统框架.该框架通过物联网技术,在云计算中心中综合集成地理、地质、交通、遥感、环境、气象等物联网信息数据进行数据处理,为户外工作者提供基于北斗定位与短报文使用的实时位置安全、工作管理、地理环境、行业信息等应用信息,从而提高地质探矿野外工作人员与车辆的安全保障.%In order to solve the geological prospecting field person-nel and vehicle safety issues, in a large system with large data in the context of the combined unit actual and future network devel-opment planning, put forward the Beidou satellite positioning sys-tem for personnel security framework for computing center and cloud based on Internet of things. The framework uses the technol-ogy of the Internet of things, in a cloud computing center integrat-ed geographical, geological, remote sensing, traffic, environment, meteorological and other objects to data processing of network in-formation data, for outdoor workers Beidou positioning and short message using the real-time position of safety, work management, geographical environment, industry information application based on information, thereby to improve the security of geological ex-ploration field work personnel and vehicles.

  13. INTERNET ETHICS

    OpenAIRE

    Laurentiu Fratila

    2008-01-01

    In our age, Internet is the biggest information network in the world; it consists of a set of heterogeneous networks from over 100 countries displaying huge amounts of virtual resources; it provides facilities such as email, file transmission protocol (ftp), workgroups discussion or chat, information and dissemination of information (www – world wide web). Internet has a major impact over all activity fields: political, social, economic and private life of users, as well. Newly developed, mod...

  14. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  15. 一种基于Internet网安全交易的票据模型%A Secure Receipt Mode Based on Internet

    Institute of Scientific and Technical Information of China (English)

    王道顺; 齐东旭

    2001-01-01

    给出了用于票据交易的一种安全交易模型,讨论了两种实现的技术方法:数字水印和图像变换技术.这两种技术可用于在线票据交易,解决交易票据传输中的认证问题,具有防欺诈和篡改等特点.%In the paper a security transaction model used in receipt transaction is introduced, and also two technologocal methods, digital watermarking and image transformation, are discussed. Both of them can be used in on-line receipt transformation for verification in business activities, with antifraud and tamperproof properties.

  16. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  17. A Solution of Campus Security Based on the ZigBee Internet of Things Technology%一种基于ZigBee物联网技术的校园安防解决方案

    Institute of Scientific and Technical Information of China (English)

    王玉洁; 桑永胜

    2012-01-01

    为解决校园安防监控问题.提出一种基于物联网技术的解决方案。方案采用ZigBee技术构建无线传感网络,将带有传感器的终端设备加入网络,实现物物通信。其中,结合802.15.4协议详细阐述网络构建、节点加入及数据请求的过程。结果表明,利用物联网技术能实时精准地实现设备监控,且低成本,低功耗,更为有效解决校园安防监控的问题。%In order to solve the problems of campus security monitoring, proposes a solution based on the Internet of Things (IOT) technology. In the solution, the end device with sensor is joined in the networks which built by ZigBee technology, to achieve communication of things to things. With 802.15.4 standard, describes the process of network building, the nodes joining and data request in details. The result indicates that it can achieve device-monitoring real-time and accurate by using lOT technology, and it is low-cost, low-power-consumption and efficient approach for solving the problems of campus security monitoring.

  18. 物联网感知层RFID和WSN信息安全技术研究%Research on Information Security Technology of the Internet of Things at the Perceived Layers of RFID and WSN

    Institute of Scientific and Technical Information of China (English)

    笪林梅

    2014-01-01

    The perceptual layer is an important part of the Internet of things,whose key technology is the technology of radio frequency i-dentification( RFID) and wireless sensor network technology( WSN) . According to the radio frequency identification technology of infor-mation disclosure,information tampering,tracking label and other safety issues,this paper proposed technical solutions such as the label protection,encryption mechanisms,and so on. For wireless sensor network node information was illegally captured,theft,assault and other security issues,and proposed key management controlling,the establishment of secure routing,authentication and access control nodes increases,intrusion detection and other technical solutions.%感知层是物联网的重要组成部分,其关键技术是射频识别技术( RFID)和无线传感器网络技术( WSN)。针对射频识别技术的信息泄露、信息篡改、追踪标签等安全问题,提出标签保护和加密机制等技术方案;针对无线传感网节点信息被非法俘获、窃取、攻击等安全问题,提出密钥管理控制、建立安全路由、增加节点认证、访问控制、入侵检测等技术方案。

  19. Data Security : An Analysis

    Directory of Open Access Journals (Sweden)

    Dr.S.B.Thorat

    2010-07-01

    Full Text Available There is intense of cyber attach through electronic media, so it calls for data security practice. Internet technology becomes very pervasive to exchange data through online. Various Government and private sectors mostly depends on Information Technology and facing problem of security breach. The precious thing on internet is the data. This data need to be protected from any damage and errors. The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them. There are many way to protect from the cyber space. The data can be protected using various techniques such as Anti-viruses, antimalware,spyware, encryption, access control, physical security, keep backup of data regularly, and good security habit.

  20. Regulation and Censorship of the Internet

    OpenAIRE

    Okeke, Innocent

    2012-01-01

    The Internet is probably one of the greatest inventions of mankind and one of the best things that happened in my generation. It has become an integral part of day to day activities and therefore subject to national security in countries around the globe The Internet grows and so does government regulation The key question is now: should government keep regulating the Internet or leave it as it is? Would it be possible to regulate the Internet without interfering with free speech? Who is m...

  1. Customer Perspective in Use of Internet Banking

    OpenAIRE

    SEVİM, Taner; ÖMÜR, Gülşen

    2015-01-01

    Abstract— Considered as one of the most significant inventions of the century, the internet, beyond doubt, has either a positive or negative effect on many industries. One of those industries affected by the internet is banking industry. Internet banking being used in Turkey since the early 2000’s made preferred by people by eliminating security issues first. On the other hand, it is a fact that use of internet banking affects number of bank branches and personnel. One of the reasons underlyi...

  2. Towards a quantum internet

    Science.gov (United States)

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  3. 基于IEEE 802.11p车联网安全应用消息传输性能分析%Internet of Vehicles Security Messages Transmission Based on IEEE 802.11p

    Institute of Scientific and Technical Information of China (English)

    段林侠

    2016-01-01

    从车联网安全消息传输性能的角度出发,针对车联网仿真需求,搭建了基于交通仿真软件SUMO和网络仿真软件OMNeT++的车联网仿真平台。在此基础上,对基于IEEE 802.11p协议的车联网中安全应用消息的传输性能进行了仿真与分析。仿真结果表明,IEEE 802.11p协议不能满足车联网中低时延高可靠的服务质量需求。%From the perspective of car security application message transmission performance,this paper aimes at the u-nique requirements of the Internet of Vehicles (IoV) simulation,set the IoV simulation platform based on traffic simulation soft-ware SUMO and network simulation software OMNeT++.Based on that,and analyzes the IoV network system performance based on the IEEE 802.11p protocol.

  4. 76 FR 10569 - Request for Comments on the Internet Assigned Numbers Authority (IANA) Functions

    Science.gov (United States)

    2011-02-25

    ... innovation, continuing to preserve the security and stability of the Internet DNS remains a top priority for... preserving a stable and secure Internet Domain Name System (DNS). Critical to the DNS is the continued... administration of certain responsibilities associated with Internet DNS root zone management; (3) the...

  5. Research on Status, Threat and Developmental Trend of Mobile Internet Security System Based on Industrial Chain%基于产业链角度的移动互联网安全体系现状、威胁和发展趋势研究

    Institute of Scientific and Technical Information of China (English)

    庞思铭; 严宏君; 甄真

    2015-01-01

    基于移动终端信息安全,从产业链角度研究了移动互联网信息安全的现状、威胁以及发展趋势.首先分析了产业链四大主要环节芯片、操作系统、应用程序和分发渠道的现有安全机制,然后研究了后三者目前存在的安全隐患,最后对移动互联网信息安全发展趋势做了分析和展望.%Considering information security on mobile terminal, status, threat and developmental trend of mobile Internet information security were researched from aspect of industrial chain. Existing security mechanism of four links, including chip, operating system, applications and distribution channel, was analyzed. Then, the security hazard of the latter three was researched. Finally, analysis and prospect on developmental trend of mobile Internet information security were presented

  6. Strengthen the Construction of EMR System Security under Internet Situation%加强互联网形势下电子病历系统安全建设

    Institute of Scientific and Technical Information of China (English)

    申月波; 周莲茹; 段少军; 罗宇红; 焦雄飞; 张松; 李子涛

    2016-01-01

    Objective: To promote and guarantee the nationwide regional health and the gradually establishing of the citizens' health files, accelerate the data sharing progress of hospitals and hospitals, hospitals and communities, hospitals and medical management departments, hospitals and patients. Methods: This article carries on the thorough analysis in view of the safety of hospitals' important information such as the electronic medical records under the internet situation and gives some solutions. This scheme makes the security policies, applies to the key process of hospitals' information systems and makes all-around protection for the important data by the technologies such as adopting data encryption, security domain division, internal and external network gate safety isolation, terminal access standard management and identity authentication. Results: To achieve implementation of medical data sharing, and ensure the security and privacy of hospitals' important data such as electronic medical records and other data. Conclusion: With the development of the internet information technology, the safety of electronic medical records faces a big threat. We can make the data safely storage and applied, offer reliable guarantee for the safe operation of hospitals' information systems and achieve effective sharing of data by using measures and solutions in this paper.%目的:促进和保障全国范围的区域医疗及全民健康档案逐步建立,加速医院之间、医院与社区之间、医院与医疗管理部门之间,以及医院与患者之间实现医疗数据共享的进度。方法:针对目前医院存在的互联网形势下电子病历等重要信息数据安全问题进行了深入分析,并给出解决方案。方案采用数据加密、安全域划分、内外网闸安全隔离、终端准入准出管理、身份认证等技术制定了安全策略,在医院信息系统的关键流程环节进行应用,对重要数据进行全方位保护。

  7. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  8. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  9. Application Security Automation

    Science.gov (United States)

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  10. The Accuracy of Optimization of College Students' Consciousness of Internet Security Fuzzy Evaluation Algorithm%大学生互联网安全意识模糊评价算法的准确性优化

    Institute of Scientific and Technical Information of China (English)

    赵东明; 朱凯峰

    2015-01-01

    According to the fuzzy evaluation method in the evaluation of College Students Internet security consciousness still exist in the accuracy is not high, lack of stability problems. This paper presents the fuzzy evaluation model based on improved AHP index optimization, calculation of the approximate calculation and the largest eigenvalue of the first weight vector, and then were normalized and consistency check, at the end of the AHP fuzzy evaluation indexes were standardized using the principle of maximum degree of membership. The simulation experiment results show that, in the analysis and evaluation of 1000 students of a school internet safety awareness survey questionnaire, evaluation of fuzzy evaluation model based on improved AHP index optimization accuracy is proposed in this paper to be higher than the fuzzy assessment model and AHP model of fuzzy evaluation, and better stability.%针对模糊评价法在大学生互联网安全意识评价中还存在准确性不高、不够稳定等问题。本文提出了基于指标优化的改进AHP模糊评价模型,首先进行权重向量的近似计算和最大特征根的计算,然后进行归一化处理和一致性检验,最后利用最大隶属度原则对AHP模糊评价指标进行标准化改进。实例仿真试验结果表明,在对某学校1000名大学生的互联网安全意识调查问卷的评价分析中,本文提出的基于指标优化的改进AHP模糊评价模型的评价准确性要比模糊评价模型和AHP模糊评价模型要高,并且稳定性更佳。

  11. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  12. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  13. Internet India.

    Science.gov (United States)

    Pahl, Ronald H.

    1997-01-01

    Reviews a number of Internet sites containing information on every aspect of life in Modern India. The various sites provide information on such diverse topics as the Indian film industry, politics, the booming Indian computer industry, changing status of women, and financial and political issues. (MJP)

  14. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  15. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  16. Towards a cyber secure society

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2012-10-01

    Full Text Available in Bahrain Syria ? CSIR 2012 Slide 12 What is possible ? CSIR 2012 Slide 13 Cyber Defence Areas ? CSIR 2012 Slide 14 Network Attack Prediction Security Awareness Social Engineering Network Attack Prediction ? CSIR 2012 Slide 15 Network Attack... Goal Class Some Phase Class Actor Class Aggressor Class Some Single Single Security Awareness ? CSIR 2012 Slide 19 Motivation for the project ? CSIR 2012 Slide 20 Self-defence course for internet users Cyber Security Awareness Training...

  17. Securing BGP Using External Security Monitors

    Science.gov (United States)

    2006-01-01

    using the actual Internet AS topology, as represented by the CAIDA AS Relation- ships Dataset [1]. We measured the time to detect an in- valid...examine BGP security using the AS-level topology from the CAIDA AS Relationships Dataset [1]. We enu- merated all AS pairs and counted which pairs had...infrastructure using trusted computing hardware. References [1] The CAIDA AS Relationships Dataset, June 26th, 2006. http://www.caida.org/data/ active

  18. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  19. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    Pang, J.

    2002-01-01

    Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over insecure open netwo

  20. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  1. Office Automation System and Its Security Design

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Analyzing the specialties of OAS network based on Internet/Intranet, aiming to these specialties design the OAS network's system structure. Analyzing the security threats that the OAS network faces to and the possible attacking means. This paper puts forward five security tactics and security design in detail, and a sensible conclusion is proposed at last.

  2. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  3. Internet censorship.

    Science.gov (United States)

    1996-12-27

    The U.S. Supreme Court agreed to review a lower court ruling that found the Communications Decency Act to be an unconstitutional infringement on free speech. The judges from the U.S. District Court in Philadelphia said that parents should monitor material that children are exposed to on the Internet. AIDS groups that publish information on safer sex, HIV prevention and AIDS treatments are not responsible for censoring content.

  4. Internet Governance

    Directory of Open Access Journals (Sweden)

    Pedro Veiga

    2010-01-01

    Full Text Available It has now become quite obvious that the Internet has brought significant changes to our society and a break on how we lived before its emergence. It is still too early to assess the impact on society of the new services at our disposal, such as the capacity to communicate faster and cheaper on a global scale, access information and, perhaps more importantly, to produce and disseminate information in a way that is accessible to all.It is clear that the advent of the Information Society implies changes in our society that constitute a point of no return. However, contrary to what happened when we entered the Industrial Age about three centuries ago, when the changing process was slow and led by older individuals, these days the entrance into the Information Society is taking place rapidly and the decisive players are younger people. The global nature of the Internet, the possibility of producing and distributing any type of content in digital form at almost zero cost, as well as the vast number of people who use the web, have highlighted the need for new forms of intervention in a sector where there are many types of players. It is in this context that the problem of Internet Governance becomes a very current issue, inasmuch as one feels the need to guarantee a diversity of rights and duties, which may appear difficult to reconcile.This paper presents a brief overview of the main players and initiatives which, in the field of Internet Governance, have tried to contribute to turning this network into a factor for social development and democraticity on a global scale.

  5. Factors influencing Internet banking adoption in South African rural areas

    Directory of Open Access Journals (Sweden)

    Thinamano C. Ramavhona

    2016-07-01

    Full Text Available Background: The banking industry globally provides Internet banking to offer their customers easy access to banking services. The banks in South Africa, like their counterparts in other parts of the world, offer Internet banking to customers. However, the majority of South Africans in rural areas do not adopt and use Internet banking despite its convenience, the availability of Internet banking infrastructure, the effort of banks in promoting Internet banking awareness and Internet security.Objectives: This research investigated factors which influence the adoption and use of Internet banking in the context of South African rural areas.Method: In this study, a quantitative research approach was used. Data were collected through questionnaires and analysed using Statistical Package for Social Sciences (SPSS tool.Results: The perceived compatibility, trialability and external variables such as awareness and security were found to have significant influence in the adoption of Internet banking in South African rural areas, whereas relative advantage was found not to be a significant factor. Security and the complexity of Internet banking were also revealed as some of the factors hampering the intention to adopt Internet banking in South African rural areas.Conclusion: The lack of awareness on Internet banking services and its benefits such as its convenience and the possibility to conduct banking transactions from any location with Internet is found to be the reason for South African rural area retail bank consumers’ reluctance to adopt Internet banking. The majority of retail bank customers in South African rural areas do not use Internet banking because of the lack of resources, such as computers with Internet access. The security of transactions conducted over the Internet is the main concern and significant element that customers consider before adopting Internet banking in South African rural areas as they perceive it as being easily exposed

  6. Economics of information security and privacy III

    CERN Document Server

    Schneier, Bruce

    2012-01-01

    The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.- Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security.- Are Home Internet Users Willing to Pay ISPs for Improvements in Cyber Security?.- Economic Methods and Decision Making by Security Professionals.- Real Name Verification

  7. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2011-09-28

    ... service, visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . Gerard R... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Consent Based Social Security Number Verification (CBSV) Service AGENCY: Social...

  8. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2013-09-12

    ...-6401, , for more information about the CBSV service, visit our Internet site, Social Security Online... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Consent Based Social Security Number Verification (CBSV) Service AGENCY: Social...

  9. the Applicationand the Security analysis of Cloud Computing on the Mobile Internet%移动互联网中云计算的应用与安全分析

    Institute of Scientific and Technical Information of China (English)

    谢于晨

    2014-01-01

    With the rapid development ofITindustry,themobile Internet is produced by the combination ofmobilecommunication technology andInternet technology.Under the premise of the current mobileInternet development,this article analysesthe cloud computing applicationson the mobileInternet, andbrielfy discussescloud computingsecurity issuesthat existin the mobile Internet.%IT行业飞速发展,移动通信技术与互联网技术二者结合产生了移动互联网。本文从当前移动互联网发展的前提下分析了云计算在移动互联网上的应用,并简单阐述了云计算在移动互联网中存在的安全问题。

  10. Security Architecture of Cloud Computing

    Directory of Open Access Journals (Sweden)

    V.KRISHNA REDDY

    2011-09-01

    Full Text Available The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.

  11. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  12. Design of secure operating systems with high security levels

    Institute of Scientific and Technical Information of China (English)

    QING SiHan; SHEN ChangXiang

    2007-01-01

    Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality,integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated.Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process.

  13. New Paradigms in Internet Computing

    CERN Document Server

    Tripathy, Piyu; Naik, Sagar

    2013-01-01

    The renaissance of internet has reached the mainstream that is named as Web 2.0. People are now using the web to build things they have never thought of earlier. Experts take a step forward to what we contribute, and extend it and give back to the society, i.e. really the boon of internet computing. It has revolutionized the current business environment, not as a mere computing tool, but offers versatile services and increase the productive flow of information. It is a new dimension in computing systems by which companies can curtail their operating expenses, by hosting and operating through the internet. Now the users can access the required information by means of any device connected with an internet. The challenge ahead for implementing this versatile system is that the software and technology has to be developed and deployed simultaneously vis-a-vis safeguarding the security and privacy of information.             This book encompasses various research and developments in Internet technology a...

  14. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  15. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  16. Research on Internet of Things Security Based on Support Vector Machines with Balanced Binary Decision Tree%基于平衡二叉决策树SVM算法的物联网安全研究

    Institute of Scientific and Technical Information of China (English)

    张晓惠; 林柏钢

    2015-01-01

    物联网是继计算机、互联网和移动通信之后的又一次信息产业革命。目前,物联网已经被正式列为国家重点发展的战略性新兴产业之一,其应用范围几乎覆盖了各行各业。物联网中存在的网络入侵等安全问题日趋突出,在大数据背景下,文章提出一种适用于物联网环境的入侵检测模型。该模型把物联网中的入侵检测分为数据预处理、特征提取和数据分类3部分。数据预处理主要解决数据的归一化和冗余数据等问题;特征提取的主要目标是降维,以减少数据分类的时间;数据分类中引入平衡二叉决策树支持向量机(SVM)多分类算法,选用BDT-SVM算法对网络入侵数据进行训练和检测。实验表明,选用BDT-SVM多分类算法可以提高入侵检测系统的精度;通过特征提取,在保证精度的前提下,减少了检测时间。%The Internet of Things (IoT) is another information industry revolution after the computer, the Internet and the mobile communications. At present, IoT has been ofifcially listed as one of the national strategic emerging industries, and its application range covers almost all areas. Secure problems such as network intrusion in the IoT art prominent increasingly. In the big data context, this paper proposes an intrusion detection model that is suitable for IoT which divides the intrusion detection procedure into three parts, which are data preprocessing, features extraction and data classiifcation. Data normalization and data redundancy reduction are solved in the data preprocessing. The main goal of features extraction is to reduce the dimension and thus to reduce the time of data classiifcation. Support vector machine with balanced binary decision tree algorithm that is named BDT-SVM is introduced in the data classiifcation for training and testing the network intrusion data. Experimental results show that it can improve the accuracy of intrusion

  17. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  19. Cloud Security A Comprehensive Guide to Secure Cloud Computing

    CERN Document Server

    Krutz, Ronald L

    2010-01-01

    Well-known security experts decipher the most challenging aspect of cloud computing-security. Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unpa

  20. Rapidly Deployable Mobile Security Solution

    Science.gov (United States)

    2016-03-01

    IT equipment. Solutions offered include offering kiosks for group in cases where individual employees do not require routine and regular use.21...point connected to the Internet only (Internet Gateway Only Connection). • Public Wi-Fi Hotspot. • Hotel Wi-Fi Hotspot. • Home Wi-Fi network (user...managed). Note: DOD CMD will not be used to connect to public or hotel Hotspots.”187 Fix: “Publish CMD Wi-Fi security policy that includes

  1. Managing the Internet of Things architectures, theories, and applications

    CERN Document Server

    Hua, Kun

    2016-01-01

    The implementation and deployment of the Internet of Things (IoT) brings with it management challenges around seamless integration, heterogeneity, scalability, mobility, security, and many other issues. This comprehensive book explores these challenges and looks at possible solutions.

  2. Satisfaction with Service for Internet Medicare Replacement Cards

    Data.gov (United States)

    Social Security Administration — This dataset contains results of Internet Report Card iRequest Survey conducted by mail between April and June 2014 using a brief scannable “report card” style...

  3. Towards an automated security awareness system in a virtualized environment

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2012-07-01

    Full Text Available virtualized system used to determine the current security awareness levels of users on a shared platform accessing the Internet. The system uses virtual machines to provide users with access to the Internet, assess the security awareness levels of the users...

  4. An Internet-Based Accounting Information Systems Project

    Science.gov (United States)

    Miller, Louise

    2012-01-01

    This paper describes a student project assignment used in an accounting information systems course. We are now truly immersed in the internet age, and while many required accounting information systems courses and textbooks introduce database design, accounting software development, cloud computing, and internet security, projects involving the…

  5. Research on Next-Generation Internet Architecture

    Institute of Scientific and Technical Information of China (English)

    Jian-Ping Wu; Ke Xu

    2006-01-01

    The primary problem during the evolvement of next-generation Internet is the contradiction between growing requirements for Internet and the insufficient development of network theory and technology. As the fundamental principles to guide the developing direction of Internet, the study of Internet architecture is always a focus in the research community. To address the core issue of network scalability, we propose multi-dimension scalable architecture of next-generation Internet, the main idea of which is to extend the single-dimension scalability of traditional Internet on interconnection to multi-dimension scalability of next-generation Internet. The multi-dimension scalability is composed of scale-scalability,performance-scalability, security-scalability, function-scalability, and service-scalability. We suggest five elements, namely,IPv6, authentic IPv6 addressing, scalable processing capacity of routers, end-to-end connectionless Quality-of-Service control,and 4over6 mechanism to realize the multi-dimension scalability. The current research results show that the multi-dimension scalable architecture composed of these five elements will bring great influence on next-generation Internet.

  6. Current Experiences with Internet Telepathology and Possible Evolution in the Next Generation of Internet Services

    Directory of Open Access Journals (Sweden)

    V. Della Mea

    2000-01-01

    Full Text Available The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a teleconsultation via multimedia e‐mail; (b teleconsultation via web‐based tools; (c distant education by means of World Wide Web; (d virtual microscope management through Web and Java interfaces; (e real‐time consultations through Internet‐based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i no guarantees on the quality of service (QoS; (ii inadequate security and privacy; (iii for some countries, low bandwidth and thus low responsiveness for real‐time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth.

  7. Customer perceptions on Internet banking information protection

    Directory of Open Access Journals (Sweden)

    André Redlinghuis

    2010-08-01

    Full Text Available Background: South Africa has a well-developed and established banking system which compares favourably with those in many developed countries (e.g. USA, but also sets South Africa apart from many other emerging market countries like Egypt and Brazil. Four dominant banks, namely the Amalgamated Banks of South Africa (ABSA, Standard Bank, Nedcor and First National Bank (FNB influence the South African banking environment. Internet banking has slowly been taking off in South Africa since 1996 as consumers are attracted to the convenience, safety and lower costs of doing banking online. Trust is a significant component of Internet banking and online services and products.Objectives: This article has reported on the results of a survey (a close-ended questionnaire that was conducted by alumni of the University of Johannesburg (UJ. The research problem for this study has been formulated as ‘what are Internet banking customers’ perception on information protection when using Internet banking services and products?’Method: The methodology for this study falls on quantitative research. The research study consisted of a detailed literature review, followed by an empirical component which consisted of a quantitative questionnaire. The questionnaire used in this study consisted of eight sections covering biographical information, financial institution and Internet banking, Internet banking service quality and delivery, Internet banking functionality, Internet banking costs, Internet banking convenience and relationships, Internet banking trust and Internet banking security and information technology (IT.Results: It was established that the findings of this research could assist financial institutions with fostering and building greater value adding relationships with their customers. These value-adding endeavours will ensure that customers experience and perceive their Internet banking experience to be enriching. Education and awareness campaigns are

  8. 中国互联网+社会保障信息系统构建--基于大数据挖掘视角%Building of an Internet+Social Security Informatization System in China-From Perspective of Big Data Minning

    Institute of Scientific and Technical Information of China (English)

    郜凯英; 杨宜勇

    2016-01-01

    Every sector experiences changes caused by the huge data resources in the Age of Big Data,and the social security sector is no exception.In recent years,China’s social security system expands constantly,contributors increase rapidly,and more and more people are concerned about the management ability and service level of the relevant institutions.Using big data related technology to accelerate internet+social security informatization system building is of great significance for improving the efficiency of social security management,service quality and reduction of social costs. Based on the construction of a three -level index system for social security informatization building,AHP method is adopted in this paper to analyze the current situation and existing problems of social security informatization building in China,and suggestions on using mass data,cloud computing and other techniques for building the internet+social security informatization system are put forward.%大数据时代的到来促使各个领域都开始因庞大的数据资源而发生变革,社会保障领域也不例外。近些年中国社会保障制度不断扩面,参保人数激增,使得越来越多的人开始关注相关机构的管理能力及服务水平。如何利用大数据相关技术推进互联网+社会保障信息系统建设对于提升社保管理效率、服务质量和节约社会成本都是十分有意义的。本文在构建社会保障信息化建设三级指标体系的基础上采用AHP分析法分析了目前中国社会保障信息化建设现状与存在的问题,进而提出在社会保障制度广覆盖的今天应如何利用海量数据和云计算等技术构建中国互联网+社会保障信息系统。

  9. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective

  10. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mis

  11. An Internet of Things Resource for Rehabilitation

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis; Petersson, Eva

    2014-01-01

    built from real-world case studies and is envisioned as a developing “feed-in feed-out” entity where evidence-based findings are submitted and extracted via a secured ‘gateway’ by expert professional practitioners. The resource is considered an ‘Internet of Things’ model to also inform and consult...

  12. GOOSE: Semantic search on Internet connected sensors

    NARCIS (Netherlands)

    Schutte, K.; Bomhof, F.W.; Burghouts, G.J.; Diggelen, J. van; Hiemstra, P.; Hof, J. van 't; Kraaij, W.; Pasman, K.H.W.; Smith, A.J.E.; Versloot, C.A.; Wit, J.J. de

    2013-01-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mis

  13. Internet voting: a conceptual challenge to democracy

    NARCIS (Netherlands)

    Pieters, W.; Trauth, E.M.; Howcroft, D.; Butler, T.; Fitzgerald, B.; DeGross, J.I.

    2006-01-01

    In this paper, we discuss the implications for social inclusion of the advent of Internet voting. Although the issue of social exclusion or social inclusion with regard to technological developments in the voting process is often approached as a matter of either security or turnout, we will take a b

  14. Mathematics of Information Processing and the Internet

    Science.gov (United States)

    Hart, Eric W.

    2010-01-01

    The mathematics of information processing and the Internet can be organized around four fundamental themes: (1) access (finding information easily); (2) security (keeping information confidential); (3) accuracy (ensuring accurate information); and (4) efficiency (data compression). In this article, the author discusses each theme with reference to…

  15. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  16. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  17. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2010-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  18. Internet: um meio desmassificado

    OpenAIRE

    Sousa, Ivo Dias de

    2016-01-01

    Objetivos Identificar as diferentes fases de evolução da Internet. Perceber a Internet como um meio desmassificado. Entender o conceito de hipertexto e a sua evolução. Saber os diferentes tipos de utilização da Internet. Compreender as diferentes dimensões da presença na Internet. N/A

  19. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  20. M-Banking Security - a futuristic improved security approach

    Directory of Open Access Journals (Sweden)

    Aaradhana A Deshmukh

    2010-01-01

    Full Text Available In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dreams. Any sector needs to understand changing need of customer. In order to satisfy financial need for customer banks are taking help of new technology such as internet. Only problem remain is of security. The aim of this work is to provide a secure environment in terms of security for transaction by various ways. In order to improve security we are making use of "Steganography" technique in the way never used before. Task of enhancing security include construction of formula for both data encryption and also for hiding pattern. Server should not process any fake request hence concept of custom "Session id" and "Request id" is introduced. Implementation of such a security constraints in banking sector not only help to serve customer in better way but also make customer confident and satisfy.

  1. M-Banking Security - a futuristic improved security approach

    CERN Document Server

    Navale, Geeta S; Deshmukh, Aaradhana A

    2010-01-01

    In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dreams. Any sector needs to understand changing need of customer. In order to satisfy financial need for customer banks are taking help of new technology such as internet. Only problem remain is of security. The aim of this work is to provide a secure environment in terms of security for transaction by various ways. In order to improve security we are making use of "Steganography" technique in the way never used before. Task of enhancing security include construction of formula for both data encryption and also for hiding pattern. Server should not process any fake request hence concept of custom "Session id" and "Request id" is introduced. Implementation of such a security constraints in banking sector not only help to serve customer in better way but also make customer confident and satisfy.

  2. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  3. The Impact of Information Richness on Information Security Awareness Training Effectiveness

    Science.gov (United States)

    Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou

    2009-01-01

    In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…

  4. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  5. Secure Communication using Identity Based Encryption

    NARCIS (Netherlands)

    Roschke, Sebastian; Ibraimi, L.; Cheng, Feng; Meinel, Christoph

    2010-01-01

    Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion

  6. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  7. Security economics in the HTTPS value chain

    NARCIS (Netherlands)

    Asghari, H.; Van Eeten, M.J.G.; Arnbak, A.M.; Van Eijk, N.A.N.M.

    2013-01-01

    Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication

  8. Secure Communication using Identity Based Encryption

    NARCIS (Netherlands)

    Roschke, Sebastian; Ibraimi, Luan; Cheng, Feng; Meinel, Christoph

    2010-01-01

    Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion D

  9. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  10. Internet roaming: a WLAN/3G integration system for enterprises

    Science.gov (United States)

    Luo, Hui; Jiang, Zhimei; Kim, Byoung J.; Shankar, Narendra K.; Henry, Paul

    2002-08-01

    This paper proposes an enterprise-oriented WLAN/3G network integration solution, called the Internet Roaming system. Differing from other operator-oriented WLAN/3G network integration solutions, the Internet Roaming system is a practical IP-based corporate network architecture that provides seamless internetworking across office WLAN, home WLAN, public WLAN, and 2.5G/3G cellular network for corporate wireless data users. An Internet Roaming system may have four building blocks. They are IRC (Internet Roaming Client), SMG (secure mobility gateway), SIA (Secure IP Access) gateway, and VSA (virtual single account) server. The IRC is a special client tool (software or hardware) installed on a wireless data device. It provides a secure mobile IP connection from the wireless data device to the corporate network transparent to the operating system of the wireless data devices. The SMG is a mobile IPsec gateway installed on the corporate core network facing the Internet. It works with the IRC to maintain a secure mobile IP connection when the wireless data device is connected on the Internet through a home WLAN, a public WLAN, or a cellular network. The SIA server is a special IPsec gateway installed on the corporate intranet where office WLAN is installed. It works with the IRC to assure the security of office WLAN while improving the routing efficiency for users computers. The VSA server manages the IRC, SMG, and SIA servers.

  11. Guidance on Design of Internet-based Process Control Systems

    Institute of Scientific and Technical Information of China (English)

    S.H.YANG; L.YANG

    2005-01-01

    Internet-based process control is becoming new generations of control systems, in which the Internet is used as a platform for global remote monitoring and control. The obvious benefit is to enable global collaboration between operators from geographically dispersed locations, data sharing and data provision for remote monitoring and control. However, connection to an open network and the use of universal technology present new problems that did not exist with the conventional design and construction of control systems, such as time delay and data loss in Internet transmission and security. This paper reviews the latest research results and presents design guidance of Internet based monitoring and control systems.

  12. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  13. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  14. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  15. Rezension: World Wide War: Angriff aus dem Internet/Cyber War: The Next Threat to National Security and What to Do About It von Richard A. Clarke und Robert K. Knake/by Richard A. Clarke and Robert K. Knake

    Directory of Open Access Journals (Sweden)

    Karl H. Stingeder

    2015-03-01

    Full Text Available Je breiter der Infrastruktur-Anschluss eines Landes an das World Wide Web, desto größer die Angriffsfläche im Fall eines Netzkriegs. Die Messung der virtuellen Kampfkraft erfolgt auf Basis von drei Faktoren: Offensivkraft, Defensivfähigkeit und die Abhängigkeit vom Internet. Die USA verfügen als "Supermacht" zwar über die größte virtuelle Offensivkraft, gleichzeitig steht die Nation Cyberangriffen sehr verwundbar gegenüber. Dagegen sind in Nordkorea kaum Systeme vom Internet abhängig. Obwohl die offensiven Netzkriegskapazitäten Nordkoreas verhältnismäßig gering sind, präsentiert sich die virtuelle Kampfkraft des nordkoreanischen Regimes in Bestform. Die Verwundbarkeit ziviler Systeme, insbesondere der Energieversorgung, muss in direkter Korrelation mit deren Anknüpfung an das Internet betrachtet werden. The more broadly connected a country’s infrastructure and energy distribution, the greater its vulnerability in the event of a cyber war. Measuring this virtual fighting power is based on three factors: offensive and defensive strength, as well as dependency on the Internet. As a superpower, the USA has the greatest virtual offensive strength available. At the same time, the nation is most susceptible to cyber attacks and therefore most vulnerable. By contrast, North Korea’s offensive cyber fighting power is relatively small, but its overall cyber war capabilities are cutting-edge. The vulnerability of civil systems, especially power supply, must be viewed in direct correlation to their connection to the Internet.

  16. The Adoption of Internet Banking in Nigeria: An Empirical Investigation

    Directory of Open Access Journals (Sweden)

    Chiemeke, S. C.

    2006-12-01

    Full Text Available This study examines the level of adoption of Internet banking in Nigeria. Twelve large on-line banks that retained their brand names after the consolidation were studied in terms of the functionality and interactivity of their websites. The model used is similar to that proposed by Diniz in 1998, with an additional factor on security measures. Main factors that inhibit the adoption of Internet banking in Nigeria are security and inadequate operational facilities including proper telecommunications and power. The results reveal that Internet banking is being offered at the BASIC level of Interactivity with most of the bank having mainly information sites and providing little Internet transactional services. The level of security of the banks was also low as most of the banks have not adopted 128 bit Secure Sockets Layer (SSL encryption security measures. Most of the banks perform extremely well in providing up-to date information. However, further improvements on security and provision of key ingredients of Internet banking which includes confidentiality, effective communication integrity and availability, should be considered in order to satisfy customer’s requirements.

  17. GSM Security Using Identity-based Cryptography

    CERN Document Server

    Agarwal, Animesh; Das, Manik Lal

    2009-01-01

    Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM supports. Consequently, a careful design of GSM security using both symmetric and asymmetric key cryptography would make GSM security more adaptable in security intensive applications. This paper presents a secure and efficient protocol for GSM security using identity based cryptography. The salient features of the proposed protocol are (i) authenticated key exchange; (ii) mutual authentication amongst communicating entities; and (iii) user anonymity. The security analysis of the protocol shows its strength against some known threats observed in conventional GSM security.

  18. Medical Internet exchange project in Japan.

    Science.gov (United States)

    Mizushima, H; Uchiyama, E; Akiyama, M; Yamamoto, R; Tatsumi, H

    1998-01-01

    The Internet has been widely used by medical institutes and hospitals around the world, however; its use for telemedicine is still low. The main reason for this is the availability of bandwidth and poor security through the net. Meanwhile, we have established and have been operating 'Cancer Information Network' among 11 Cancer Centers in Japan, mainly for Multipoint TV Conference using HDTV image. There are also similar projects among 9 cardiovascular centers in Japan. By March, all 240 national hospitals will have been connected by an IP network using an ATM backbone. The above network projects are operated independently, and have an 'Intranet' characteristics within them. There are also many hospitals and clinics connected to the Internet by commercial internet providers. To make a secure and efficient network between these medical networks and medical sites, we started the Medical Internet eXchange project (MDX project) constructing a Medical Network Operation Center to create a link between them. To provide the administrative policy of this project, we established the Medical Internet eXchange Association. We are planning to expand this project to Asian-Pacific countries using the Asian-Pacific Advanced Network (APAN), and also expand it to worldwide connections in the future. For this purpose, we are currently asking other countries to form a structure similar to MDX-Japan. The concept, hardware system, software system, firewall configuration, and routing policy will be also discussed.

  19. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  20. Usable Security For Named Data Networking

    OpenAIRE

    Yu, Yingdi

    2016-01-01

    Named Data Networking (NDN) is a proposed Internet architecture, which changes the network communication model from “speaking to a host” to “retrieving data from network”. Such data-centric communication model requires a data-centric security model, which secures data directly rather than authenticating the host where data is retrieved from and securing the channel through which data is delivered, so that data can be safely distributed into arbitrary untrusted storage and retrieved over untru...

  1. About Security Solutions in Fog Computing

    Directory of Open Access Journals (Sweden)

    Eugen Petac

    2016-01-01

    Full Text Available The key for improving a system's performance, its security and reliability is to have the dataprocessed locally in remote data centers. Fog computing extends cloud computing through itsservices to devices and users at the edge of the network. Through this paper it is explored the fogcomputing environment. Security issues in this area are also described. Fog computing providesthe improved quality of services to the user by complementing shortages of cloud in IoT (Internet ofThings environment. Our proposal, named Adaptive Fog Computing Node Security Profile(AFCNSP, which is based security Linux solutions, will get an improved security of fog node withrich feature sets.

  2. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  3. Internet and Internet Use: Teacher Trainees' Perspective

    Science.gov (United States)

    Akinoglu, Orhan

    2009-01-01

    The aim of this study is to present the development and issues of internet and internet use. The study has a descriptive survey design and 185 randomly selected teacher trainees at Marmara University, Ataturk Education Faculty in the 2001-2002 academic year constitute the sample. Data were collected via a questionnaire prepared by the researcher…

  4. Internet of Things novel advances and envisioned applications

    CERN Document Server

    Geetha, M

    2017-01-01

    This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society. .

  5. Address switching: Reforming the architecture and traffic of Internet

    Institute of Scientific and Technical Information of China (English)

    LI Xing; BAO CongXiao

    2009-01-01

    The success of the Internet is largely ascribable to the packet-switching scheme, which, however, also presents major challenges. Having identified three missing links in the current Internet architecture based on our long-term experiences of designing and operating large-scale backbones, we put forward a new, but incrementally deployable, network scheme-address switching. The address switching has both the advantages of packet switching and circuit switching; it supplies the missing links in the current Internet architecture and can reform the Internet traffic. Our analysis, protocol design and experiments indicate that the address switching can greatly improve the quality of service (QoS), security and routing scalability of today's Internet. So it can provide flexible, high-performance and "per-service" networking for the scientific research communities. Moreover, it can provide a fairer and more sustainable business model for the commodity Internet.

  6. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  7. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  8. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  9. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  10. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  11. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  12. Building multiservice Internet protocol virtual private networks

    Science.gov (United States)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  13. Vulnerable Internet : A study of the critical infrastructure of (the Netherlands section of) the Internet

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Klaver, M.H.A.; Huizenga, J.; Till, J. van; Boer, R. de; Sandt, C.H.C. van de; Pont, P.M.

    2001-01-01

    It is impossible to achieve a critical infrastructure that is secured for one hundred percent. One of the main conclusions of the KWINT study on the vulnerabilities of the (Netherlands section of the) Internet is that the aim of the Dutch Government should be to prevent incidents, to reduce critical

  14. Exploring Factors that Influence Students' Behaviors in Information Security

    Science.gov (United States)

    Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary

    2012-01-01

    Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…

  15. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2015-08-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  16. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... SECURITY Coast Guard Facility Security Officer Training Requirements; Correction AGENCY: Coast Guard, DHS...), announcing a public meeting to receive comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The...

  17. Design of the XML Security System for Electronic Commerce Application

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.

  18. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  19. EDI在 Internet 上的应用%Application of EDI to Internet

    Institute of Scientific and Technical Information of China (English)

    李玲; 蒋励

    2001-01-01

    分析了EDI技术的安全保密措施及适合商用等的诸多设计特点,介绍了如何将EDI技术应用于Internet网络,给出了Internet网信息的安全性问题和Internet网上信息的标准化问题的解决方案。%In this paper, we analyze the characteristics of the security and secrecy of EDI technology and for electronic business. The EDI technology is presented how to use the internet. The resolvent is given for the security problem of internet information and the standard problem of information on internet.

  20. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  1. Characterizing Internet Worm Infection Structure

    CERN Document Server

    Wang, Qian; Chen, Chao

    2010-01-01

    Internet worm infection continues to be one of top security threats. Moreover, worm infection has been widely used by botnets to recruit new bots and construct P2P-based botnets. In this work, we attempt to characterize the network structure of Internet worm infection and shed light on the micro-level information of "who infects whom." Our work quantifies the infection ability of individual hosts and reveals the key characteristics of the underlying topologies formed by worm infection, i.e., the number of children and the generation of the Internet worm infection family tree. Specifically, we first analyze the infection tree of a wide class of worms, for which a new victim is compromised by each existing infected host with equal probability. We find that the number of children has asymptotically a geometric distribution with parameter 0.5. We also discover that the generation follows closely a Poisson distribution and the average path length of the worm infection family tree increases approximately logarithmi...

  2. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  3. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  4. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  5. Internet bad neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane César

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it occur

  6. Sitewide task team report for Internet policy

    Energy Technology Data Exchange (ETDEWEB)

    Aichele, D.R.

    1995-03-01

    The Internet is rapidly becoming the standard for communications, information transfer, and information sharing among U.S. Department of Energy (DOE) organizations. It has long been used by the major laboratories, but is now beginning to be used by headquarters staff to communicate with field offices and contractors and as the access point to DOE`s repositories of information. It will soon become key to efficient conduct of operations. Sites without effective access to the Internet will have to rely on secondary, less effective communications. Therefore, the task team believes it is essential that Hanford become a full participant in utilizing this resource. To make this happen an effective access and delivery infrastructure must be provided to DOE and contractor staff and standard ways of doing business on the Internet are required. Much of the technology exists today for robust electronic interchange of information. The use of this technology needs to be expanded and coordinated throughout the DOE and Hanford contractor community. As the use of Internet within DOE is advancing rapidly, it will become the preferred method for communication and information sharing within 5 years. The conclusion of the Internet Inter-Contractor task team is that the use of the Internet is essential to communicate as well as provide and obtain information and knowledge. The Hanford Site must foster, support, and implement necessary changes to the technology infrastructure to improve user access, maintain security, and assure we are effective participants in the networked community.

  7. The Civil Law Approach of Internet Security:The Personal Information Right in Context of Online Privacy as A Starting Point%网络安全中的民法进路--以网络隐私语境中的个人信息权为起点

    Institute of Scientific and Technical Information of China (English)

    吴才毓

    2015-01-01

    Compared with the right to privacy, personal information right in the Internet context is a new kind of right of personality, which can be established through the provision of personal information protection in Internet Security Law. Protection system of personal information right in our country can be functioned by regulatory agencies and industry self ̄regulation. In the autonomy part, privacy right protection organization and the third party certification body can be independ ̄ent . To realize the establishment of Internet security system, judicial way and man ̄agement way should be combined, and the provision of Judicial Interpretation of In ̄ternet Infringement will make judicial guidance identity card system on line come true. The existing rule of “Notice, Delete” can be transformed into the rule of“Notice, Delete, Counter Notice, Notification”, so that the Internet service pro ̄vider shall not permanently delete the information requirements by users, but to wait for the notice period in order to balancing the business operation autonomy of the Internet providers and users’ right to publish the information and the copyright, so as to predict the consequences of Internet service provider after receiving the no ̄tification.%与隐私权相较,个人信息权是一种网络环境中的新兴人格权,可以经由《网络安全法》个人信息保护方面的条文确立。我国可以采用机构监管与行业自律相结合的模式保障个人信息权。自律模式部分,网络隐私权保护组织以及第三方认证机构可以逐步独立。我国应当以司法途径与管理途径相结合的方式实现网络安全,在线上身份证制度的构建上,应由《网络侵权司法解释》作出司法导向。现有的“通知—删除”规则可以改制为“通知—删除—反通知—恢复”规则,网络服务提供商并不应网民的要求永久性删除信息,而是需要等待反通知期间

  8. Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types

    Science.gov (United States)

    Grossklags, Jens

    2009-01-01

    Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…

  9. A security architecture for health information networks.

    Science.gov (United States)

    Kailar, Rajashekar; Muralidhar, Vinod

    2007-10-11

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.

  10. l'Internet Society

    CERN Multimedia

    CERN

    1997-01-01

    Conference of Vinton "Vint" Gray Cerf in the Intercontinental Hostel. Vinton Gray Cerf (born June 23, 1943) is an American computer scientist who is commonly referred to as one of the "founding fathers of the Internet" for his key technical and managerial role, together with Bob Kahn, in the creation of the Internet and the TCP/IP protocols which it uses. He was also a co-founder (in 1992) of the Internet Society (ISOC) which is intended to both promote the views of ordinary users of the Internet, and also serve as an umbrella body for the technical groups developing the Internet (such as the Internet Engineering Task Force). He served as the first president of the Internet Society from 1992-1995.

  11. Digital communication communication, multimedia, security

    CERN Document Server

    Meinel, Christoph

    2014-01-01

    The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities in

  12. Securing the Domain Name System

    OpenAIRE

    Massey, Daniel; Denning, Dorothy E.

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.1109/MSP.2009.121 The Domain Name System (DNS) is a critical part of the Internet infrastructure. Virtually every Internet application depends on some form of DNS data, yet access to and the reliability of that data aren't assured. DNS attacks and abuses, meanwhile, are increasingly common and sophisticated. Part of the problem is that security wasn't a major goal of the original DNS design. The DNS community has...

  13. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  14. Application of Steganography for Anonymity through the Internet

    CERN Document Server

    Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

  15. Design and Implementation of Campus Security System Based on Internet of Things Technology%基于物联网的校园安防系统的设计与实现

    Institute of Scientific and Technical Information of China (English)

    傅饶; 罗宇; 岳淼

    2014-01-01

    针对目前校园安全事件增多和传统安防系统不能满足当前安全需求的问题,提出了将物联网技术应用于校园安防系统之中。探讨了智慧校园的概念和特点以及物联网中的关键技术,设计了包含RFID校园门禁系统等多个子系统的整体化校园安防系统。%According to the security incidents on campus increase and traditional security can’t meet the current safety requirements, the application based on the IOT technology in the campus security system is proposed. The article discusses the concept and features of the smart campus, and the design of integrative campus security system includes RIED application system, etc.

  16. Value of the internet in emergency response.

    Energy Technology Data Exchange (ETDEWEB)

    Herzenberg, C. L.; Newsom, D. E.; Swietlik, C. E.

    1999-05-26

    Can the Internet be of value in emergency response? The answer is yes, judging by its use in the Kobe earthquake in Japan in 1995, ice storms in the US and Canada in 1998, and other disasters. Current and future areas of application are numerous, including exchanging messages, documents, and data files via e-mail; accessing operational data on-line; visualizing events via photos and maps; providing backup communications in lieu of broadcast media, exchanging information between crisis managers and responders; and providing information to media and the public. However, the Internet has some drawbacks, such as hardware/software requirements, computer literacy requirements, traffic jams, dependence on power and communication networks, and risks to information integrity and security. This paper examines some of the advantages, drawbacks, concerns, and potential uses of the Internet for emergency response.

  17. Internet Banking in Paki stan: Finding Complexities

    Directory of Open Access Journals (Sweden)

    Mohammed Ather Akhlaq

    2011-04-01

    Full Text Available Technology is evolving every new day and has its impact on every thing. In this paper we will analyze the acceptance of technology in the Banking Industry of Pakis t a n. This res earch investigates complexities (factors that have resisted or obstructed the adoption of Internet Banking in Pakistan. Traditional innovation diffusion model (IDT is used to develop the research model indicating the proposed complexities and acceptance of Internet Banking among Pakistani users. T he model is tested with a survey sample (n=45. Out of the nine complexities identi fied, six are found significant. The findings of the research signify that 67 % of the proposed complexities, Familiarity with the technology, Concerns for Download Speed, Unfriendly Website Design, Fear of Government tracking transactions, Security and People Gaining Access/Misusing, hinder the users in accepting and adopting internet banking technology in Pakistan

  18. Research on the Wireless Sensor Network Security Based on the Internet of Things%基于物联网的无线传感器网络安全性研究

    Institute of Scientific and Technical Information of China (English)

    廖忠智

    2012-01-01

    The sensor network nodes are deployed in harsh environments, with the environmental condi- tions, subject to resource constraints caused by many types of security threats or attacks. There- fore, the number of unsolved security issues of wireless sensor networks is still one of the most popular research topics, and secure communication between sensor nodes is a fundamental challenge to the security services for wireless sensor networks. Analyzes the security issues of wireless sensor networks and in different types of attacks the WSN layered architecture, defen- sive measures and future research directions.%传感器网络是物联网的一种应用,传感器网络的节点部署在恶劣的环境中,随着受资源约束的环境条件引起了许多类型的安全威胁或攻击。许多未解决的无线传感器网络的安全问题仍是目前最热门的研究课题之一,传感器节点之间的安全通信对无线传感器网络的安全服务提出一个根本性的挑战。分析基于物联网的无线传感器网络的安全问题和在不同的WSN分层体系结构的攻击类型,给出防御措施以及未来研究的主要方向。

  19. Authentication Systems in Internet of Things

    Directory of Open Access Journals (Sweden)

    Tuhin Borgohain

    2015-01-01

    Full Text Available This paper analyzes the various authentication systems implemented for enhanced security and private reposition of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.

  20. Securing the Digital Economy

    Directory of Open Access Journals (Sweden)

    Valentin P. MĂZĂREANU

    2010-01-01

    Full Text Available The Digital economy has naturally led to thereconfiguration of communication and information processes.These processes are depending on the computer, starting fromthe personal one and reaching to computer networks, whetherlocal, metropolitan or global. These led to the development ofsuch information systems able to communicate information,systems that must also ensure the security of communicationsbetween computers within the company, but also betweencomputers of different parties, outside the company. As thecommunication between computers in the network has evolvedto electronic funds transfer (EFT, digital money andcommunication of personal data, internet banking, etc., theimportance of security issues of data transmitted over thenetwork also has increased. Even more as the network hasevolved into a “wireless” one.

  1. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José

    2004-01-01

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  2. On the Module of Internet Banking System

    CERN Document Server

    Alanazi, Hamdan O; Hmood, Ali K; Zaidan, M A; Al-Nabhani, Yahya

    2010-01-01

    Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days. The success of the business depends on its flexibility, availability and security. Since that the web-based systems should have a special way to design the system and implement it. Nowadays, the Internet Banking System widely used and the banks looking to provide the best quality system with highly available, fast response, secure and safe to use. The Unified Modelling Language (UML) is the uniquely language which is used to analyse and design any system. In this paper, the UML diagrams has been proposed to illustrate the design phase for any banking system. The authors, presented two types of architecture which is u...

  3. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  4. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  5. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  6. Temporal Comparisons of Internet Topology

    Science.gov (United States)

    2014-06-01

    Mean Time IANA Internet Assigned Numbers Authority IP Internet Protocol IPv4 Internet Protocol version 4 IPv6 Internet Protocol version 6 IQR...technological revolutions. With the proliferation of mobile computing across the globe, the Internet serves as a medium of interaction without...networks supporting Internet Protocol version 4 (IPv4) and Internet Protocol version 6 ( IPv6 ). The scamper tool is part of the Ark infrastructure of

  7. Exploration and Practice of Information Security for Industrial 4th in the "Internet +" Era%“互联网+”时代的“工业4.0”信息安全探索与实践

    Institute of Scientific and Technical Information of China (English)

    王德吉

    2015-01-01

    With the advent of the“Internet +” era, the information security systems for industrial 4.0,such as SCADA, PLC, DCS, are becoming increasingly serious problem. By using the network architecture of control system for industrial 4.0 as an example, this paper introduces the defense-in-depth strategy of the industrial control network. The industrial control network with inherent security is built, which ensures the safe operation of the control system.%随着“互联网+”时代的到来,以SCADA、DCS、PLC为代表的“工业4.0”系统面临的信息安全问题日益严重。结合“工业4.0”控制系统的网络架构,介绍了“工业4.0”控制系统信息安全的纵深防御策略,建立了一个“本质安全”的工业控制网,从而解决了困扰各企业的控制系统信息安全隐患,保证了企业各装置控制系统的安全平稳运行。

  8. Guest Editorial Special Issue on Information Security

    Institute of Scientific and Technical Information of China (English)

    Chin-Chen Chang; Chia-Chen Lin

    2011-01-01

    The Internet is a popular channel for allowing more and more users to exchange information without geographical limitations and time restrictions.Therefore,a large amount of digital data,such as digital images,text,audio,and video,is transmitted over the Internet.Unfortunately,sensitive digital data can be intercepted by malicious users of the Intemet,so the development of techniques for ensuring the secrecy and security of data during transmission has become a top priority.

  9. Information security improving blocklist driven firewall implementation

    OpenAIRE

    2013-01-01

    The Internet has become a commodity and with it information security and privacy issues have appeared. Common threats against the end users include malware and phishing. Phishing is a social engineering technique used to mimic legit banking or social networking websites in an attempt to gain sensitive information from the user and malware is software with malicious intent. An Internet firewall is an essential component of a modern computer network and it is used to impleme...

  10. Research of internet worm warning system based on system identification

    Institute of Scientific and Technical Information of China (English)

    Tao ZHOU; Guanzhong DAI; Huimin YE

    2006-01-01

    The frequent explosion of Internet worms has been one of the most serious problems in cyberspace security.In this paper, by analyzing the worm's propagation model, we propose a new worm warning system based on the method of system identification, and use recursive least squares algorithm to estimate the worm's infection rate. The simulation result shows the method we adopted is an efficient way to conduct Internet worm warning.

  11. Software Development Kit for Internet Payment Gateway Service

    OpenAIRE

    Larjomaa, Jonni

    2016-01-01

    In this thesis a Software Development Kit (SDK) was developed which simplifies the integration work of an Internet payment gateway service called the Payment Highway to a PHP based electronic commerce solution. The Payment Highway is an Internet payment gateway solution developed by a software company called Solinor Oy. The payment gateway acts as middleware for authorizations, credit and debit transactions securely storing and handling the consumers’ credit card information. PHP is a...

  12. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  13. Collective Study On Security Threats In VOIP Networks

    National Research Council Canada - National Science Library

    Muhammad Zulkifl Hasan; Muhammad Zunnurain Hussain

    2015-01-01

    The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors...

  14. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  15. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  16. DNS and the Internet of Things : Outlining the challenges faced by DNS in the Internet of Things

    OpenAIRE

    Hamzic, Almira; Olofsson, Isabel

    2016-01-01

    This thesis work consists of a literature study where different aspects of DNS and the Internet of Things have been researched. A functional naming and service identification method is an essential part in making the IoT global, and DNS is the current method of naming devices on the Internet. The study looks into some challenges DNS will encounter, namely functionality, security and availability. This report concludes that a multicast DNS (mDNS) based solution designed for constrained network...

  17. Software Security Rules: SDLC Perspective

    Directory of Open Access Journals (Sweden)

    S. K. Pandey

    2009-10-01

    Full Text Available Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email & e-greetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of people’s trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, ‘right from the beginning’. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are eliminated in the software and a more secure software can be built.

  18. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  19. [To define internet addiction].

    Science.gov (United States)

    Tonioni, Federico

    2013-01-01

    Internet addiction is a new behavioral disorder difficult to define, especially when referring to young teenagers who make great use of web-mediated relationships. It's necessary to separate the cases of overt dependency on those in which the abuse of internet seems to have a different value, offering the only way to achieve the possible relationship. Internet is mediating a new way of communicating and thinking, this may favor the onset of clinical phenomena intended to surprise.

  20. Countering Internet Extremism

    Science.gov (United States)

    2009-01-01

    literally examine hundreds of books and speeches. Since the purpose of this work is examining ways to counter an extremist’s Internet use of the...provide differing perspectives on how to counter extremist Internet use . A 2008 New York Times article indirectly offers some methods. Writers Eric...or scholars have the most potential to effectively counter extremist Internet use . Such efforts could help to stifle some of the issues that

  1. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  2. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  3. Recent Progress in Data Engineering and Internet Technology Volume 1

    CERN Document Server

    Gaol, Ford Lumban

    2013-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  4. Darknet-Based Inference of Internet Worm Temporal Characteristics

    CERN Document Server

    Wang, Qian; Chen, Chao

    2010-01-01

    Internet worm attacks pose a significant threat to network security and management. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms from the observations of Darknet or network telescopes that monitor a routable but unused IP address space. Under the framework of Internet worm tomography, we attempt to infer Internet worm temporal behaviors, i.e., the host infection time and the worm infection sequence, and thus pinpoint patient zero or initially infected hosts. Specifically, we introduce statistical estimation techniques and propose method of moments, maximum likelihood, and linear regression estimators. We show analytically and empirically that our proposed estimators can better infer worm temporal characteristics than a naive estimator that has been used in the previous work. We also demonstrate that our estimators can be applied to worms using different scanning strategies such as random scanning and localized scanning.

  5. Recent Progress in Data Engineering and Internet Technology Volume 2

    CERN Document Server

    Gaol, Ford Lumban

    2012-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  6. Internet Banking System Prototype

    CERN Document Server

    Alnaqeib, Rami; Jalab, Hamid A; Zaidan, M A; Hmood, Ali K

    2010-01-01

    Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.

  7. GOOSE: semantic search on internet connected sensors

    Science.gov (United States)

    Schutte, Klamer; Bomhof, Freek; Burghouts, Gertjan; van Diggelen, Jurriaan; Hiemstra, Peter; van't Hof, Jaap; Kraaij, Wessel; Pasman, Huib; Smith, Arthur; Versloot, Corne; de Wit, Joost

    2013-05-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mission execution. Smart access to all sensor data acts as enabler for questions such as "Is there a person behind this building" or "Alert me when a vehicle approaches". The GOOSE concept has the ambition to provide the capability to search semantically for any relevant information within "all" (including imaging) sensor streams in the entire Internet of sensors. This is similar to the capability provided by presently available Internet search engines which enable the retrieval of information on "all" web pages on the Internet. In line with current Internet search engines any indexing services shall be utilized cross-domain. The two main challenge for GOOSE is the Semantic Gap and Scalability. The GOOSE architecture consists of five elements: (1) an online extraction of primitives on each sensor stream; (2) an indexing and search mechanism for these primitives; (3) a ontology based semantic matching module; (4) a top-down hypothesis verification mechanism and (5) a controlling man-machine interface. This paper reports on the initial GOOSE demonstrator, which consists of the MES multimedia analysis platform and the CORTEX action recognition module. It also provides an outlook into future GOOSE development.

  8. 物联网融合环境食品安全云平台用户模型%Research on User Model of Food Security in Cloud Platform under Internet of Things and Fusion

    Institute of Scientific and Technical Information of China (English)

    王晓明; 张龙昌

    2016-01-01

    为了将食品安全信息化与物联网、三网融合环境、云计算结合,从物联网获取食品安全监管的第一手数据并实现食品安全的实时监管;从互联网和云中存储的数据中获取食品安全监管的以往数据实现对食品安全以往数据的监管、举报与处理等;通过三网融合环境下手机、PC、电视等向用户提供食品安全信息一定程度上打破时空限制为用户提供所需的服务;利用云计算的存储、计算和网络能力提高食品安全信息化的存储信息的能力、计算能力和网络通讯的能力,文中研究了物联网融合环境下的食品安全云平台用户模型。首先分析可以利用的食品安全用户模型研究成果,其次从物联网、融合环境、用户类型等角度研究用户,再次提出对应的用户需求模型和用户模型,最后做出了总结。%To combine the food safety information and the Internet of Things,triple play environment,as well as cloud computing,first-hand data from the Internet of Things for the supervision of food safety is obtained and the real-time regulation of food safety is realized;the original data for the supervision of food safety is obtained in the Internet and the cloud to realize the regulation,reports and processing for previous data;the food safety information is provided for users through mobile phone,PC,TV by triple fusion environment to break the limits of time and space to provide the required services;use of cloud storage,computing and network capacity to improve food safety information’s ability to store,computation and the ability of network communication,the user model for food safety cloud platform in IoT environment is studied. First analysis can be made to research the food safety of the user model. Second,from the Internet of Things,inte-gration environment,and the types of user,the users are researched. Then it puts forward the corresponding user requirement model and

  9. Security and the networked society

    CERN Document Server

    Gregory, Mark

    2013-01-01

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. T

  10. Enhanced Security for Online Exams Using Group Cryptography

    Science.gov (United States)

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  11. Streaming GNSS Data over the Internet

    Science.gov (United States)

    Gebhard, H.; Weber, G.; Dettmering, D.; Groeschel, M.

    2003-04-01

    Due to the increased capacity of the Internet, applications which transfer continuous data-streams by IP-packages, such as Internet Radio or Internet Video-on-Demand, have become well-established services. Growing mobile IP-Networks like GSM, GPRS, EDGE, or UMTS furthermore allow the mobile use of these real-time services. Compared to Multimedia applications, the bandwidth required for streaming GNSS data is relatively small. As a consequence, the global Internet can be used for the real-time collection and exchange of GNSS data, as well as for broadcasting derived differential products. Introducing the real time streaming of GNSS data via Internet as a professional service is demanding with respect to network transparency, network security, program stability, access control, remote administration, scalability and client simplicity. This paper will discuss several possible technical solutions: Unicast vs. IP-Multicast, TCP vs. UDP, Client/Server vs. Client/Server/Splitter technologies. Based on this discussion, a novel HTTP-based technique for streaming GNSS data to mobile clients over the Internet is introduced. It allows simultaneous access of a large number of PDAs, Laptops, or GNSS receivers to a broadcasting host via Mobile IP-Networks. The technique establishes a format called "Networked Transport of RTCM via Internet Protocol" (Ntrip), due to its main application being the dissemination of differential GNSS corrections in the popular RTCM-104 streaming format. Sufficient precision is obtained if data are not older than a few seconds. As the RTCM standard is used worldwide, most GNSS receivers accept it. This paper also focuses on system, implementation, and availability aspects of Ntrip-based differential GNSS services. The Ntrip components (NtripSources, NtripServers, NtripCaster, NtripClients) will be introduced, and software implementations will be described.

  12. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  13. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  14. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  15. Jobs Associated with the Internet.

    Science.gov (United States)

    Steinberg, Gary

    1997-01-01

    Discusses a variety of careers that are related to the Internet: webmaster, web developer, systems administrator, programmer/software developer, customer service representative, and other occupations. Provides a primer on the Internet and a guide to Internet terminology. (JOW)

  16. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  17. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  18. [At the heart of Internet].

    Science.gov (United States)

    Eveillard, P

    1998-03-01

    Internet combines features of both a "coffee shop" and a "very large library". It is different from these two institutions in the innovating approach to information and its communication. The information is obtained by navigators, who recover documents dispersed in the four corners of the World Wide Web. The hypertext links between these documents explain the originality of the Web. They are a permanent invitation to look "somewhere else" to enrich the original site. Electronic messengers facilitate the exchange of information and documents. Room for discussion is available for all in the forums and to a well identified community in the lists of users. Internet is a decentralised and anarchic system. In order not to get lost, the sign posts must be followed. To avoid being a nuisance, there are rules of good conduct. You must not expect too much in order not to be disappointed: absolute security (with the risk of not having access) and perfect adequation of content (because of the risk of the loss of freedom of expression).

  19. NETWORK MANAGEMENT WITH SECURED MOBILE AGENT

    Institute of Scientific and Technical Information of China (English)

    迈克尔; 徐良贤

    2002-01-01

    Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.

  20. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  1. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  2. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  3. Friendships and the Internet

    NARCIS (Netherlands)

    Antheunis, Marjolijn; Berger, Charles; Roloff, Michael

    2016-01-01

    The Internet has effects on how people meet, communicate, and maintain friendships. Internet applications such as social network sites change the way, the frequency with which, and the people with whom individuals keep contact. The current entry describes the sort of friendships that can be distingu

  4. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  5. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...

  6. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  7. Internet and forensic science

    Science.gov (United States)

    Chamakura, Reddy P.

    1997-02-01

    The Internet is a very powerful and inexpensive tool that was created for the free distribution of knowledge and information. The Internet is a learning tool, a research tool, a virtual library without borders and membership requirements, a journal with instant publication, a help desk, and a newspaper/journal with current information. Very soon, when live audio and video transmission is perfected, the Internet also will be a live classroom and everyday conference. Forensic scientists, laboratories and colleges should make use of information already available on the Internet. They also should actively participate and contribute. Very few forensic scientists and laboratories have made their presence felt by setting up their home pages/web pages. But, there is tremendous growth during the past year. Immense benefits from Internet to forensic community are discussed along with the author's personal experience. Creating on-line searchable data bases in all specialties of forensic science is an urgent need. Leading forensic journals should take a lead and create on-line searchable indexes with abstracts. On line electronic publishing, collaborative research/paper publishing or editing is easy, fast, economical and convenient through the use of the Internet. Creation of Internet repositories of unpublished papers is an idea worth looking into. Internet also can be used to give training, re-training or advanced training to students/forensic scientists.

  8. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  9. Measuring internet skills

    NARCIS (Netherlands)

    Deursen, van A.J.A.M.; Dijk, van J.A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed, applie

  10. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  11. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  12. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  13. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    Directory of Open Access Journals (Sweden)

    Sun Qiong

    2013-07-01

    Full Text Available With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed membership-based cloud service provided selection policy. By exploring the prospects of cloud computing in Internet sales, we try to solve the problem of the security of personal information in this channel.

  14. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  15. An Energy Efficient Protocol For The Internet Of Things

    Science.gov (United States)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  16. Change of Address Applications filed via the Internet - FY 2016 (53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2016 onwards for Internet Change of Address. This dataset includes data from the...

  17. Potential applications of the Internet of Things in sustainable rural development in South Africa

    CSIR Research Space (South Africa)

    Dlodlo, N

    2012-05-01

    Full Text Available and skills levels. This paper reports on potential applications of internet of things (IoT) technologies that could contribute to sustainable rural livelihoods. These technologies have been categorised under land and water resource management, food security...

  18. 基于 BP 神经网络的铁路互联网售票系统信息安全评估方法%Approach of Information Security Assessment for Railway Internet Ticketing System based on BP Model of Artificial Neural Network

    Institute of Scientific and Technical Information of China (English)

    姚洪磊; 张彦

    2014-01-01

    杂的互联网售票系统网络,实验数据与实际系统风险评估值基本吻合。%Railway internet ticketing system had replaced the conventional ticket transaction method which was playing an important part in railway transportation production. As a result of the Internet-based character, railway internet ticketing system was facing several levels of security risks and threats such as overt aggressions and virus infections. Once the system was break down, a great negative impact would be brought to the society. Based on the threats referred, scientific methods and tools need to be used to analyze the threats vulnerability of the system; consequences caused by the security incidents should also be evaluated once the accidents occurred. Protection countermeasures and corrective measures against threats should be proposed to control and mitigate information security risks which should bring the threats to an acceptable level. Artificial neural networks (ANN) has intelligent character such as autonomously access knowledge which can better deal with uncertainty and nonlinear problems, and it had been wildly applied in information security risk assessment in many industries. Compared with other ANN, the BP neural network had a good nonlinear mapping ability including self-learning and adaptive capacities. First, using the 3-layer neural network can approximate any nonlinear arbitrary precision continuous functions, making it suitable for solving complex problems. Second, the output can be automatically extracted "Reasonable Rules" between output data during the training process, and the learning content can adaptively memory the rules on the weights in the network. As a result, an evaluation mode was proposed by using artificial neural network based on BP model in view of safety menace of railway internet ticketing system, the major safety menaces of internet ticketing system were used as the training samples; an experiment was conducted by using the trained

  19. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  20. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  1. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  2. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  3. Mathematical and Statistical Opportunities in Cyber Security

    OpenAIRE

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-01-01

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question "What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics?" Our first and most important assumption is that access to real-world data is necessary to understand large...

  4. Restrictions on running IRC (Internet Relay Chat) at CERN

    CERN Multimedia

    2005-01-01

    Due to the large number of computer security incidents at CERN where intruders have used IRC (Internet Relay Chat) software to control computers, IRC connections will be blocked in the CERN firewall from 1st February 2005. Personal use of IRC software is not permitted at CERN. Further details of the restrictions on both personal and professional use of IRC are documented at http://cern.ch/security/IRC.

  5. The Security Policy of Domestic Food Supply Chain based on “Internet of Things”%基于物联网的我国食品供应链安全策略研究

    Institute of Scientific and Technical Information of China (English)

    窦欣

    2012-01-01

    针对事关社会稳定和公众健康的食品安全问题,结合食品供应链的内涵和特性介绍了食品供应链,分析了我国食品供应链存在的安全问题,并进一步分析了物联网对于食品供应链各环节的影响.最后,以物联网为基础,提出了提升食品供应链安全的对策.%Food safety is beneficial to the social and public health. Based on the connotation and characteristics of food supply chain, some problems of the domestic food supply chain are analyzed. This paper discussed how the food supply chain would be influenced by the development of "internet of things" and searched for effective methods and solutions to solve the food safety problems.

  6. Internet addiction and antisocial internet behavior of adolescents.

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  7. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  8. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  9. Essential, Desirable or Optional? Making Distance E-Learning Courses Available to Those without Internet Access

    Science.gov (United States)

    Hancock, Val

    2010-01-01

    The Open University, an open distance learning institution, is increasingly using a Virtual Learning Environment (VLE) that requires internet access. This paper investigates how the move to a VLE has affected one group of students who do not have internet access--offender learners studying in prison. Members of the armed forces and secure hospital…

  10. How does India’s Energy Security Affect her National Security?

    Science.gov (United States)

    2008-12-01

    these are referred to as biogases . Sources of biogas include swamps, marshes, and landfills  as well as sewage sludge and manure by way of anaerobic...security. Abundant literature is available in the form of books, government documents, articles in magazines and journals , and on the internet...intended to carry out research based on available material in books, magazines, journals , government publications and internet sources. In the absence

  11. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  12. Internet and child pornography

    Directory of Open Access Journals (Sweden)

    Seda Çağlar

    2010-04-01

    Full Text Available Nowadays, internet use and access is becoming increasingly common as a great entertainment, communication and educational resource for children as well as for adults. Internet is a perfect environment for children, for exploring the world, learning and having fun. However, access to illegal sites that contain violence and sexuality, and contact dangerous people are among the particular risks for children using the internet. It is a known fact that, internet and developing technology make the production and distribution of child pornography cheaper and easier. There has been consensus on the need of creating a plan and increasing the awareness in the community for the fight against child pornography. Because of the increasing internet use and the risk for children mentioned, nurses got new responsibilities. Nurses have to inform society, especially families and children, about safe internet use. In this review, legal regulations about the fight against child pornography on the internet, the reasons that lay the ground for child pornography and their negative effects on children has been addressed.

  13. Pedophilia on the Internet.

    Science.gov (United States)

    Deirmenjian, John M

    2002-09-01

    The Internet provides adults and children with a medium for professional and personal communication throughout the world. As widespread communication in cyberspace grows exponentially, the potential for Internet-related crimes, such as cyberstalkng, has accelerated. Children are particularly vulnerable to sexual predators, such as pedophiles, on the Internet. This article reports cases of pedophiles who used the information superhighway to exploit child victims. Two models of pedophilia on the Internet are discussed: a trust-based seductive model and a direct sexual model. This article explores the role that mental health professionals may play in the assessment of Internet pedophilia. For example, mental health professionals may provide psychiatric treatment to victims of Internet pedophiles. Psychiatrists may be involved in the evaluation of perpetrators of Internet crimes in a clinical or forensic setting. Governmental agencies, the criminal justice system, school, or the media may request consultations by mental health professionals as part of a multi-disciplinary approach to prevention. Methods of government intervention are discussed.

  14. Hybrid internet access

    Science.gov (United States)

    Arora, Vivek; Baras, John S.; Dillon, Douglas; Falk, Aaron; Suphasindhu, Narin

    1995-01-01

    Access to the Internet is either too slow (dial-up SLIP) or too expensive (switched 56 kbps, frame relay) for the home user or small enterprise. The Center for Satellite and Hybrid Communication Networks and Hughes Network Systems have collaborated using systems integration principles to develop a prototype of a low-cost hybrid (dial-up and satellite) newtork terminal which can deliver data from the Internet to the user at rates up to 160 kbps. An asymmetric TCP/IP connection is used breaking the network link into two physical channels: a terrestrial dial-up for carrying data from the terminal into the Internet and a receive-only satellite link carrying IP packets from the Internet to the user. With a goal of supporting bandwidth hungry Internet applications such as Mosaic, Gopher, and FTP, this system has been designed to support any Intel 80386/486 PC, any commercial TCP/IP package, any unmodified host on the Internet, and any of the routers, etc., within the Internet. The design exploits the following three observations: 1) satellites are able to offer high bandwidth connections to a large geographical area, 2) a receive-only VSAT is cheap to manufacture and easier to install than one which can also transmit, and 3) most computer users, especially those in a home environment, will want to consume much more information than they generate. IP encapsulation, or tunneling, issued to manipulate the TCP/IP protocols to route packets asymmetrically.

  15. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  16. Ultrabroadband photonic internet: safety aspects

    Science.gov (United States)

    Kalicki, Arkadiusz; Romaniuk, Ryszard

    2008-11-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  18. Practical Computer Security through Cryptography

    Science.gov (United States)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  19. NTRIP: Networked Transport of RTCM via Internet Protocol - Internet Radio Technology for Real-Time GNSS Purposes

    Science.gov (United States)

    Gebhard, H.; Weber, G.

    2003-12-01

    The massive worldwide growing of Internet capacity enables the introduction of new services such as Internet Radio or Internet Video-on-Demand, which transfer continuous data-streams by IP-packages. These services include the data transport via mobile IP-Networks like GSM, GPRS, EDGE, and UMTS where costs are nowadays rapidly decreasing. As a consequence, the global Internet can be used for the real-time collection and exchange of GNSS data, as well as for broadcasting derived differential products. Compared to Multimedia applications, the bandwidth required for streaming GNSS data is relatively small. The introduction of a real time streaming of GNSS data via Internet as a professional service is demanding with respect to network transparency, network security, program stability, access control, remote administration, scalability and client simplicity. This paper will discuss several possible technical/protocol solutions for streaming GNSS date over the Internet: Unicast vs. IP-Multicast, TCP vs. UDP, Client/Server vs. Client/Server/Splitter architecture. Based on this discussion, a novel HTTP-based technique for streaming GNSS data to mobile clients over the Internet is introduced. It allows simultaneous access of a large number of PDAs, Laptops, or GNSS receivers to a broadcasting host via Mobile IP-Networks. The technique establishes a format called "Networked Transport of RTCM via Internet Protocol" (NTRIP). NTRIP is designed for disseminating differential correction data (e.g. in the RTCM-104 format) or other kinds of GNSS streaming data.

  20. Patients' attitudes toward internet cancer support groups.

    Science.gov (United States)

    Im, Eun-Ok; Chee, Wonshik; Lim, Hyun-Ju; Liu, Yi; Guevara, Enrique; Kim, Kyung Suk

    2007-05-01

    To explore patients' attitudes toward Internet cancer support groups (ICSGs) through an online forum. Qualitative study using a feminist perspective. Internet and real settings. 16 patients with cancer. An online forum was held for one month with six discussion topics. The data were analyzed using thematic analysis. Attitudes toward ICSGs. Through the data-analysis process, four themes were found related to patients' attitudes toward ICSGs. First, the participants universalized patients' needs for and attitudes toward ICSGs. Second, most of the participants wanted to use ICSGs for emotional support, information, and interactions. Third, many of the participants used ICSGs because they could reach out to other patients with cancer without traveling and without interrupting their busy schedules. Finally, many participants were concerned about the security of interactions on ICSGs, so they wanted ICSGs that could ensure privacy and safeguard the anonymity and confidentiality of what they shared online. Patients view ICSGs positively. Additional studies should examine gender-specific and multilanguage ICSGs by recruiting more ethnic minority patients. Despite concerns about the security of Internet interactions, ICSGs would be an excellent source of social support that is acceptable to patients with cancer.