WorldWideScience

Sample records for security defense-in-depth strategies

  1. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  2. Control Systems Cyber Security: Defense-in-Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  3. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  4. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-02-07

    ... information assurance (IA).\\1\\ Today's highly networked computing environments, however, have significantly... time, it became evident that Defense-in-Depth failed to provide information assurance against all but.... \\1\\ Defense-in-Depth: A practical strategy for achieving Information Assurance in today's highly...

  5. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-01-12

    ...) in order to achieve robust information assurance (IA).\\1\\ Today's highly networked computing... information assurance against all but the most elementary threats, in the process putting at risk mission... lifecycle of an attack. \\1\\ Defense-in-depth: A practical strategy for achieving Information Assurance in...

  6. Next Generation Nuclear Plant Defense-in-Depth Approach

    Energy Technology Data Exchange (ETDEWEB)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  7. Defense in Depth: Foundation for Secure and Resilient IT Enterprises

    Science.gov (United States)

    2006-09-01

    if a breach or attack occurs. Implementing effective methods for advertising and distributing policy to users is critical for awareness and...Uses Level 0 (striping) Any application which requires very high speed storage, but does not need redundancy. Photoshop temporary files are a

  8. Evolution of System Safety at NASA as Related to Defense-in-Depth

    Science.gov (United States)

    Dezfuli, Homayoon

    2015-01-01

    Presentation given at the Defense-in-Depth Inter-Agency Workshop on August 26, 2015 in Rockville, MD by Homayoon Dezfuli. The presentation addresses the evolution of system safety at NASA as related to Defense-in-Depth.

  9. Defense-in-depth approach against a beyond design basis event

    Energy Technology Data Exchange (ETDEWEB)

    Hoang, H., E-mail: Hoa.hoang@ge.com [GE Hitachi Nuclear Energy, 1989 Little Orchard St., 95125 San Jose, California (United States)

    2013-10-15

    The US industry, with the approval of the Nuclear Regulatory Commission, is promoting an approach to add diverse and flexible mitigation strategies, or Flex, that will increase the defense-in-depth capability for the nuclear power plants in the event of beyond design basis event, such as at the Fukushima Dai-ichi station. The objective of Flex is to establish and indefinite coping capability to prevent damage to the fuel in the core and spent fuel pool, and to maintain the containment function by utilizing installed equipment, on-site portable equipment and pre-staged off-site resources. This capability will address both an extended loss of all Ac power and a loss of ultimate heat sink which could arise following a design basis event with additional failures, and conditions from a beyond design basis event. (author)

  10. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    Science.gov (United States)

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  11. Port Security Strategy 2012

    Science.gov (United States)

    2007-06-15

    incidents and events. The cognitive thinking and behavior of humans could be influenced by psychological operation. The emotions, motives, objective...to emulate dolphin sonar and incorporate search strategies that are specifically effective in the noisy near-shore environment. This is to emulate...Animals can be also trained to aid port security on different dimensions. Trained sea lions and dolphins are able to locate underwater divers

  12. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  13. Configuration of Risk Monitor System by PLant Defense-In.Depth Monitor and Relability Monitor

    DEFF Research Database (Denmark)

    Yoshikawa, Hidekazu; Lind, Morten; Yang, Ming

    2012-01-01

    A new method of risk monitor system of a nuclear power plant has been proposed from the aspect by what degree of safety functions incorporated in the plant system is maintained by multiple barriers of defense-in-depth (DiD). Wherein, the central idea is plant DiD risk monitor and reliability...... monitor derived from the four aspects of (i) design principle of nuclear safety to realize DiD concept, (ii) definition of risk and risk to be monitored, (iii) severe accident phenomena as major risk, (iv) scheme of risk ranking, and (v) dynamic risk display. In this paper, the overall frame...... of the proposed frame on risk monitor system is summarized and the detailed discussion is made on the definitions of major terminologies of risk, risk ranking, anatomy of fault occurrence, two-layer configuration of risk monitor, how to configure individual elements of plant DiD risk monitor and its example...

  14. "Defense-in-Depth" Laser Safety and the National Ignition Facility

    Energy Technology Data Exchange (ETDEWEB)

    King, J J

    2010-12-02

    The National Ignition Facility (NIF) is the largest and most energetic laser in the world contained in a complex the size of a football stadium. From the initial laser pulse, provided by telecommunication style infrared nanoJoule pulsed lasers, to the final 192 laser beams (1.8 Mega Joules total energy in the ultraviolet) converging on a target the size of a pencil eraser, laser safety is of paramount concern. In addition to this, there are numerous high-powered (Class 3B and 4) diagnostic lasers in use that can potentially send their laser radiation travelling throughout the facility. With individual beam paths of up to 1500 meters and a workforce of more than one thousand, the potential for exposure is significant. Simple laser safety practices utilized in typical laser labs just don't apply. To mitigate these hazards, NIF incorporates a multi layered approach to laser safety or 'Defense in Depth.' Most typical high-powered laser operations are contained and controlled within a single room using relatively simplistic controls to protect both the worker and the public. Laser workers are trained, use a standard operating procedure, and are required to wear Personal Protective Equipment (PPE) such as Laser Protective Eyewear (LPE) if the system is not fully enclosed. Non-workers are protected by means of posting the room with a warning sign and a flashing light. In the best of cases, a Safety Interlock System (SIS) will be employed which will 'safe' the laser in the case of unauthorized access. This type of laser operation is relatively easy to employ and manage. As the operation becomes more complex, higher levels of control are required to ensure personnel safety. Examples requiring enhanced controls are outdoor and multi-room laser operations. At the NIF there are 192 beam lines and numerous other Class 4 diagnostic lasers that can potentially deliver their hazardous energy to locations far from the laser source. This presents a serious

  15. National Security Strategy

    Science.gov (United States)

    2015-02-01

    interests demand it: when our people are threatened; when our livelihoods are at stake; and when the security of our allies is in danger. In these...partners as well as the importance of competitive energy markets. Therefore, we must promote diversification of energy fuels, sources, and routes, as

  16. Pure National Security Strategy

    Science.gov (United States)

    2011-06-01

    Century. The concept came via Latin from Greek : stratēgēma, from stratēgein which means to ’be a general’ and from stratēgos, 11 which...of this tendency with von Clausetwitz. von Clausewitz is acutely aware of that war may take on a life on its own. He writes ―Its grammar indeed...takes on a grammar wholly consistent by military strategy, to use one of Clausewitz constructs. The study of the subject of strategy merits the

  17. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  18. Regulatory point of view on defense in depth approach to fire protection in nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Rinta-Filppula, Samu; Lehto, Matti; Vaelikangas, Pekka [Radiation and Nuclear Safety Authority STUK, Helsinki (Finland)

    2015-12-15

    The defense-in-depth (DiD) principle is a relatively new approach to fire protection design, even though DiD has been used in nuclear power plant (NPP) safety evaluation and design for decades (IAEA 75-INSAG-3, Rev. 1/INSAG-12). It is the main design criterion in fire protection in the latest edition of Finnish Radiation and Nuclear Safety Authority (STUK) issued guide YVL B.8 for the fire protection in nuclear facilities. The DiD approach to fire protection consists of four levels of defense: preventing the ignition of fires, detecting and extinguishing of ignited fires, preventing fire growth and spreading, confining the fire so that safety functions can be performed irrespective of the effects of the fire. The design of fire protection should take all these levels into account so that fire protection is well balanced and not dependent on a single fire protection factor or level of DiD. Despite being central to the design of fire protection, corresponding evaluations of DiD are done according to more or less unambiguous methods. The main goal of this study is to start the development of such, as much as possible, unambiguous systematic and logical method. First issue then is to build a picture of how fire safety features are executed on different levels of DiD and what is the corresponding safety importance to NPP. The Loviisa NPP was studied as an example case due to a long history of fire safety improvements since commissioning in 1977. The improvements are sorted qualitatively by their means of fire safety impact and level of DiD approach to fire protection and general plant DiD. The correspondence between the two DiD principles is an interesting issue which is discussed in this paper. Finally, Fire PRA is used to determine the safety importance of the improvements. The method proposed for the evaluation of DiD approach to fire protection is a combined ignition root cause analysis - event tree of fire scenario - consequential failure modes and effects analysis

  19. Defense In-Depth Accident Analysis Evaluation of Tritium Facility Bldgs. 232-H, 233-H, and 234-H

    Energy Technology Data Exchange (ETDEWEB)

    Blanchard, A.

    1999-05-10

    'The primary purpose of this report is to document a Defense-in-Depth (DID) accident analysis evaluation for Department of Energy (DOE) Savannah River Site (SRS) Tritium Facility Buildings 232-H, 233-H, and 234-H. The purpose of a DID evaluation is to provide a more realistic view of facility radiological risks to the offsite public than the bounding deterministic analysis documented in the Safety Analysis Report, which credits only Safety Class items in the offsite dose evaluation.'

  20. Kanttekeningen bij de Europese cyber security strategie

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.

    2013-01-01

    In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.

  1. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  2. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  3. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  4. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are (i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, (ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and (iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project.

  5. Security Problems of Communicative Strategies

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available The main directions of safety formation in communication strategies are connected with their adaptation to the conditions of social and psychological variability. Building up a communicative strategy is a versatile process, in which it is necessary to consider a wide spectrum of social and psychological parameters, especially topical in the modern period of social development. Forms of social interactions in schematic formats of contemporary social and economic revolution are reduced, social and functional potentials are depleted, mass society is further differentiating, the pace of historic changes is growing, all this determines the necessity to prepare changes in personality structures to the dynamics of social and fluidity.

  6. Strategies for safeguarding security of mobile computing.

    Science.gov (United States)

    Green, Hays

    2013-02-01

    An effective mobile health strategy should comprise, in the very least, six key steps: Conduct a mobile security risk assessment. Establish policies and procedures. Develop a training program. Implement measures to prevent unauthorized access. Perform a clinical workflow analysis. Establish the organization's approach for responding to a breach.

  7. Austrian Security Strategy: Need For Reformulation Due To Security Developments

    Science.gov (United States)

    2016-02-14

    of tomorrow (multipolarity, inter polarity) and the comprehensive approach to security of the Copenhagen School (prismatic approach to security... interpret , translate) is a theory of the interpretation and understanding of texts. 4. Bundeskanzleramt, Sicherheits- und Verteidigungsdoktrin 2001

  8. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  9. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    National military strategy involves evaluating all elements of power, analyzing their capabilities and limitations, and incorporating these tools into a course of military action to secure political goals...

  10. Drie nationale cyber security strategieën vergeleken

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2011-01-01

    Onafhankelijk van elkaar brachten Frankrijk, Duitsland en Nederland hun nationale cyber security strategieën vrijwel tegelijk uit. De strategieën hebben overeenkomsten, maar tonen ook grote verschillen. De drie landen onderkennen een urgente noodzaak om cyber security aan te pakken, maar hebben

  11. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  12. Some security strategies for smart cards

    Science.gov (United States)

    Ros, F.; Harba, R.

    2007-07-01

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  13. National security transformation: Resilience within national security strategies of great powers in response to global threats

    Directory of Open Access Journals (Sweden)

    Keković Zoran Ć.

    2016-01-01

    Full Text Available Altered nature of security risks and threats created within globalization process new security environment, forcing creators of national security strategies to anticipate the sources of threats and to define appropriate mechanisms for response to different forms of security threats addressed to states and its citizens. The concept of resilience is taken from technical sciences and implemented in the security strategies of great powers as a potential solution for strengthening capacity and system preparedness for responding to threats as well as the rapid recovery, regardless of intelligence analysis and assessment of relevant institutions.

  14. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  15. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  16. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  17. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  18. Improving the United States National Security Strategy: An Informed Public

    National Research Council Canada - National Science Library

    Malackowski, Patrick C

    2005-01-01

    .... This paper discusses the need to have the President build an information and communications strategy that keeps the American public informed and cognizant of the threat to our national security...

  19. National Security Strategy: What About the Environment

    Science.gov (United States)

    2006-02-27

    regional instability. Many international and institutional supplementary tools exist to positively affect the environmental elements of this...resulting from famine and AIDS/HIV in Sub-Saharan Africa. Other less obvious threats include the environmental and health hazards from radioactive...and then create international alliances to cooperate in dealing with them. The environmentally related security issues that need attention are two

  20. Computer Security For Mobile Robots: Attacks And Counter Strategies

    Science.gov (United States)

    Hogge, Sharon M.

    1987-02-01

    The objective of this work is to investigate the security requirements and strategies for intelligent mobile robots, perform tests to determine strengths and weaknesses of test bed platforms, and develop counter strategies to improve security of the test bed platforms. This research will discuss the implications of these results on large scale ongoing efforts in mobile robotics. Potential security threats range from accidental intrusion of the device's hardware or software by untrained personnel to deliberate "spoofing" of sensor suites by unauthorized users or enemies.

  1. Coping Strategies and Household Food Security in Drought-Prone ...

    African Journals Online (AJOL)

    Coping Strategies and Household Food Security in Drought-Prone Areas in Ethiopia: The Case of Lay Gayint District. (2008) found out that the use of different crop varieties; tree planting, soil conservation, early and late planting and irrigation were vital adaptive strategies of the Nile Basin regions of Ethiopia. As shown in ...

  2. Verslag Nationale Cyber Security Strategie 2 : Van bewust naar bekwaam

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    Op 28 oktober 2013 werd de tweede Nationale Cyber Security Strategie (NCSS 2) uitgebracht, twee en een half jaar na de eerste. De strategische focus verschuift van publiek-private samenwerking naar publiek-private participatie en strategische samenwerking. De nieuwe strategie beoogt dat, Nederland

  3. Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

    Directory of Open Access Journals (Sweden)

    Liu Qian

    2017-01-01

    Full Text Available For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel, therefore the security and trusted degree of lightweight virtualization container isolation mechanism is critical for the promotion of lightweight virtualization service. Because the user cannot directly participate in the process of the construction and management of container isolation mechanism, it is difficult for them to establish confidence in the security and trusted degree of container isolation mechanism. Based on the research and analysis of system credible and virtualization isolation mechanism, this paper puts forward a set of lightweight virtualization security isolation strategy mechanism, divides lightweight virtualization container storage address space into several parts, puts forward the definition of lightweight virtualization security isolation, gives the formal description and proof of container security isolation strategy, and combines with related technology to verify the feasibility of lightweight virtualization security isolation strategy mechanism. The mechanism has important guiding significance for cloud services providers to deploy container security isolation.

  4. The Path to a Culturally Relevant National Security Strategy

    Science.gov (United States)

    2008-05-22

    Comparison of Identity Theory with Social Identity Theory.” Social Psychology Quarterly 58, no. 4 (Dec. 1995): 255-269. Homans , George Caspar. The Human...for Analyzing Group Structure, Processes, and Behavior, 49. 39 George Caspar Homans , The Human Group (New York: Harcourt, Brace, 1950), 123...freely and with confidence, in a secure and stable world. One of the most famous instigators of US Security Strategy was George Kennan’s renowned

  5. Computing security strategies in finite horizon repeated Bayesian games

    KAUST Repository

    Lichun Li

    2017-07-10

    This paper studies security strategies in two-player zero-sum repeated Bayesian games with finite horizon. In such games, each player has a private type which is independently chosen according to a publicly known a priori probability. Players\\' types are fixed all through the game. The game is played for finite stages. At every stage, players simultaneously choose their actions which are observed by the public. The one-stage payoff of player 1 (or penalty to player 2) depends on both players types and actions, and is not directly observed by any player. While player 1 aims to maximize the total payoff over the game, player 2 wants to minimize it. This paper provides each player two ways to compute the security strategy, i.e. the optimal strategy in the worst case. First, a security strategy that directly depends on both players\\' history actions is derived by refining the sequence form. Noticing that history action space grows exponentially with respect to the time horizon, this paper further presents a security strategy that depends on player\\'s fixed sized sufficient statistics. The sufficient statistics is shown to consist of the belief on one\\'s own type, the regret on the other player\\'s type, and the stage, and is independent of the other player\\'s strategy.

  6. REASSESSING THE EUROPEAN SECURITY STRATEGY IN AN AGE OF AUSTERITY

    Directory of Open Access Journals (Sweden)

    Ruxandra Laura BOSILCA

    2014-10-01

    Full Text Available The current European Security Strategy was drafted in the strategic context of 2003 and (unsubstantially revised in 2008. More than a decade later, the dramatic changes in the international context have important implications for EU`s strategic position and cast doubt on the relevance of the existing conceptual framework. Despite the efforts of some member states and various scholars, think-tanks and policy-makers advocating for a new strategic document, the much anticipated European Council of December 2013 - a body which could have provided a genuine impetus for such a change - remained silent on the issue. The author herein argues that a reassessment of the Security Strategy is more needed than ever if the EU is to remain a major global actor in times of crisis.

  7. FINANCIAL-ECONOMICAL ENTERPRISE SECURITY STRATEGY FORMING IN THE TERMS OF UNCONFORMITY

    Directory of Open Access Journals (Sweden)

    Galyna Mykhayliv

    2016-03-01

    Full Text Available Theoretical points as for definition of “financial-economical security” have been researched and summing up. The present attitude were analyzed as for the financial-economical enterprise security forming in the terms of unconformity and system attitude necessity stipulated for strategy system management by a financial-economical enterprise security. Keywords: financial-economical enterprise security, strategy management, financial security, economical security, financial stability, economical security, external JEL: M 20

  8. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    Science.gov (United States)

    2016-04-05

    diplomacy and potential military operations during the remainder of the Obama Administration. The section devoted to international security in the...Strategy: From Machiavelli to the Nuclear Age, ed. Peter Paret (Princeton, NJ: Princeton University Press, 1986), p. 3. 12 Chairman of the Joint Chiefs...to realize, and the role that the U.S. intends to play on the world stage. 53 Quadrennial Diplomacy and Development Review (QDDR) In 2010, the

  9. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  10. Maternal Strategies to Access Food Differ by Food Security Status

    Science.gov (United States)

    Gorman, Kathleen S.; McCurdy, Karen; Kisler, Tiffani; Metallinos-Katsaras, Elizabeth

    2016-01-01

    Background Household food insecurity is associated with health and behavior risk. Much less is known about how food insecurity is related to strategies that adults use in accessing food: how and where they shop, use of alternative food sources and their ability to manage resources. Objective To examine how maternal behaviors including shopping, accessing alternative sources of food and managing resources are related to household food security status (HHFSS). Design Cross-sectional study collecting survey data on HHFSS, shopping behaviors, use of alternative food sources and managing resources obtained from low income mothers of preschoolers. Participants 164 low-income mothers of young children (55% Hispanic) from two communities in Rhode Island. Measures HHFSS was measured using ten items from the 18-item Core Food Security Module to assess adult food security. Mothers were surveyed about where, when and how often they shopped; the strategies they use when shopping; their use of alternative sources of food including federal, state and local assistance; and their ability to manage their resources. Statistical analyses Analysis of Variance and Chi-square analyses assessed the associations between demographic variables, shopping, accessing alternative food sources and managing resources, and HHFSS. Multivariate logistic regression assessed the associations between HHFSS and maternal demographic variables, food shopping strategies, alternative sources of food and ability to manage resources. Results Maternal age and language spoken at home were significantly associated with HHFSS; food insecurity was 10% more likely among older mothers (AOR=1.10; 95% CI 1.03-1.17) and 2.5 times more likely among Spanish speaking households (compared to non-Spanish speaking-AOR=3.57; 95% CI 1.25-10.18). Food insecurity was more likely among mothers reporting more informal strategies (AOR=1.98; 95% CI 1.28-3.01, pfood insecurity and provide guidance to minimize the impact on healthy

  11. FINANCIAL-ECONOMICAL ENTERPRISE SECURITY STRATEGY FORMING IN THE TERMS OF UNCONFORMITY

    OpenAIRE

    Galyna Mykhayliv

    2016-01-01

    Theoretical points as for definition of “financial-economical security” have been researched and summing up. The present attitude were analyzed as for the financial-economical enterprise security forming in the terms of unconformity and system attitude necessity stipulated for strategy system management by a financial-economical enterprise security. Keywords: financial-economical enterprise security, strategy management, financial security, economical security, financial stability, economical...

  12. FINANCIAL-ECONOMICAL ENTERPRISE SECURITY STRATEGY FORMING IN THE TERMS OF UNCONFORMITY

    OpenAIRE

    Mykhayliv, Galyna

    2017-01-01

    Theoretical points as for definition of “financial-economical security” have been researched and summing up. The present attitude were analyzed as for the financial-economical enterprise security forming in the terms of unconformity and system attitude necessity stipulated for strategy system management by a financial-economical enterprise security. Keywords: financial-economical enterprise security, strategy management, financial security, economical security, financial stability, economical...

  13. Cyber Security Test Strategy for Non-safety Display System

    Energy Technology Data Exchange (ETDEWEB)

    Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of); Kim, Hee Eun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures.

  14. Assessing information security strategies, tactics, logic and framewortk

    CERN Document Server

    Vladimirov, Andrew; Gavrilenko, Konstantin

    2015-01-01

    Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that

  15. Financial Strategies Moderate Weather Impacts on Food Security Outcomes

    Science.gov (United States)

    Brown, M. E.; Niles, M.

    2016-12-01

    Global food security relies on local agricultural capacity as well as the financial ability to import food from elsewhere. Climate change is likely to affect the ability to grow sufficient food to meet the needs of a growing population in low income countries where population expansion is the greatest. This paper presents an analysis of 2095 household surveys from 12 food insecure countries in West Africa, East Africa and Asia from the Climate Change, Agriculture, and Food Security (CCAFS) program conducted from 2010-2012. Using a multi-level hierarchical random effects model, we estimated the number of months a household was food insecure with information on the rainfall anomaly the year prior to the survey, agricultural input use, cash income, and community group membership. We found that when the rainfall was either one standard deviation above or below the mean, the number of months households experience food insecurity increased by 74%. When there is a significant weather anomaly, agricultural credit and cash income, but not agricultural inputs or social capital, are found to be critical factors reducing food insecurity. This highlights the ongoing and critical importance of risk reduction strategies such as crop insurance, government safety nets, and credit for maintaining food security in the face of climate change.

  16. Maternal Strategies to Access Food Differ by Food Security Status.

    Science.gov (United States)

    Gorman, Kathleen S; McCurdy, Karen; Kisler, Tiffani; Metallinos-Katsaras, Elizabeth

    2017-01-01

    Household food insecurity is associated with health and behavior risk. Much less is known about how food insecurity is related to strategies that adults use in accessing food: how and where they shop, use of alternative food sources, and their ability to manage resources. To examine how maternal behaviors, including shopping, accessing alternative sources of food, and managing resources, are related to household food security status (HHFSS). Cross-sectional study collecting survey data on HHFSS, shopping behaviors, use of alternative food sources, and managing resources obtained from low-income mothers of preschool-aged children. One hundred sixty-four low-income mothers of young children (55% Hispanic) from two communities in Rhode Island. HHFSS was measured using 10 items from the 18-item Core Food Security Module to assess adult food security. Mothers were surveyed about where, when, and how often they shopped; the strategies they use when shopping; their use of alternative sources of food, including federal, state, and local assistance; and their ability to manage their resources. Analysis of variance and χ2 analyses assessed the associations between demographic variables, shopping, accessing alternative food sources, and managing resources, and HHFSS. Multivariate logistic regression assessed the associations between HHFSS and maternal demographic variables, food shopping, strategies, alternative sources of food, and ability to manage resources. Maternal age and language spoken at home were significantly associated with HHFSS; food insecurity was 10% more likely among older mothers (adjusted odds ratio [aOR] 1.10, 95% CI 1.03 to 1.17) and 2.5 times more likely among Spanish-speaking households (compared with non-Spanish speaking [aOR 3.57, 95% CI 1.25 to 10.18]). Food insecurity was more likely among mothers reporting more informal strategies (aOR 1.98, 95% CI 1.28 to 3.01; PCommunity nutrition programs and providers will need to consider these strategies

  17. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy.... ACTION: Notice. Authority: Public Health Service Act, 42 U.S.C. 300hh-1. SUMMARY: To help the Nation achieve national health security and to implement the first quadrennial National Health Security Strategy...

  18. State and urban area homeland security strategy v3.0 : evolving strategic planning

    OpenAIRE

    Chen, Darren

    2006-01-01

    CHDS State/Local This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process, guidance and assistance, and strategy review in collaboration with state and local stakeholders. Federal, state, and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes. Comprehensive, enterprise-wide homeland security strategie...

  19. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  20. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  1. Introduction to security and network forensics

    CERN Document Server

    Buchanan, William J

    2011-01-01

    Introduction to Security ObjectivesThe Industrial and the Information AgeCIA and AAAProtecting against IntrudersUsers, Systems, and DataServices, Role-Based Security, and Cloud ComputingSecurity and Forensic ComputingISO 27002RisksRisk Management/AvoidanceSecurity PoliciesDefi ning the PolicyExample RisksDefense-in-DepthGateways and DMZ (Demilitarized Zones)Layered Model and SecurityEncryption and a Layered Approach to DefenseSoftware Tutorial-Data Packet CaptureOnline ExercisesNetworkSims ExercisesChapter LectureReferencesIntrusion Detection Systems ObjectivesIntroductionTypes of IntrusionAtt

  2. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  3. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  4. Accounting and information support of enterprise economic security strategy formation and implementation

    Directory of Open Access Journals (Sweden)

    O.І. Oliynychuk

    2015-03-01

    Full Text Available The article deals with accounting and information resources of enterprise economic security strategy development and realization. The aim of the article is to ground the role of accounting system in generating of information resources of enterprise economic security strategy with definition of accounting and information providing. The methodology of research was based on the dialectical method, complex system approach of processes studying, the analysis and synthesis methods, the induction and deduction methods and the modeling method. The results of the research describe the allocation of interrelated operating, tactical and strategic management subsystems in company management system. The relations between management and accounting subsystems were demonstrated. The model of formation and implementation of the enterprise economic security strategy was developed. The tasks of the accounting subsystems in the process of development and realization of the enterprise economic security strategy were defined. The accounting and information support of the enterprise economic security strategy generated by each of the accounting subsystems were identified. The ordinary of the research is reasoning of the tasks and definition of accounting subsystems information providing of each enterprise economic security strategy stage according to the developed model. The practical value of the research is the identified accounting and information support of the enterprise economic security strategy provides improvement of strategic planning information base of achievement of high level economic security.

  5. Qualitative Characterization of the Facebook Information Security Strategies

    Directory of Open Access Journals (Sweden)

    LOPES, S. F.

    2015-12-01

    Full Text Available Hyperconnectivity due to online social networks exposed security issues on data stored in these systems. This article presents an analysis on how online social networks designers have been communicating information security aspects through these systems’ interfaces. This analysis was made using the Semiotic Inspection Method on Facebook since it is largely used in Brazil and all over the world. Results showed that there is major concern with security information properties. Nevertheless it was possible to identify interface problems that could compromise use and understanding of such security properties

  6. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  7. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  8. How Nation-States Craft National Security Strategy Documents

    Science.gov (United States)

    2012-10-01

    Security Secretariat (akin to the U.S. National Security Staff or what was previ- ously known as the NSC Staff) component of the Cabi - net Office under...the Cabi - net Office, in addition to the critical addition of the Treasury (Her Majesty’s Treasury [HMT]), as well as the DFID,203 and Departments

  9. Strategies for Security Management in Nigeria: A Roadmap for ...

    African Journals Online (AJOL)

    The security situation in Nigeria has become enormous and embarrassing to government. To tackle insecurity, it is imperative to investigate and identify its sources and causes. This paper isolated and clarified different causes and sources of insecurity in Nigeria. The paper equally suggested two strategic security ...

  10. Semantically Aware Foundation Environment (SAFE) for Clean-Slate Design of Resilient, Adaptive Secure Hosts (CRASH)

    Science.gov (United States)

    2016-02-01

    and application) implementations. In many contemporary machine architectures any breech of intended operation is sufficient to compromise arbitrary...hardware and OS architectures . Security protections must be provided that are robust against individual design faults (using defense-in-depth and... architecture and design principles that were established. This section reviews those decisions and the individual components and tools of the SAFE project are

  11. A Proven Methodology for Developing Secure Software and Applying It to Ground Systems

    Science.gov (United States)

    Bailey, Brandon

    2016-01-01

    Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?

  12. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  13. Document and author promotion strategies in the secure wiki model

    DEFF Research Database (Denmark)

    Lindberg, Kasper; Jensen, Christian D.

    2012-01-01

    , thus determining what other documents that the author can edit. This collaborative filtering mechanism, determines the promotion and demotion of documents and authors in the Secure Wiki Model. The original Secure Wiki Model only considers explicit promotion and demotion of documents, authors...... are implicitly promoted/demoted depending on the promotion/demotion of the documents that they contribute. In this paper, we revisit the question of promotion of documents and authors and propose a new security policy with explicit promotion of authors. This policy also incorporates a new collaborative filtering...

  14. Young people’s everyday securities : pre-emptive and pro-active strategies towards ontological security in Scotland

    OpenAIRE

    Botterill, Kate; Hopkins, Peter; Sanghera, Gurchathen Singh

    2017-01-01

    This work was supported by the Arts and Humanities Research Council [grant number AH/K000594/1]. This paper uses a framework of 'ontological security' to discuss the psychosocial strategies of self-securitisation employed by ethnic and religious minority young people in Scotland. We argue that broad discourses of securitisation are present in the everyday risks and threats that young people encounter. In response and as resistance young people employ pre-emptive and pro-active strategies t...

  15. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  16. Solar Secure Schools: Strategies and Guidelines; October 2004--April 2005

    Energy Technology Data Exchange (ETDEWEB)

    Braun, G. W.; Varadi, P. F.

    2006-01-01

    This report explores the technical and economic aspects of installing solar power (photovoltaic aka PV) systems on schools to improve the schools' energy security and provide power during disasters.

  17. What type of state homeland security strategy should the state of New Jersey develop?

    OpenAIRE

    Rosell, Richard G.

    2007-01-01

    CHDS State/Local The State of New Jersey does not have a written homeland security strategy. This thesis argued that New Jersey should have a strategy. The author has reviewed the reasons why New Jersey does not have a state strategy. Based on preliminary work, any justifications are no longer supportable. Beyond that, the thesis described the elements that should be in that strategy. A by-product of the thesis was a homeland security strategy template that can be used by other states. As ...

  18. Changing the Game: Human Security as Grand Strategy

    Science.gov (United States)

    2014-06-01

    each possessed of its own unique organizational missions, mandates and cultures. The history of the term can be traced to in- terdisciplinary...rise in regional conflict. Recent history is useful to inform what should be the Army position on human security. Iraq is the shining ex- ample for...Vertebrate Zoology , 1907-39.” Social Studies of Science 19, no. 3 (1989): 387-420. 41 34. Glasius, “Human Security from Paradigm Shift to Opera

  19. Global Strategy Choices (GSC) : Prognosis and Strategic Planning for European Foreign and Security Policy

    NARCIS (Netherlands)

    Zwitter, Andrej; Kettle, Lawrence

    2015-01-01

    The European Security Strategy (ESS) is currently being reformulated. This working paper puts forward a new methodological approach in the construction of global strategies for stakeholders in the international system. It makes the case that contemporary strategy formulation (including the ESS)

  20. Energy security for Canada: A comparison of the self-sufficiency and continental strategies

    OpenAIRE

    Rastgardani, Taymaz

    2007-01-01

    While the topic of ‘energy security’ has attracted considerable public attention in recent times, the various issues of relevance have been poorly conceptualized within a policy framework for the Canadian people. Arguably, Canada has lacked an energy security strategy in recent years even as the country’s energy security environment has been rapidly changing. This study takes a strategic view of energy security in the sense that it treats the issue as a matter of national interest. Paradoxica...

  1. Coping Strategy for Food Security among the Elderly in Ogun State ...

    African Journals Online (AJOL)

    In this study, the coping strategies for food security among the elderly in Ogun state, Southwestern Nigeria was investigated. There is little available data on the elderly in Nigeria living in poor environmental conditions and without any social security. Thus a sampling of 310 household for a cross sectional descriptive survey ...

  2. An Alternative National Security Strategy: Elevating the Economic Instrument of National Power

    National Research Council Canada - National Science Library

    Hawkins, Stephen

    1999-01-01

    This research project argues for an integrated approach to National Security. It follows the ends-way-means framework for strategy development, and focuses on our current interests and the threats to those interests...

  3. Physical enhanced security strategy implementation in WDM PON

    Science.gov (United States)

    Bai, K. Kalyani; Ashik T., J.; Kachare, Nitin; Kumar, D. Sriram

    2017-06-01

    The enormous growth in data traffic in optical networks has raised the requirement of broadband access networks. Passive Optical Networks (PON) is capable of solving the power, bandwidth and cost problems. Time Division Multiplexed PON (TDM PON) uses a point to multipoint design which is currently being used for data transmission that initiated the requirement of maintaining customer's security in the downstream direction. These security impairments trigger the need of scrutiny for fault monitoring and eavesdropping in PONs. This paper demonstrates the Wavelength Division Multiplexed PONs (WDM-PON) using scrambling and fault monitoring to provide security which is absent in TDM passive optical networks. Results have been validated at 10 Gbps data rate using OPTISYSTEM12 simulation tool.

  4. A Balanced Force Strategy for the New Security Environment

    Science.gov (United States)

    2004-05-03

    Powerlift – Getting to Desert Storm: Strategic Transportation and Strategy in the New World Order (Westport, Connecticut: Praeger, 1993), 157. 3...Menarchik, Powerlift – Getting to Desert Storm: Strategic Transportation and Strategy in the New World Order (Westport, Connecticut: Praeger, 1993), 157. 5...Praeger, 2003. Menarchik, Douglas. Powerlift – Getting to Desert Storm: Strategic Transportation and Strategy in the New World Order. Westport

  5. Is the Bush Doctrine the Right American National Security Strategy for the Beginning of the 21st Century?

    Science.gov (United States)

    2005-03-18

    USAWC STRATEGY RESEARCH PROJECT IS THE BUSH DOCTRINE THE RIGHT AMERICAN NATIONAL SECURITY STRATEGY FOR THE BEGINNING OF THE 21ST CENTURY? by...TITLE AND SUBTITLE Is The Bush Doctrine the Right American National Security Strategy for the Beginning of the 21st Century? 5a. CONTRACT NUMBER 5b...Beck TITLE: Is The Bush Doctrine The Right American National Security Strategy For The Beginning Of The 21st Century? FORMAT: Strategy Research Project

  6. Agricultural innovations strategies for sustainable food security in ...

    African Journals Online (AJOL)

    Global progress in ensuring food security and reducing poverty has been substantial, but not satisfactory. Significant advancements have been made in reducing hunger through intensifying staple food production, integrating people and the environment, expanding the role of markets, diversifying out of major cereals, ...

  7. Cautious Peace: Strategy and Circumstance in Asia-Pacific Security.

    Science.gov (United States)

    1995-07-01

    half and three-quarters of the illiterate population. High maternal mortality and nutritional neglect of girls in almost all of Asia have contributed to...security policy (more on this under Japan, 82 below). For at least a decade war- gamers of the People’s Liberation Army (PLA) Academy of Military

  8. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  9. National Security Strategy of the United States of America

    Science.gov (United States)

    2017-12-18

    and the reemergence of American leadership . After one year, the world knows that America is prosperous, America is secure, and America is strong. We...dation for U.S. leadership in the world. A strong America is in the vital interests of not only the American people, but also those around the world...become skilled at operating below the thresh- old of military conflict—challenging the United States, our allies, and our partners with hostile actions

  10. Cultural Theory and Acceptance-Based Security Strategies for Humanitarian Aid Workers

    Directory of Open Access Journals (Sweden)

    Adam K. Childs

    2013-01-01

    Full Text Available Humanitarian aid agencies have relied primarily on acceptance as their primary risk, or security, management strategy for well over a decade. Evidence suggests, however, that this strategy has become ineffective, as the number of targeted attacks against humanitarian aid workers has been steadily increasing over the past two decades. Despite the urgency of the situation, aid agencies have struggled to effectively implement new strategies and still rely primarily on acceptance as a mitigating strategy. This article examines the limitations of acceptance as practiced by humanitarian aid agencies as a strategy against targeted attacks and the challenges in adopting new strategies. The article uses Cultural Theory to explain these limitations and challenges and concludes with recommendations based on that theory for a new approach to security strategies that takes into account the social milieu of both aid workers and their potential attackers.

  11. After Iraq: The Search for a Sustainable National Security Strategy

    National Research Council Canada - National Science Library

    Gray, Colin S

    2009-01-01

    ...?" Thus to answer the first question, one has to identify both the policy that strategy must serve as well as the components of that Unfortunately for the convenience and self-confidence of defense...

  12. Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations

    Science.gov (United States)

    2014-08-26

    his family consider Southern California, Texas, South Carolina or any location with Southeastern Conference football as home. 5 Abstract Since...and the attack on the Radio Television of Serbia headquarters in Belgrade on 23 May were both NOBLE ANVIL B-2 missions...April, the air strategy maintained a predominant denial focus but incorporated a supporting punishment strategy.74 On 23 April, Radio Television

  13. USCYBERCOM and Cyber Security: Is a Comprehensive Strategy Possible?

    Science.gov (United States)

    2011-05-12

    Loup Samaan writes, “far from solving the policy concerns surrounding cyber-defense the creation of Cyber Command displays a lack of consensus...Hollis, “USCYBERCOM: The Need for a Combatant Command,” 51. 68 Ibid., 52. 69 Ibid., 49. 70 Jean Loup Samaan, “Cyber Command the Rift in US Strategy... Loup Samaan, ”Beyond the Rift in Cyber Strategy,” Strategic Insights, 10, no.1 (Spring 2011): 11, http://www.nps.edu/Academics/Centers/CCC/Research- Publications/StrategicInsights/index.html (accessed 28 April 2011).

  14. Research on the Network Security Strategy for Digital Distance Education Platform

    Directory of Open Access Journals (Sweden)

    Zhang Minzhu

    2017-01-01

    Full Text Available Distance education has been an important development tendency and learning platform with the emphasis of lifelong learning of the society. Networked learning and teaching is a main characteristic of distance education, which inevitably needs to transmit large magnitude of private data among students, teachers and the education platform. To protect the security of data transmission and storage, a networked security strategy was proposed. The security strategy is based on the technologies of intrusion detection and digital signature. An intrusion detection model was established in accordance to the main tasks of distance education platform. The encryption process of digital signature was illustrated along with the information flow of the distance education platform. The paper offers an effective reference for solving security problems of distance education platforms.

  15. Adaptation strategies to climate change to sustain food security

    NARCIS (Netherlands)

    Droogers, P.; Dam, van J.C.; Hoogeveen, J.; Loeve, R.

    2004-01-01

    This chapter concentrates on the impact of climate change on food and water issues. An overview of global issues and trends is followed by a more in-depth analysis of field-scale impact and adaptation strategies for the seven basins in the ADAPT context

  16. Choices strategy to maintain security of the transportation system

    Directory of Open Access Journals (Sweden)

    А.В. Гончаренко

    2009-02-01

    Full Text Available  Variants of a strategy choosing for a transport system functioning safety support is considered. Mathematical modelling by restriction indexes criteria of reliability, efficiency, and prevention measures costs is conducted. Attention is paid to the influence of unexpected loses due to crash events. Achieved results of applicable researches. Plotted appropriate diagrams.

  17. Brazil’s Security Strategy and Defense Doctrine

    Science.gov (United States)

    2011-01-01

    government agencies. The MOD will now be staffed by its own professional defense bureaucracy...is to bolster internal strategic defense and secu- rity, and intra-Latin American cooperation. INTRODUCTION In September 2007, Brazil’s President Lula ...President. In 2010, President Lula signed executive orders to implement the new strategy (the Projecto Nacional). In that context, The Center for

  18. A security framework for nationwide health information exchange based on telehealth strategy.

    Science.gov (United States)

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  19. Energy Security Strategies: An Analysis of Tanzania and Mozambique

    Science.gov (United States)

    2016-06-01

    Crisis-and-its- Impact -on- the-Business-Environment-EN-04032015.pdf. Cissé, Daouda. Globalisation and Sustainable Africa-China Trade: What Role Play the...depends. In addition to the competition among parties, a factor that can have an impact on strategy choice is the presence of programmatic elites in...of decision makers is expected to have a significant impact on how a government chooses to develop the country’s energy sector. 3. Economic

  20. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    example is the prize idea set forth by Richard Branson and Al Gore for a technology that can remove one billion tons of carbon dioxide from the...private sector is the $25 million prize established by Al Gore and Richard Branson for the develop- ment of a technology to extract at least one...power outages from natural disasters derail our nation. how We Make the strategy Work • Leadership is essential: the next president of the United

  1. PHILOSOPHY OF WAR AND PEACE: IN SEARCH OF NEW EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    O. O. Bazaluk

    2017-12-01

    Full Text Available Introduction. The contemporary European social and cultural landscape feels the pressure of security challenges. It is true, that Europe has a strategy of overcoming the possible challenges, but it has sense to review ones strategy abilities to be effective at the face of new manifestations of aggression. Methodology. The authors use heuristic philosophical methodology which can make mentioned strategy more holistic having clear vision of the essence of war and peace phenomena. The research is going to perform precious conceptualization of the strategy contours initiated at the previous publications of O. Bazaluk. Originality. Authors defined the series “fatal” mistakes of the European Security Strategy and formulated the list of objectives of the revised security strategy. Conclusions. Five key objectives of perspective European Security Strategy were formulated. The first objective should include the complex measures for the identification, registration and organization of the system of preventive work with mentalities, in which the pathologies in the structure and function of the neural ensembles of subconsciousness and consciousness are clearly expressed that refract the active principle (as natural force in aggressive manifestations. The second one should include the complex measures ensuring control over the direction of the physicochemical, predisposing, provoking and supporting factors of the external environment that have a direct impact on the manifestations of a mental space in ontogeny. The third objective should include the complex measures of prediction and solution of international (interstate conflicts. The fourth objective of the security strategy should be aimed at eliminating the cause of war. The fifth objective should provide the complex measures involving the peaceful extension of comfortable conditions for the full realization of its internal creative potentials by a mental space.

  2. An Analysis of the National Security Strategy of the United States of America: Is the Administration Effectively Harnessing International Power?

    National Research Council Canada - National Science Library

    Weston, David C

    2005-01-01

    The National Security Strategy of the United States of America, September 2002, clearly identifies the necessity for pooling international resources, across all elements of power, to achieve national...

  3. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  4. an analysis of yam storage strategy to promote food security in asa

    African Journals Online (AJOL)

    Osondu

    2012-10-17

    Oct 17, 2012 ... Abstract. This study examines the analysis of yam storage strategy to promote food security in Asa Local. Government Area of Kwara State, Nigeria. Data was collected from 110 respondents, using well- structured interviews schedule. The data was analysed using frequency distribution, percentages,.

  5. An Analysis of Yam Storage Strategy to Promote Food Security in ...

    African Journals Online (AJOL)

    This study examines the analysis of yam storage strategy to promote food security in Asa Local Government Area of Kwara State, Nigeria. Data was collected from 110 respondents, using wellstructured interviews schedule. The data was analysed using frequency distribution, percentages, means and probit model to test for ...

  6. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Science.gov (United States)

    2010-04-13

    ... National Institute of Standards and Technology Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart..., Smart Grid Cyber Security Strategy and Requirements. This second draft has been updated to address the... and the requirements section has been revised to include requirements for the entire Smart Grid...

  7. United States security strategy for the East Asia-Pacific region

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-31

    The three years since release of the last East Asia Strategy Report (EASR) have produced important development in the security environment of the Asia-Pacific region. The 1998 EASR outlines a multifaceted regional security strategy, including: maintenance of comprehensive US engagement, including not only the presence of approximately 100,000 US military personnel in Asia but also a variety of other public and private interaction with the region; continued enhancement of the alliance relationships with Japan, Korea, Australia, Thailand and the Philippines; comprehensive engagement with China to build the foundation for a long-term relationship based on cooperation and mutual interest; broadening of cooperation with the nations of Southeast Asia on security and confidence building; expansion of regional cooperation with Russia; support for the development of security pluralism, including expansion of multilateral, minilateral and bilateral dialogue in the region; promotion of democracy; stemming and countering proliferation of weapons of mass destruction (WMD): and increased attention to terrorism, environmental degradation, emerging infectious diseases, drug trafficking and other transnational challenges as critical elements of `comprehensive security.`

  8. Home garden: a potential strategy for food and nutrition security in HIV households : a case study in rural Ghana

    NARCIS (Netherlands)

    Akrofi, S.

    2012-01-01

    Keywords: Home garden, HIV and AIDS, dietary diversity, plant species diversity, coping strategy index, food security, Ghana. The aim of this thesis was to explore how rural households with HIV and AIDS in Ghana are employing home garden management strategies to enhance food and nutrition security

  9. Kajian Strategi Pengamanan Infrastruktur Sumber Daya Informasi Kritis [Study of Critical Information Resources Infrastructure Security Strategy

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2015-06-01

    Full Text Available Infrastruktur informasi kritis merupakan salah satu infrastruktur kritis yang menggabungkan antara infrastruktur telekomunikasi serta jaringan internet yang digunakan dalam pelayanan publik. Dengan demikian, infrastruktur informasi kritis  harus beroperasi dengan aman dan memenuhi aspek keamanan informasi. Kajian ini adalah studi kasus pada infrastruktur informasi kritis sebagai salah satu infrastruktur kritis Nasional yang digunakan dalam pelayanan publik. Adapun infrastruktur informasi kritis yang dijadikan studi kasus adalah pada bidang energi ketenagalistrikan. Tujuan kajian ini adalah memberikan masukan pada kebijakan pengamanan infrastruktur kritis berdasarkan studi kasus yang dilakukan. Kajian ini dilakukan dengan metode gabungan kuantitatif dan kualitatif yang mengkombinasikan hasil penilaian risiko pada obyek riset dengan pendapat pengambil kebijakan, akademisi, pakar dan praktisi. Hasil kajian ini adalah masukan untuk kebijakan dan kerangka kerja pengamanan infrastruktur kritis khususnya sector TIK. *****Critical information infrastructure is one of the critical infrastructure that combines telecommunications infrastructure and Internet networks used in the public service. Thus, the critical information infrastructure must operate safely and meet the aspects of information security. This study is a case study on critical information infrastructure as one of the critical national infrastructure used in public service. The critical information infrastructure which is used as a case study is in the field of electricity energy. The purpose of this sudy is to provide input on critical infrastructure security policy based on case studies conducted. This study was conducted with the combined quantitative and qualitative method that combines the results of the risk assessment on the research object with the opinion of policy makers, academics, experts and practitioners. These results are input to the policy framework and securing critical

  10. The International Criminal Court as a Component of U.S. National Security Strategy

    Science.gov (United States)

    2012-04-21

    determining if U.S. accession is advisable, and recommend potential actions to progress toward it. 15. SUBJECT TERMS Lawfare , Contractor, ASPA...Security Strategy FORMAT: Civilian Research Project DATE: 21 April 2012 WORD COUNT: 11,629 PAGES: 46 KEY TERMS: Lawfare , Contractor...through the ICC. The U.S. tries to avoid scenarios where membership in the ICC gives a non-U.S. party an avenue of “ lawfare ” against the United States

  11. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    modeling and simulation tools, leveraging existing commercial innovations and technologies, and using open system architectures , frameworks, and... landscape of national security technology concerns in the 21st century. The Strategy is informed by the central premise of the President’s 2015 National...opportunities of the 21st century, there is significant diversity of statutory mission authorities, and structural models and operational authorities, among

  12. What is strategy? The concept and model for its application in the Czech security strategy

    Directory of Open Access Journals (Sweden)

    Jan Ludvík

    2011-06-01

    Full Text Available The article conceptually explains the notion of strategy. Drawing on its understanding by well-established authorities like Carl von Clausewitz, Basil Liddel Hart, André Beaufre, or Colin Gray, the authors discuss strengths and weaknesses of various views. Furthermore, the article employs Arthur Lykke’s definition of strategy to demonstrate various conceptual requirements. Strategy is thus perceived as the relationship among means, ends, and ways. Crucial implications for a development of the Czech strategic documents are further examined. The article argues that, the vital importance of coherent interconnection of all the afore-mentioned parts of the strategy has been so far neglected in this process. It is suggested that particular attention should be paid to the clear formulation of a goal, which is the prerequisite for any meaningful strategy. However, any goals must be developed with the close relation to the available or potentially attainable resources, and purposeful ways how to employ them. The whole process is best described as the hermeneutic circle.

  13. US National Security Strategy and preemption; Le concept de preemption dans la strategie de securite nationale des Etats-Unis

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, H.M. [Federation of American Scientists, Washington, D.C. (United States)

    2006-07-15

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  14. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  15. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  16. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  17. Development of the Croatian National Security Strategy in the Hybrid Threats Context

    Directory of Open Access Journals (Sweden)

    Smiljanic Drazen

    2017-11-01

    Full Text Available The development of the new National Security Strategy (NSS of the Republic of Croatia, begun in November 2016, takes place in a radically different security environment compared to the first (and current Croatian NSS published in 2002. This paper aims to provide incentives for potential adaptations to the approach and methodology used in Croatia’s NSS development, particularly in relation to hybrid warfare. Assuming that the hybrid adversary tends heavily to exploit the vulnerabilities of the targeted state and society, the paper addresses some of Croatia’s widely recognized weaknesses that should be taken into consideration in a threat assessment. As a conclusion, the paper proposes some recommendations, including the concept of societal resilience, related to ways to counter hybrid threats.

  18. Breaking the Code for Operational Planners: A Comparative Analysis of National Security Strategies Since the End of the Cold War

    Science.gov (United States)

    2007-04-04

    them; worship as they please; educate their children—male and female; own property; and enjoy the benefits of their labor . These values of freedom...President, National Security Strategy of the United States, (March 1990), 1. 10 Ibid., 21. 50 infrastructures, labor and social disruptions, and... Mercado , Leo A., The National Security Strategy and National Interests, Quantity or Quality? Thesis (Carlisle Barracks: United States Army War College

  19. U.S. National Security and Military Strategies A Selected Bibliography

    Science.gov (United States)

    1999-08-01

    Martin’s Press, 1997. 404pp. (U264 .N81 1997) Mendel , William W., and Graham H. Turbiville, Jr. The CINCs’ Strategies: The Combatant Command Process...Winter 1997-1998): 50-54. Gregor , A. James. "Qualified Engagement: U.S. China Policy and Security Concerns." Naval War College Review 52 (Spring...34) Foreign Affairs 76 (January-February 1997): 50-66. Mendel , William W. "New Forces for Engagement Policy." JFQ: Joint Force Quarterly, no. 10 (Winter

  20. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are

  1. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-01-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  2. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security.

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-04-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant's growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  3. Deficit irrigation and sustainable water-resource strategies in agriculture for China’s food security

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J.

    2015-01-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant’s growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. PMID:25873664

  4. Interpersonal Strategy, Attachment Security and Social Status among Chinese Children in the Initial Period of Secondary School

    Science.gov (United States)

    Chen, Bin-Bin

    2011-01-01

    This study examined the influences of peer interpersonal strategy and secure attachment on social status in peer contexts in the initial period of secondary school in China. Two hundred and thirty-one new students in secondary schools (grade 6) were recruited in the first semester to complete measures of interpersonal strategies in the peer group,…

  5. Security Strategies of Both Players in Asymmetric Information Zero-Sum Stochastic Games with an Informed Controller

    KAUST Repository

    Li, Lichun

    2017-11-07

    This paper considers a zero-sum two-player asymmetric information stochastic game where only one player knows the system state, and the transition law is controlled by the informed player only. For the informed player, it has been shown that the security strategy only depends on the belief and the current stage. We provide LP formulations whose size is only linear in the size of the uninformed player\\'s action set to compute both history based and belief based security strategies. For the uninformed player, we focus on the regret, the difference between 0 and the future payoff guaranteed by the uninformed player in every possible state. Regret is a real vector of the same size as the belief, and depends only on the action of the informed player and the strategy of the uninformed player. This paper shows that the uninformed player has a security strategy that only depends on the regret and the current stage. LP formulations are then given to compute the history based security strategy, the regret at every stage, and the regret based security strategy. The size of the LP formulations are again linear in the size of the uninformed player action set. Finally, an intrusion detection problem is studied to demonstrate the main results in this paper.

  6. PennDOT transportation security strategy : volume 2 : effective practices of state departments of transportation security planning

    Science.gov (United States)

    2004-08-01

    Since September 11, 2001, state departments of transportation (DOTs) have been assuming a more proactive role in security and emergency management. The purpose of this Effective Practices Report is to document key lessons learned by state DOTs as the...

  7. Efficient strategy to support renewable energy. Integration in overall climate and energy security policies

    Energy Technology Data Exchange (ETDEWEB)

    Naess-Schmidt, H.S.; Hansen, Martin Bo; Bergman, E. [Copenhagen Economics, Copenhagen (Denmark); Soederholm, P. [Luleae Univ. of Technology, Luleae (Sweden)

    2013-05-15

    This report reviews how the Nordic countries can develop a strategy for renewable energy that delivers efficiently on the two underlying policy objectives of climate change and energy security challenges. The overarching elements in the evaluation of existing polices and the policy recommendations that follows from the analysis falls into three main parts: 1) Expanding renewable energy is not an end in itself, but a tool to deliver on the two real policy targets: climate change and energy security. 2) Too much policy focus at the Nordic and EU level is dedicated to boost renewable energy share of energy production in the near term, and insufficient resources are allocated to develop future low carbon technologies, which are required when CO{sub 2} abatement targets become more ambitious. 3) The long term nature of the challenges and huge investments in low carbon technologies required to deliver on long term targets puts a very high premium on policies that reduces policy risks as perceived by investors. The report was commissioned by the Nordic Council of Ministers and written by Copenhagen Economics. (Author)

  8. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Directory of Open Access Journals (Sweden)

    Audrey Guinchard

    2011-01-01

    Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.

  9. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  10. A Defense-in-Depth Approach to Phishing

    Science.gov (United States)

    2006-09-01

    email to PayPal.com users...........................19 Figure 3. (From APWG 2006) Fraudulent PayPal Web site...Incorrect Bank of the West Spoof bankofthevvest.com, padlock, Verisign logo and certificate validation seal 9 91 PayPal Spoof XUL simulates... PayPal Spoof paypal -signin03.com, padlock in content 41 59 PayPal Spoof IP address in dotted-decimal notation, padlock in content 41 59

  11. Defense in Depth Added to Malicious Activities Simulation Tools (MAST)

    Science.gov (United States)

    2015-09-01

    The Virtual Environment The hypervisor used was VirtualBox version 4.3.26_Ubuntu r98988. Though other hypervisors were available, VirtualBox offered...and its ease of 54 setup for this kind of testing. Ubuntu 15.04, specifically, was chosen to leverage the latest VirtualBox and Linux Kernel...with Linux Kernel version 3.19.0-21- generic (SMP) x86_64. The packages required for the hypervisor were: ettercap-graphical virtualbox virtualbox

  12. National Security Strategy: Legislative Mandates, Execution to Date, and Considerations for Congress

    National Research Council Canada - National Science Library

    Dale, Catherine

    2008-01-01

    .... government's national security system. Reform proponents argue that much of the current architecture was designed to meet the global security challenges of the post-World War II context, and may not be appropriate for addressing 21st challenges...

  13. 76 FR 18552 - Seeking Public Comment on Two Draft Chapters of the National Health Security Strategy Biennial...

    Science.gov (United States)

    2011-04-04

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Two Draft Chapters of the National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human Services, Office of the Secretary. ACTION: Notice. Authority: Public Health Service Act, 42 U.S.C. 300hh-1. SUMMARY...

  14. The strategy for the development of information society in Serbia by 2020: Information security and critical infrastructure

    Directory of Open Access Journals (Sweden)

    Danijela D. Protić

    2012-10-01

    Full Text Available The development of technology has changed the world economy and induced new political trends. The European Union (EU and many non-EU member states apply the strategies of information society development that raise the level of information security (IS. The Serbian Government (Government has adopted the Strategy for Information Society in Serbia by 2020 (Strategy, and pointed to the challenges for the development of a modern Serbian information society. This paper presents an overview of the open-ended questions about IS, critical infrastructures and protection of critical infrastructures. Based on publicly available data, some critical national infrastructures are listed. As a possible solution to the problem of IS, the Public Key Infrastructure (PKI-based Information security integrated information system (ISIIS is presented. The ISIIS provides modularity and interoperability of critical infrastructures both in Serbia and neighboring countries.

  15. Indigenous food security revival strategies at the village level: The gender factor implications

    Directory of Open Access Journals (Sweden)

    Wilfred Lunga

    2016-01-01

    Full Text Available This article is based on an evaluation concerning the practice of the Zunde raMambo concept (commonly referred to as Zunde in four of Zimbabwe’s 52 districts; (Mangwe, Lupane, Guruve and Hwedza. Zunde is a social security system providing protection against food shortages to vulnerable families and is coordinated by chiefs. The Zunde concept identifies with Ndebele and Shona rural communities in Zimbabwe. Thus, this evaluation sought to determine the relevance and fulfilment of the Zunde project objectives, namely: efficiency, effectiveness, impact and sustainability. The revived Zunde practice extends a long way in reducing food insecurity in vulnerable communities. Although the concept may be as old as the Zimbabwean culture, it had been abandoned as communities became urbanised. The Chief’s Council of Zimbabwe, in collaboration with the Nutrition Unit of the Ministry of Health and Child Welfare have rekindled it. However, to revive this indigenous knowledge practice, there is need to assess the nature of existing social and economic structures, leadership, gender roles and the availability of resources such as land, inputs and implements. This article, which is based on both qualitative and quantitative data, collected between September 2013 and March 2014, goes on to reflect on policy issues surrounding disaster risk reduction (DRR and survival strategies used by vulnerable communities in rural areas of Zimbabwe. It recommends that the gender factor approach offers the best means possible to understand peoples’ needs and challenges as well as how these can be satisfied and resolved respectively.

  16. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  17. Implementation Strategy for the Deployment of Millimeter-Wavelength/Terahertz Technologies for Aviation Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... This report--the third of four--focuses on currently maturing millimeter-wavelength/terahertz imaging and spectroscopy technologies that offer promise in meeting aviation security requirements...

  18. Green paper. Towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  19. Strategies to enable the adoption of animal biotechnology to sustainably improve global food safety and security.

    Science.gov (United States)

    Tizard, Mark; Hallerman, Eric; Fahrenkrug, Scott; Newell-McGloughlin, Martina; Gibson, John; de Loos, Frans; Wagner, Stefan; Laible, Götz; Han, Jae Yong; D'Occhio, Michael; Kelly, Lisa; Lowenthal, John; Gobius, Kari; Silva, Primal; Cooper, Caitlin; Doran, Tim

    2016-10-01

    The ability to generate transgenic animals has existed for over 30 years, and from those early days many predicted that the technology would have beneficial applications in agriculture. Numerous transgenic agricultural animals now exist, however to date only one product from a transgenic animal has been approved for the food chain, due in part to cumbersome regulations. Recently, new techniques such as precision breeding have emerged, which enables the introduction of desired traits without the use of transgenes. The rapidly growing human population, environmental degradation, and concerns related to zoonotic and pandemic diseases have increased pressure on the animal agriculture sector to provide a safe, secure and sustainable food supply. There is a clear need to adopt transgenic technologies as well as new methods such as gene editing and precision breeding to meet these challenges and the rising demand for animal products. To achieve this goal, cooperation, education, and communication between multiple stakeholders-including scientists, industry, farmers, governments, trade organizations, NGOs and the public-is necessary. This report is the culmination of concepts first discussed at an OECD sponsored conference and aims to identify the main barriers to the adoption of animal biotechnology, tactics for navigating those barriers, strategies to improve public perception and trust, as well as industry engagement, and actions for governments and trade organizations including the OECD to harmonize regulations and trade agreements. Specifically, the report focuses on animal biotechnologies that are intended to improve breeding and genetics and currently are not routinely used in commercial animal agriculture. We put forward recommendations on how scientists, regulators, and trade organizations can work together to ensure that the potential benefits of animal biotechnology can be realized to meet the future needs of agriculture to feed the world.

  20. Ancient clam gardens increased shellfish production: adaptive strategies from the past can inform food security today.

    Science.gov (United States)

    Groesbeck, Amy S; Rowell, Kirsten; Lepofsky, Dana; Salomon, Anne K

    2014-01-01

    Maintaining food production while sustaining productive ecosystems is among the central challenges of our time, yet, it has been for millennia. Ancient clam gardens, intertidal rock-walled terraces constructed by humans during the late Holocene, are thought to have improved the growing conditions for clams. We tested this hypothesis by comparing the beach slope, intertidal height, and biomass and density of bivalves at replicate clam garden and non-walled clam beaches in British Columbia, Canada. We also quantified the variation in growth and survival rates of littleneck clams (Leukoma staminea) we experimentally transplanted across these two beach types. We found that clam gardens had significantly shallower slopes than non-walled beaches and greater densities of L. staminea and Saxidomus giganteus, particularly at smaller size classes. Overall, clam gardens contained 4 times as many butter clams and over twice as many littleneck clams relative to non-walled beaches. As predicted, this relationship varied as a function of intertidal height, whereby clam density and biomass tended to be greater in clam gardens compared to non-walled beaches at relatively higher intertidal heights. Transplanted juvenile L. staminea grew 1.7 times faster and smaller size classes were more likely to survive in clam gardens than non-walled beaches, specifically at the top and bottom of beaches. Consequently, we provide strong evidence that ancient clam gardens likely increased clam productivity by altering the slope of soft-sediment beaches, expanding optimal intertidal clam habitat, thereby enhancing growing conditions for clams. These results reveal how ancient shellfish aquaculture practices may have supported food security strategies in the past and provide insight into tools for the conservation, management, and governance of intertidal seascapes today.

  1. Re-conceptualising food security : interlocking strategies, unfolding choices and rural livelihoods in Kisii District, Kenya

    NARCIS (Netherlands)

    Omosa, M.

    1998-01-01

    This study argues that achieving food security is a process and one that shifts and swings. Points of stability mark the food security position of households and this depends on people's day-to-day practices. These undertakings draw on how households conceptualise their life chances and

  2. Reconstituting National Defense: The New U.S. National Security Strategy

    Science.gov (United States)

    1991-09-30

    Associate Professor Assistan( Professor Department of National Department of National Security Affairs Security Affairs Reviewed by: Released by: " TOMAS C...Flying in a show-of-force to support President Corazon Aquino of the Philip- pines during the latest recent attempted military coup, U.S. Air Force

  3. The Interagency Breakdown: Why We Need Legislative Reform to Coordinate Execution of the National Security Strategy

    National Research Council Canada - National Science Library

    Borkowski, David C

    2008-01-01

    To meet the national security demands of the 21st century, the U.S. Government's interagency structure and process require legislative reform equivalent to an interagency Goldwater-Nichols Act. The U.S...

  4. Reassessing U.S. National Security Strategy: The Kurdistan Worker's Party (PKK)

    National Research Council Canada - National Science Library

    Clark, Perry

    2008-01-01

    The Kurdistan Worker's Party (PKK), a terrorist-insurgent group with ties to lucrative transnational criminal organizations throughout Europe, continues to threaten Turkey-Iraq regional stability by attacking Turkish Security Forces...

  5. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security

    National Research Council Canada - National Science Library

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-01-01

    .... For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale...

  6. Intervensi Strategis Peningkatan Ketahanan Pangan Pedesaan Propinsi Jawa Tengah (Strategic Intervention in Promoting Village-Level Food Security in Central Java)

    OpenAIRE

    Maksum, Mochammad

    2014-01-01

    The emergence of the food deficient phenomena in many localities proved that aggregative progress in food security does not necessarily guarantee the attainment of local food security in every village of the country. Anticipating that fact, therefore, this research was conducted to identify possible intervention strategies for intervening local social capacity in self-strengthening local food security system at village level based on selected typological character of village samples in Centra...

  7. (REBUILDING THE EUROPEAN UNION`S INTERNATIONAL ROLE THROUGH HUMAN SECURITY STRATEGY IN THE AFTREMATHS OF THE EUROPEAN CRISIS

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2014-10-01

    Full Text Available In a globalized world, characterized by profound shifts in the dynamics of global power and by diverse threats to peace and security, the European Union should be an active and peace-promoter actor, according to its founding principles. Thus, the European crisis left hard to heal scars within the European Union internal coherence and for its international role and image. The European crisis determined a cleavage in foreign and defence policy between the EU`s member states, creating dissonances in its internal processes. Therefore, this incongruence determined flawed reactions to international events. In order to determine the impact of the European crisis on the EU`s international role, it is briefly analysed the EU`s and its member states reactions to the conflicts from Libya and Syria. The main hypothesis of this article is that in order to overcome the effects of the economic crisis and to rebuild its international trust, the EU should reaffirm its core principles through a coherent external policy, which should be embedded in a bottom-up legitimized paradigm. This analysis demonstrates that human security strategy and the responsibility to protect principle can become the new European meta-narrative, the fact that they have the potential to overcome the current gap between rhetoric and practice in foreign and defence European policies. Therefore, this article advocates that the human security strategy and the responsibility to protect principle represent an impetus to transform the EU in an important global actor.

  8. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  9. Blue Black Sea: New Dimensions of History, Security, Politics, Strategy, Energy and Economy

    OpenAIRE

    Yalçınkaya, Alaeddin

    2013-01-01

    of the Caucasus Nations in the New Security Environment”, by E. Mehtiyev, emphasizes the importance of the Black Sea area in the European security system. According to Mehtiyev, as part of the wider Black Sea region, the Caucasus has direct access to Central Asia and Middle East. The next article “Background to the Hostilities between Armenia and Azerbaijan: From the Prague Process to the Madrid Principles” is also by E. Meytiyev. He says a military action to recover Nogorno-Karabagh fr...

  10. Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Jirattigalachote, Amornrat

    2012-07-01

    The continuous growth of traffic demand driven by the brisk increase in number of Internet users and emerging online services creates new challenges for communication networks. The latest advances in Wavelength Division Multiplexing (WDM) technology make it possible to build Transparent Optical Networks (TONs) which are expected to be able to satisfy this rapidly growing capacity demand. The work in this thesis addresses three important aspects. In particular, this thesis focuses on routing and wavelength assignment (RWA) strategies specifically devised to target: (i) the lightpath transmission quality, (ii) the network security (i.e., in terms of vulnerability to physical-layer attacks), and (iii) the reduction of the network energy consumption. Our contributions are summarized below. A number of Impairment Constraint Based Routing (ICBR) algorithms have been proposed in the literature to consider physical-layer impairments during the connection provisioning phase. Their objective is to prevent the selection of optical connections (referred to as lightpaths) with poor signal quality. These ICBR approaches always assign each connection request the least impaired lightpath and support only a single threshold of transmission quality, used for all connection requests. However, next generation networks are expected to support a variety of services with disparate requirements for transmission quality. To address this issue, in this thesis we propose an ICBR algorithm supporting differentiation of services at the Bit Error Rate (BER) level, referred to as ICBR-Diff. Our approach takes into account the effect of physical-layer impairments during the connection provisioning phase where various BER thresholds are considered for accepting/blocking connection requests, depending on the signal quality requirements of the connection requests. We tested the proposed ICBR-Diff approach in different network scenarios, including also a fiber heterogeneity. It is shown that it can

  11. Less is More: DoD’s Strategy for Facility Energy Security and Environmental Sustainability

    Science.gov (United States)

    2012-05-22

    Force: 3 Edwards AFB Nellis AFB (including NTTR) Creech AFB Marine Corps: 3 MCAGCC Twentynine Palms MCLB Barstow Chocolate Mountain Aerial...you that DoD is helping to lead this nation when it comes to preserving our environment and building a more sustainable and secure energy future. ”

  12. Cooperation between social security and employment services: Evaluation of a reform strategy in the Netherlands

    NARCIS (Netherlands)

    Terpstra, Jan

    2002-01-01

    Since the early 1990s in the Netherlands a process of restructuring social security has been going on. A central element is the introduction of regional Centres of Work and Income, stimulating people living on benefits to return to paid work and making services more client–oriented. In these

  13. The EU Maritime Security Strategy : Promoting or Absorbing European Defence Cooperation?

    NARCIS (Netherlands)

    Landman, Lennart

    2015-01-01

    For centuries, the maritime domain has been a pillar of European livelihoods and prosperity through fishing and global trade. In modern times, we have come to depend on maritime transport to keep our economy going. Recently, however, old and new threats have challenged the security of the European

  14. National Security Strategy: Mandates, Execution to Date, and Issues for Congress

    Science.gov (United States)

    2013-08-06

    internal or external—aimed respectively at improving the process itself or at fostering a robust debate that weighs the findings of the process...to Congress in a public forum shortly thereafter. Rather than grade the homework of the 2010 QDR, per se, the QDRIP critically assessed the conduct...responsible for the relative lack of attention that has been paid to the QICR, compared to its quadrennial counterparts, in the national security debates

  15. The new geography of food security: exploring the potential of urban food strategies

    OpenAIRE

    Sonnino, Roberta

    2014-01-01

    Food insecurity is increasingly ‘bimodal’, encompassing issues of quantity and quality, under- and overconsumption, in developed and developing countries alike. At a time when most of the world's population lives in cities, food security has also assumed a strong urban dimension, raising new issues of physical and financial access to food. Finally, the recent emergence of a ‘New Food Equation’, marked by food price hikes, dwindling natural resources, land grabbing activities, social unrest, a...

  16. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World

    Science.gov (United States)

    2011-05-01

    establish an anonymous virtual presence can also lead to “safe havens” for criminals, with or without a state’s knowledge Cybersecurity threats can...to free speech in cyberspace must also be narrowly tailored For example, child pornography , inciting imminent violence, or organizing an act of...incompatible with effective law enforcement, anonymity, the protection of children and secure infrastructure In reality , good cybersecurity can

  17. Japan’s Roles in U.S. National Security Strategy: Strategic Ally and Economic Adversary

    Science.gov (United States)

    1991-06-01

    inspired international communist expansion, events in China and Korea seemed only to reinforce the perceived danger to Japan. In response to this...than military capabilities alone, to safeguard Japan’s security interests. By the late 1970s, however, growing Soviet adven- turism became a matter of...relationship on both sides of the Pacific, the oft predicted breakdown has yet to materialize. However, this approach is not without its dangers to American

  18. Incorporating Charging/Discharging Strategy of Electric Vehicles into Security-Constrained Optimal Power Flow to Support High Renewable Penetration

    Directory of Open Access Journals (Sweden)

    Kyungsung An

    2017-05-01

    Full Text Available This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs; EVs interact with the grid through grid-to-vehicle (G2V and vehicle-to-grid (V2G services to ensure reliable and cost-effective grid operation. This research provides a computational framework for this decision-making process. Charging and discharging strategies of EV aggregators are incorporated into a security-constrained optimal power flow (SCOPF problem such that overall energy cost is minimized and operation within acceptable reliability criteria is ensured. Particularly, this SCOPF problem has been formulated for Jeju Island in South Korea, in order to lower carbon emissions toward a zero-carbon island by, for example, integrating large-scale renewable energy and EVs. On top of conventional constraints on the generators and line flows, a unique constraint on the system inertia constant, interpreted as the minimum synchronous generation, is considered to ensure grid security at high renewable penetration. The available energy constraint of the participating EV associated with the state-of-charge (SOC of the battery and market price-responsive behavior of the EV aggregators are also explored. Case studies for the Jeju electric power system in 2030 under various operational scenarios demonstrate the effectiveness of the proposed method and improved operational flexibility via controllable EVs.

  19. A National Strategy to Address U.S./Mexican Border Security Issues

    National Research Council Canada - National Science Library

    Sturgeon, Melissa A

    2007-01-01

    This research project identifies the threat to the United States and proposes a national strategy to address the ease with which illegal migrants are entering the United States along the Mexican border...

  20. Army Transformation: Its Long-Term Ability to Support the National Security Strategy

    National Research Council Canada - National Science Library

    Limberg, Daniel

    2006-01-01

    ..., interconnected and risky than ever before". The Cold War containment strategy is no longer effective in an environment of rogue nations, strong nationalistic sentiments, international criminal and terrorist organizations, and the proliferation...

  1. Real Estate Securities and a Filter-based, Short-term Trading Strategy

    OpenAIRE

    Michael Cooper; David H. Downs

    1999-01-01

    Anecdotal evidence provides overwhelming support to the belief that sophisticated real estate investors profit by timing long-run real estate cycles. This article examines the investment performance benefits that sophisticated investors may derive from short-run cycles in real estate, specifically, through the publicly traded real estate markets. Using a simple strategy that filters out noise in real estate investment trust (REIT) price reversals, this study shows that a contrarian strategy i...

  2. [Impact of income strategies on food security in rural Mayan communities in northern Campeche].

    Science.gov (United States)

    Pat Fernández, Lucio A; Nahed Toral, José; Parra Vázquez, Manuel R; García Barrios, Luis; Nazar Beutelspacher, Austreberta; Bello Baltazar, Eduardo

    2010-03-01

    This paper examines the effect of income strategies on sufficiency of caloric intake in Mayan domestic groups (DG) of Campeche, Mexico. The analysis was based on the sustainable livelihoods approach. Information was obtained through a survey of households (N = 237) in four communities. The results reveal that all of the DG have diversified income strategies with clearly defined orientations. The caloric sufficiency index (CSI) is different (p < 0.05) among conglomerates (C) of DG and increases with the increase of the proportion of agricultural income in relation to total income. The wage labor strategy (37.6%) corresponding to C1 of DG (CSI-C = 0.69) and the agriculture-wage labor strategy (42.6%; CSI-C2 = 0.87) do not cover energy requirements of the DG. Only the agricultural strategy satisfies caloric intake needs (CSI-C3 = 1.09; CSI-C4 = 1.30) of the DG (19.8%). These results are associated with the heterogeneity of resources of the DG's, particularly, with the quality and extent of land, presence of producer organizations, and current rural policies. Implementation of differentiated local policies, interinstitutional coordination, and community participation could contribute to improving effectiveness of policies aimed at eradicating food insecurity.

  3. Green paper: towards a European strategy for the security of energy supply; Livre Vert: vers une strategie europeenne de securite d'approvisionnement energetique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  4. Economic Diplomacy in the Innovation Global Value Chains as the National Security Providing Strategy Component

    Directory of Open Access Journals (Sweden)

    Vitaliy Omelyanenko

    2017-03-01

    Full Text Available The article deals with the analyzes of economic diplomacy application in the area of innovations. The strategy of economic diplomacy by improving the efficiency in global value chain participation was considered. The main effects of commercial diplomacy using in the innovation area were identified. The world experience using economic diplomacy in the innovation sphere was considered.

  5. America’s New National Security Strategy: New Scenario for Military Operations Research

    Science.gov (United States)

    1991-06-11

    for: Director, Net Assessment and Defense Policy Office Defense Nucleaar Agenc\\ Competicive Strategies office National Sccuritv HQ/DNA/’NASI and...after World War II and the advent of nuclear weapons and long-range means of deliver. Senior Soviet military officers have been warning of another...34revolution" in the near future.3 After the performance of U.S. weapons during Operation DESERT STORM, it appears that their worst fears were justified

  6. Soil erosion, climate change and global food security: challenges and strategies.

    Science.gov (United States)

    Rhodes, Christopher J

    2014-01-01

    An overview is presented of the determined degree of global land degradation (principally occurring through soil erosion), with some consideration of its possible impact on global food security. Most determinations of the extent of land degradation (e.g. GLASOD) have been made on the basis of "expert judgement" and perceptions, as opposed to direct measurements of this multifactorial phenomenon. More recently, remote sensing measurements have been made which indicate that while some regions of the Earth are "browning" others are "greening". The latter effect is thought to be due to fertilisation of the growth of biomass by increasing levels of atmospheric CO2, and indeed the total amount of global biomass was observed to increase by 3.8% during the years 1981-2003. Nonetheless, 24% of the Earth's surface had occasioned some degree of degradation in the same time period. It appears that while long-term trends in NDVI (normalised difference vegetation index) derivatives are only broad indicators of land degradation, taken as a proxy, the NDVI/NPP (net primary productivity) trend is able to yield a benchmark that is globally consistent and to illuminate regions in which biologically significant changes are occurring. Thus, attention may be directed to where investigation and action at the ground level is required, i.e. to potential "hot spots" of land degradation and/or erosion. The severity of land degradation through soil erosion, and an according catastrophic threat to the survival of humanity may in part have been overstated, although the rising human population will impose inexorable demands for what the soil can provide. However the present system of industrialised agriculture would not be possible without plentiful provisions of cheap crude oil and natural gas to supply fuels, pesticides, herbicides and fertilisers. It is only on the basis of these inputs that it has been possible for the human population to rise above 7 billion. Hence, if the cheap oil and gas

  7. Spectroelectrochemistry as a Strategy for Improving Selectivity of Sensors for Security and Defense Applications

    Energy Technology Data Exchange (ETDEWEB)

    Heineman, William R.; Seliskar, Carl J.; Morris, Laura K.; Bryan, Samuel A.

    2012-12-19

    Spectroelectrochemistry provides improved selectivity for sensors by electrochemically modulating the optical signal associated with the analyte. The sensor consists of an optically transparent electrode (OTE) coated with a film that preconcentrates the target analyte. The OTE functions as an optical waveguide for attenuated total reflectance (ATR) spectroscopy, which detects the analyte by absorption. Alternatively, the OTE can serve as the excitation light for fluorescence detection, which is generally more sensitive than absorption. The analyte partitions into the film, undergoes an electrochemical redox reaction at the OTE surface, and absorbs or emits light in its oxidized or reduced state. The change in the optical response associated with electrochemical oxidation or reduction at the OTE is used to quantify the analyte. Absorption sensors for metal ion complexes such as [Fe(CN)6]4- and [Ru(bpy)3]2+ and fluorescence sensors for [Ru(bpy)3]2+ and the polycyclic aromatic hydrocarbon 1-hydroxypyrene have been developed. The sensor concept has been extended to binding assays for a protein using avidin–biotin and 17β-estradiol–anti-estradiol antibodies. The sensor has been demonstrated to measure metal complexes in complex samples such as nuclear waste and natural water. This sensor has qualities needed for security and defense applications that require a high level of selectivity and good detection limits for target analytes in complex samples. Quickly monitoring and designating intent of a nuclear program by measuring the Ru/Tc fission product ratio is such an application.

  8. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  9. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009–2014

    Science.gov (United States)

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.

    2016-01-01

    Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842

  10. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009-2014.

    Science.gov (United States)

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G

    2016-05-01

    The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.

  11. Securing systems leadership by local government through health and wellbeing strategies.

    Science.gov (United States)

    Learmonth, Alyson M; Henderson, Emily J; Hunter, David J

    2017-10-11

    The aim of this study was to strengthen Health and Wellbeing Strategies (HWSs) by identifying potential areas for system leadership across local authorities in relation to specific aspects of health/illness, wider determinants of health and transformational change management. The work involved a document analysis of strengths of the first 12 HWSs produced in the North East of England applying principles of appreciative inquiry (AI), followed by a knowledge-to-action group approach with stakeholders. A summative event resulted in Health and Wellbeing Board (HWB) members identifying potential areas for collaboration. The study identified diverse examples of good practice, and considerable consensus in terms of key priorities, both wider determinants such as employment, transport and housing, and subject areas such as lifestyle issues and children having the best start in life. There was agreement in principle to work across local authority boundaries, with academic partners. Consideration of HWSs as part of a complex adaptive system was welcomed by HWB Members. Collaborative working across HWBs could strengthen the effectiveness of HWSs in relation to inequalities in health, place-shaping and wider determinants of wellbeing. The co-production of identified areas to work toward health improvement was successful.

  12. [Maternal mortality at the Mexican Institute of Social Security (IMSS). Initial results from a reduction intervention strategy].

    Science.gov (United States)

    Velasco-Murillo, Vitelio; Navarrete-Hernández, Eduardo; Hernández-Alemán, Francisco; Anaya-Coeto, Sergio; Pozos-Cavanzo, José Luis; Chavarría-Olarte, María Eugenia

    2004-01-01

    To analyze the preliminary results of a medical manager intervention to improve the quality of medical care during pregnancy, delivery and puerperium, on the maternal mortality rates in population covered by the Mexican Institute of Social Security (IMSS). We selected the 14 administrative delegations of IMSS that showed the highest rates and absolute numbers of maternal deaths in the years 1999 to 2001. Within this group, the manager medical staff developed activities for medical training of family physicians and gynecologists, to improve medical resources, to achieve a better coordination among medical services, to adequate reference of obstetrical complications to higher-level hospitals, and for monitoring of maternal mortality committees operation. The other 23 IMSS administrative delegations were used as controls. Maternal mortality rates fell down from 40.7 to 28.2 per 100,000 live births among the delegations included in the strategy (mean reduction 30.7%). Among the control delegations maternal mortality rate fell down 1.5% only (32.3 to 31.8 per 100,000 live births). A similar phenomenon was observed for the absolute number of maternal deaths, with a reduction of 36.7% and 8.4%, respectively. The improving intervention was associated with a noticeable reduction in the maternal mortality rate. It is necessary a long-term observation to confirm a cause-effect relationship.

  13. Model-based Impact Assessment of an Integrated Water Management Strategy on Ecosystem Services relevant to Food Security in Namibia

    Science.gov (United States)

    Luetkemeier, R.; Liehr, S.

    2012-04-01

    North-central Namibia is characterized by seasonal alterations of drought and heavy rainfall, mostly saline groundwater resources and a lack of perennial rivers. Water scarcity poses a great challenge for freshwater supply, harvest and food security against the background of high population growth and climate change. CuveWaters project aims at poverty reduction and livelihood improvement on a long term basis by introducing a multi-resource-mix as part of an integrated water resources management (IWRM) approach. Herein, creating water buffers by rainwater harvesting (RWH) and subsurface water storage as well as reuse of treated wastewater facilitates micro-scale gardening activities. This link constitutes a major component of a sustainable adaptation strategy by contributing to the conservation and improvement of basic food and freshwater resources in order to reduce drought vulnerability. This paper presents main findings of an impact assessment carried out on the effect of integrated water resources management on ecosystem services (ESS) relevant to food security within the framework of CuveWaters project. North-central Namibia is perceived as a social-ecological system characterized by a strong mutual dependence between natural environment and anthropogenic system. This fundamental reliance on natural resources highlights the key role of ESS in semi-arid environments to sustain human livelihoods. Among other services, food provision was chosen for quantification as one of the most fundamental ESS in north-central Namibia. Different nutritional values were utilized as indicators to adopt a demand-supply approach (Ecosystem Service Profile) to illustrate the ability of the ecosystem to meet people's nutritional requirements. Calculations have been conducted using both Bayesian networks to incorporate uncertainty introduced by the variability of monthly precipitation and the application of plant specific water production functions. Results show that improving the

  14. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  15. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to whole spectrum of ICT users and Providers including home users; small, medium & large organisations, Government and Academia. Strategies: ...

  16. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  17. Searching for existential security: a prospective qualitative study on the influence of mindfulness therapy on experienced stress and coping strategies among patients with somatoform disorders.

    Science.gov (United States)

    Lind, Annemette Bondo; Delmar, Charlotte; Nielsen, Klaus

    2014-12-01

    The aim was to explore how mindfulness group therapy for somatoform disorders influenced the patients' stress experiences, coping strategies and contextual psychosocial processes. A longitudinal pre- and post-treatment design, using 22 semi-structured individual pre- and post-treatment interviews. Data-analysis was based on a thematic methodology. Pre-treatment patients were struggling in an existential crisis, feeling existentially insecure about their social identity, the causes, consequences and management of their illness; experiencing difficulties identifying and expressing stress-related cognitions, emotions and feelings, and low bodily and emotional self-contact; often leading to avoidant coping, making these individuals highly stress-vulnerable. Post-treatment, the overall change was conceptualized as increased existential security, defined by patients being more self-confident; more clarified with their social identity, the nature, management and future prospects of their illness; generally using more flexible coping strategies to reduce their daily stress experiences. Four related subthemes were identified contributing to increased existential security: 1) more secure illness perceptions - feeling existentially recognized as "really" ill, 2) enhanced relaxation ability - using mindfulness techniques, 3) increased awareness - connecting differently to mind and body 4) improved ability to identify and express needs and feelings of distress - more active communicating. Patients suggested that mindfulness therapy could be expanded with more time for group-discussions followed by additional individual therapy. Generally, treatment positively influenced the patients' illness perceptions, stress-experiences, body- and self-awareness, coping strategies, self-image, social identity and social functioning. However, patients identified potentials for treatment improvements, and they needed further treatment to fully recover. Copyright © 2014 Elsevier Inc. All

  18. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  19. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  20. Homeland Security Digital Library

    OpenAIRE

    Reneker, Maxine H.; Gassie, Lillian

    2003-01-01

    The Homeland Security Digital Library (HSDL) is the nation's premier collection of documents relating to homeland security policy, strategy and organizational management. The mission of the HSDL is to strengthen the national security of the United States by supporting local, state, territorial, tribal and federal analysis, debate, and decision-making needs and to assist academics of all disciplines in homeland defense and security-related research.

  1. The Effects of U.S. National Security Strategy on Force Structure and the National Industrial Base: 1945-1960

    Science.gov (United States)

    2014-05-22

    witnessed both a shift in the structure of global hegemony and the position of the United States within this new structure. Before the end of World...present a detailed and fascinating account as to how Eisenhower integrated the concept into his Basic National Security Policy as it matured through...pressure to both Greece and Turkey in the form of support for communist insurgencies and demands for territorial concessions, respectively. During the

  2. Beyond the Nation-State: A Process for Determining the Security Strategy for the Integrated United Continent of Europe

    Science.gov (United States)

    1990-05-01

    CONCLUSIONS .................... ... ,. 43 Force Structure I& Nuclear Poture ....... 4’ Technology....e..,c...... ,e .e... .. ,.,c.,.... .45 Security...considered, howev;er, with the emergence of the European Communities (EC). The NATO alliance model has sought to deter the Soviet Union and to control ...S. in NATO. Force structure planning and defense planning will change. Arms control and arms negotiations will change. The levels and areas of

  3. Ensuring economic safety by law enforcement authorities in the context of the priorities of socio-economic development and the new Russian national security strategy

    Directory of Open Access Journals (Sweden)

    A. I. Khorev

    2016-01-01

    Full Text Available At the end of December 2015, was approved a new national security Strategy of the Russian Federation, which is one of the basic documents of strategic planning of activity of state bodies regarding domestic and foreign policy, formally defining the national interests and national strategic priorities of the Russian Federation in the field of defense; state and public safety; improve the quality of life of Russian citizens; economic growth; science, culture, technology, education, and health. ecology of living systems and rational use of natural resources and of strategic stability and equitable strategic partnership. The compilation and analysis of data of official statistics over the last decade show negative trends and the dynamics of social indicators of economic security. In accordance with the Concept, by 2020 the unemployment rate should be no more than 4-5%, inflation is 3.5%, the population with incomes below the subsistence minimum is 6.2%. According to the conservative scenario by 2030, unemployment should be at the level of 4.7%, inflation is 3.8%, the population with incomes below the subsistence minimum – 8%. Given the data and the analysis of these documents as a whole show that the concept of the provisions and forecasts require making significant adjustments based on layer-lived situation inside the country and in the world and the need to change approaches to the ongoing socio-economic policy. In modern conditions the effective implementation of the provisions of the new national security Strategy is of great importance for the further successful development of the Russian Federation.

  4. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  5. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    Energy Technology Data Exchange (ETDEWEB)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  6. Modeling Safety Barriers and Defense in Depth with Mulitlevel Flow Modeling

    DEFF Research Database (Denmark)

    Lind, Morten

    2012-01-01

    The barrier concept plays a central role in designand operation of safety critical processes. In plant design barriers are provided as means of prevention to avoid critical process conditions which may be harmful to the environment. In plant operations barriers may beestablished and maintained...... through control actions in order to limit the consequences of critical plant events. The barrier concept has had a significant practical value for industry by guiding the design thinking of safety engineers. The provision of material barriers preventing the release of radioactive materials from...... the reactor core to the environment is accordingly a basic principle of nuclear safety design. The application of barriers is furthermore an integral part of the defence in depth principle applied by nuclear industry. Here several barriers are combined with reliability techniques such as redundancy...

  7. Remotely Piloted Aerial Systems Survivability: A Defense-in-Depth Approach

    Science.gov (United States)

    2012-09-01

    for maximum interoperability. Dr. Vinton Cerf , Google‟s internet guru and one of the inventors of the internet, said in his remarks at the 2009...today would not be the standard. 71 The problem that Dr. Cerf faced was that the world agreed upon and perpetuated his original IP as the...iii-v. 67. OSD, UAV Roadmap 2000. 68. OSD, UAV Roadmap 2002. 69. DOD, Unmanned Systems Roadmap, 13-19, 54. 70. Ibid., 13. 71. Vinton Cerf

  8. Agroecological urban agriculture - strategy for health promotion and food and nutrition security - doi: 10.5020/18061230.2012.p381

    Directory of Open Access Journals (Sweden)

    Silvana Maria Ribeiro

    2012-11-01

    Full Text Available Objective: To raise considerations about the agroecological urban agriculture, in articulation with movements for promotion of health and food and nutrition security, with participation of local communities. Data synthesis: Documental research carried out through the reading and analysis of report, field activities’ records, participants’ testimonies and interview performed with the project coordinator. The contribution of agroecological urban agriculture was perceivable in regard to the community protagonism, popular participation, and the rising of feeding and environmental awareness among social actors. Conclusion: Relevant aspects in consonance with the principles and fields of action of Health Promotion were identified, especially the strengthening of intersetorial actions, the local community empowerment, individual and collective protagonism, creation of health-friendly environments and community mobilization.

  9. Enhanced secure strategy for electro-optic chaotic systems with delayed dynamics by using fractional Fourier transformation.

    Science.gov (United States)

    Cheng, Mengfan; Deng, Lei; Li, Hao; Liu, Deming

    2014-03-10

    We propose a scheme whereby a time domain fractional Fourier transform (FRFT) is used to post process the optical chaotic carrier generated by an electro-optic oscillator. The time delay signature of the delay dynamics is successfully masked by the FRFT when some conditions are satisfied. Meanwhile the dimension space of the physical parameters is increased. Pseudo random binary sequence (PRBS) with low bit rate (hundreds of Mbps) is introduced to control the parameters of the FRFT. The chaotic optical carrier, FRFT parameters and the PRBS are covered by each other so that the eavesdropper has to search the whole key space to crack the system. The scheme allows enhancing the security of communication systems based on delay dynamics without modifying the chaotic source. In this way, the design of chaos based communication systems can be implemented in a modular manner.

  10. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  11. THE STRATEGY OF THE STATE CORPORATION DEVELOPMENT – ECONOMIC GROWTH IN REGIONS AND ECONOMY SECURITY IN RUSSIA

    Directory of Open Access Journals (Sweden)

    V. V. Simonova

    2015-01-01

    Full Text Available On June 30, 2015 has come into force the Federal Law of theRussian Federation(№ 488-FL: “On the industrial Policy in theRussian Federation”. The law requires the innovation Production. At the same time, from the whole spectrum of the strategic documents only for the companies with the State participation the innovation development is required. In this sense, the strategies of the State companies embedded into the Strategical Planning System inRussiais important factor of stimulation of innovative development of Russian Economy. The integration of the State companies strategies and regions in innovation development will be the basis for stability in Russian Economy. 

  12. The Role of Soft Power in China’s Security Strategy: Case Studies on the South China Sea and Taiwan

    Science.gov (United States)

    2017-06-09

    wielding soft power. One camp of academics points to China’s success in the Global South—specifically on the African continent, in Latin America ...combination of both hard and soft power that true strategy emerges. — Robert D. Kaplan, Geography Rules The purpose of this study was to determine...news.xinhuanet.com/english/2016-07/27/c_135542397.htm. Kaplan, Robert D. “ Geography Rules: It’s All About Spheres of Influence.” Stratfor, August 21, 2013

  13. Cyberspace as a Theater of Conflict: Federal Law, National Strategy and the Departments of Defense and Homeland Security

    Science.gov (United States)

    2007-06-01

    History . http://www.dfas.mil/about/OurHistory.html. (No page number) 14 Goldwater-Nichols Department of Defense Reorganization Act of 1986, Public...Agency (DISA). Defense Information Systems Agency: History of DISA. http://www.disa.mil/main/about/history.html. (No page number) 21 Also, any...site named Strategy Page, and their story line called “The DIME Ballet ”. In a brief article about North Korea, it creates a mental image that is

  14. Social Mobilization, Influence, and Political Warfare: Unconventional Warfare Strategies for Shaping the 21st Century Security Environment

    Science.gov (United States)

    2012-06-08

    27 It provided meeting places to develop strategy and commitment, a network of charismatic movement leaders and activists, and an “ idiom that... teachings and doctrine to “frame” the collective action messages of non-violent resistance.95 Where the Fall of the Berlin Wall differs from the...work to mobilize political participation and has focused attention on education reform in a sister movement titled “ Teach India.”233

  15. Green paper - towards a European strategy for the security of energy supply, technical document; Livret vert sur la securite de l'approvisionnement en energie, document technique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  16. Connected Community and Household Food-Based Strategy (CCH-FBS): its importance for health, food safety, sustainability and security in diverse localities.

    Science.gov (United States)

    Wahlqvist, Mark L

    2009-01-01

    In this article, I argue that Connected Community and Household Food-Based Strategy (CCH-FBS) could contribute to the resolution of outstanding nutritionally-related health problems. The 1995 Food-Based Dietary Guidelines (FBDGs) have been customized in regions and nations, encouraging integrated food systems and culturally-sensitive food-health relationships with economic development. Climate change and diminishing fuel and food affordability have made their role in promoting food security critical. Localities with their eco-systems, communities and households, could apply FBDGs to correct mismatches between food systems, individual health needs, and environmental integrity. Improved infrastructure should allow communities and households to be usefully connected and operate with CCH-FBSs.

  17. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  18. Review: Feed demand landscape and implications of food-not feed strategy for food security and climate change.

    Science.gov (United States)

    Makkar, H P S

    2017-12-04

    The food-feed competition is one of the complex challenges, and so are the ongoing climate change, land degradation and water shortage for realizing sustainable food production systems. By 2050 the global demand for animal products is projected to increase by 60% to 70%, and developing countries will have a lion's share in this increase. Currently, ~800 million tonnes of cereals (one-third of total cereal production) are used in animal feed and by 2050 it is projected to be over 1.1 billion tonnes. Most of the increase in feed demand will be in developing countries, which already face many food security challenges. Additional feed required for the projected increased demand of animal products, if met through food grains, will further exacerbate the food insecurity in these countries. Furthermore, globally, the production, processing and transport of feed account for 45% of the greenhouse gas emissions from the livestock sector. This paper presents approaches for addressing these challenges in quest for making livestock sector more sustainable. The use of novel human-inedible feed resources such as insect meals, leaf meals, protein isolates, single cell protein produced using waste streams, protein hydrolysates, spineless cactus, algae, co-products of the biofuel industry, food wastes among others, has enormous prospects. Efficient use of grasslands also offers possibilities for increasing carbon sequestration, land reclamation and livestock productivity. Opportunities also exist for decreasing feed wastages by simple and well proven practices such as use of appropriate troughs, increase in efficiency of harvesting crop residues and their conversion to complete feeds especially in the form of densified feed blocks or pellets, feeding as per the nutrient requirements, among others. Available evidence have been presented to substantiate arguments that: (a) for successful and sustained adoption of a feed technology, participation of the private sector and a sound

  19. Post-Closure Strategy for Use-Restricted Sites on the Nevada National Security Site, Nevada Test and Training Range, and Tonopah Test Range, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Silvas, A. J. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2014-03-26

    The purpose of this Post-Closure Strategy is to provide a consistent methodology for continual evaluation of post-closure requirements for use-restricted areas on the Nevada National Security Site (NNSS), Nevada Test and Training Range (NTTR), and Tonopah Test Range (TTR) to consolidate, modify, or streamline the program. In addition, this document stipulates the creation of a single consolidated Post-Closure Plan that will detail the current post-closure requirements for all active use restrictions (URs) and outlines its implementation and subsequent revision. This strategy will ensure effective management and control of the post-closure sites. There are currently over 200 URs located on the NNSS, NTTR, and TTR. Post-closure requirements were initially established in the Closure Report for each site. In some cases, changes to the post-closure requirements have been implemented through addenda, errata sheets, records of technical change, or letters. Post-closure requirements have been collected from these multiple sources and consolidated into several formats, such as summaries and databases. This structure increases the possibility of inconsistencies and uncertainty. As more URs are established and the post-closure program is expanded, the need for a comprehensive approach for managing the program will increase. Not only should the current requirements be obtainable from a single source that supersedes all previous requirements, but the strategy for modifying the requirements should be standardized. This will enable more effective management of the program into the future. This strategy document and the subsequent comprehensive plan are to be implemented under the assumption that the NNSS and outlying sites will be under the purview of the U.S. Department of Energy, National Nuclear Security Administration for the foreseeable future. This strategy was also developed assuming that regulatory control of the sites remains static. The comprehensive plan is not

  20. What community-level strategies are needed to secure women's property rights in Western Kenya? Laying the groundwork for a future structural HIV prevention intervention.

    Science.gov (United States)

    Dworkin, Shari L; Lu, Tiffany; Grabe, Shelly; Kwena, Zachary; Mwaura-Muiru, Esther; Bukusi, Elizabeth

    2014-01-01

    Despite the recognized need for structural-level HIV prevention interventions that focus on economic empowerment to reduce women's HIV risks, few science-based programs have focused on securing women's land ownership as a primary or secondary HIV risk reduction strategy. The current study focused on a community-led land and property rights model that was implemented in two rural areas of western Kenya where HIV prevalence was high (24-30%) and property rights violations were common. The program was designed to reduce women's HIV risk at the community level by protecting and enhancing women's access to and ownership of land. Through in-depth interviews with 50 program leaders and implementers of this program we sought to identify the strategies that were used to prevent, mediate, and resolve property rights violations. Results included four strategies: (1) rights-based education of both women and men individually and at the community level, (2) funeral committees that intervene to prevent property grabbing and disinheritance, (3) paralegal training of traditional leaders and community members and local adjudication of cases of property rights violations, and (4) referring property rights violations to the formal justice system when these are not resolved at the community level. Study participants underscored that local mediation of cases resulted in a higher success rate than women experienced in the formal court system, underscoring the importance of community-level solutions to property rights violations. The current study assists researchers in understanding the steps needed to prevent and resolve women's property rights violations so as to bolster the literature on potential structural HIV prevention interventions. Future research should rigorously test property rights programs as a structural HIV prevention intervention.

  1. Improving photosynthetic efficiency to address food security in the 21st century: Strategies for a more efficient crop canopy

    Science.gov (United States)

    VanLoocke, A. D.; Slattery, R.; Bernacchi, C.; Zhu, X.; Ort, D. R.

    2013-12-01

    Global food production will need to increase by approximately 70% by mid-century to meet the caloric and nutritional demand of population and economic growth. Achieving this goal will require successfully implementing a wide range of strategies, spanning the social and physical sciences. Here we will present opportunities for improving crop production through increasing photosynthetic rates for a crop canopy that do not require additional agronomic inputs. We will focus on a specific strategy related optimizing the distribution of light within a crop canopy because it is a possible way to improve canopy photosynthesis in crops that form dense canopies, such as soybean, by increasing the transmission of light within a canopy via reduced chlorophyll content. We hypothesized that if decreasing chlorophyll content in soybean leaves will result in greater light penetration into the canopy then this will enhance canopy photosynthesis and improve yields. In addition, if current chlorophyll content in soybean results in excess light absorption, then decreasing chlorophyll content will result in decreased photoprotection that results in the suppression of upper canopy photosynthesis associated with super-optimal light. These hypotheses were tested in 2012 and 2013 in the field on the soybean cultivar 'Clark' (WT) and a nearly isogenic chlorophyll-b deficient mutant (Y11y11). Throughout the season, profiles of light sensors measured incident and reflected light intensity at the canopy surface as well as light levels at ten heights within the canopy. Analyses of these data indicated greater reflectivity, transmissivity and within-canopy light levels for the Y11y11 canopy relative to WT especially in the top half of the canopy. A Gas exchange method was used to determine photosynthetic capacity and suppression high light levels. Daily integrals of leaf-level photosynthesis in sun leaves were greater in Y11y11 compared to WT at several times during the growing season and

  2. Credit with Education: A Promising Title II Microfinance Strategy--Supporting Integrated Food Security and Nutrition Programs To Improve Health and Well-Being of Women and Children). Food and Nutrition Technical Assistance.

    Science.gov (United States)

    Dunford, Christopher; Denman, Vicki

    This paper introduces the reader to microfinance integrated with health and nutrition education as a promising strategy for Title II practitioners. The paper provides an overview of how microfinance, particularly village banking, can contribute to the food-security objectives of Title II. It describes a variant of village banking, called…

  3. U.S. Geological Survey natural hazards science strategy: promoting the safety, security, and economic well-being of the Nation

    Science.gov (United States)

    Holmes, Robert R.; Jones, Lucile M.; Eidenshink, Jeffery C.; Godt, Jonathan W.; Kirby, Stephen H.; Love, Jeffrey J.; Neal, Christina A.; Plant, Nathaniel G.; Plunkett, Michael L.; Weaver, Craig S.; Wein, Anne; Perry, Suzanne C.

    2013-01-01

    The mission of the U.S. Geological Survey (USGS) in natural hazards is to develop and apply hazard science to help protect the safety, security, and economic well-being of the Nation. The costs and consequences of natural hazards can be enormous, and each year more people and infrastructure are at risk. USGS scientific research—founded on detailed observations and improved understanding of the responsible physical processes—can help to understand and reduce natural hazard risks and to make and effectively communicate reliable statements about hazard characteristics, such as frequency, magnitude, extent, onset, consequences, and where possible, the time of future events. To accomplish its broad hazard mission, the USGS maintains an expert workforce of scientists and technicians in the earth sciences, hydrology, biology, geography, social and behavioral sciences, and other fields, and engages cooperatively with numerous agencies, research institutions, and organizations in the public and private sectors, across the Nation and around the world. The scientific expertise required to accomplish the USGS mission in natural hazards includes a wide range of disciplines that this report refers to, in aggregate, as hazard science. In October 2010, the Natural Hazards Science Strategy Planning Team (H–SSPT) was charged with developing a long-term (10–year) Science Strategy for the USGS mission in natural hazards. This report fulfills that charge, with a document hereinafter referred to as the Strategy, to provide scientific observations, analyses, and research that are critical for the Nation to become more resilient to natural hazards. Science provides the information that decisionmakers need to determine whether risk management activities are worthwhile. Moreover, as the agency with the perspective of geologic time, the USGS is uniquely positioned to extend the collective experience of society to prepare for events outside current memory. The USGS has critical

  4. Using intervention mapping for the development of a targeted secure web-based outreach strategy named SafeFriend, for Chlamydia trachomatis testing in young people at risk.

    Science.gov (United States)

    Theunissen, Kevin A T M; Hoebe, Christian J P A; Crutzen, Rik; Kara-Zaïtri, Chakib; de Vries, Nanne K; van Bergen, Jan E A M; van der Sande, Marianne A B; Dukers-Muijrers, Nicole H T M

    2013-10-22

    Many young people at high risk for Chlamydia trachomatis (Ct) are not reached by current sexual health care systems, such as general practitioners and public sexual health care centres (sexually transmitted infection clinics).Ct is the most frequently diagnosed bacterial sexually transmitted infection (STI) among sexually active people and in particular young heterosexuals. Innovative screening strategies are needed to interrupt the transmission of Ct among young people and connect the hidden cases to care. Intervention Mapping (IM), a systematic approach to develop theory- and evidence-based interventions, was used to develop a strategy to target Ct testing towards young people who are currently hidden to care in The Netherlands. Both clinical users (i.e. sexual health care nurses) and public users (i.e., young people at risk for Ct) were closely involved in the IM process. A needs assessment study was carried out using semi-structured interviews among users (N = 21), a literature search and by taking lessons learned from existing screening programmes. Theoretical methods and practical applications to reach high risk young people and influence testing were selected and translated into specific programme components. The IM approach resulted in the development of a secure and web-based outreach Ct screening strategy, named SafeFriend. It is developed to target groups of high-risk young people who are currently hidden to care. Key methods include web-based Respondent Driven Sampling, starting from young Ct positive sexual health care centre clients, to reach and motivate peers (i.e., sex partners and friends) to get tested for Ct. Testing and the motivation of peers were proposed as the desired behavioural outcomes and the Precaution Adoption Process Model was chosen as theoretical framework. End users, i.e., young people and sexual health care nurses were interviewed and included in the development process to increase the success of implementation. IM proved useful

  5. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  6. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  7. Impact of Euro-Canadian agrarian practices: in search of sustainable import-substitution strategies to enhance food security in subarctic Ontario, Canada.

    Science.gov (United States)

    Spiegelaar, Nicole F; Tsuji, Leonard J S

    2013-01-01

    In Canada, food insecurity exists among Aboriginal (Inuit, Metis and First Nations) people living in remote northern communities, in part, because of their reliance on the industrialized, import-based food system. Local food production as a substitute to imports would be an adaptive response, but enhancement of food security via food localization requires reflection on previous failings of conventional agricultural strategies so that informed decisions can be made. In light of potential reintroduction of local food production in remote First Nations communities, we investigated the cultural, social and ecological effects of a 20th century, Euro-Canadian agrarian settlement on the food system of a subarctic First Nation; this will act as the first step in developing a more sustainable local food program and enhancing food security in this community. To investigate the socio-cultural impacts of the Euro-Canadian agrarian initiative on the food system of Fort Albany First Nation, purposive, semi-directive interviews were conducted with elders and other knowledgeable community members. Interview data were placed into themes using inductive analyses. To determine the biophysical impact of the agrarian initiative, soil samples were taken from one site within the cultivated area and from one site in an undisturbed forest area. Soil properties associated with agricultural use and productivity were assessed. To compare the means of a given soil property between the sites, one-tailed t-tests were employed. Vegetative analysis was conducted in both sites to assess disturbance. According to the interviewees, prior to the agrarian initiative, First Nation families harvested wild game and fish, and gathered berries as well as other forms of vegetation for sustenance. With the introduction of the residential school and agrarian initiative, traditional food practices were deemed inadequate, families were forced to work and live in the settlement (becoming less reliant on

  8. Augmentation of clozapine with amisulpride: an effective therapeutic strategy for violent treatment-resistant schizophrenia patients in a UK high-security hospital.

    Science.gov (United States)

    Hotham, James E; Simpson, Patrick J D; Brooman-White, Rosalie S; Basu, Amlan; Ross, Callum C; Humphreys, Sharon A; Larkin, Fintan; Gupta, Nitin; Das, Mrigendra

    2014-10-01

    Clozapine is used in the management of treatment-resistant schizophrenia and is effective in reducing aggression; however a subgroup of patients is poorly responsive. For violent patients in this group, there is limited literature on the use of strategies to augment clozapine with other agents. Here we present a case series of 6 schizophrenia patients, within a high-security hospital, who have a history of serious violence and who were treated with clozapine augmented with amisulpride. We reviewed case notes and health records for evidence of violence/aggression and positive factors such as engagement in activities, and Clinical Global Impression (CGI) scores were formulated. We also examined metabolic parameters before and after augmentation. All 6 of the patients showed clinical improvement in symptoms and a reduction in their risk of violence to others. Five patients had a reduction in number of violent/aggressive incidents, and all patients showed improvement in engagement in occupational, vocational, and/or psychological work. Metabolic parameters were largely unchanged except for 1 patient whose Body Mass Index (BMI) increased. Five patients reported side effects as unchanged or improved. These schizophrenia patients with a history of violence showed clinical improvement and reduced aggression and violence with amisulpride augmentation of clozapine. To our knowledge, this is the first report of an antiaggressive benefit of this combination in forensic psychiatric patients. Further studies are warranted to establish the efficacy and anti-aggressive effects of amisulpride augmentation of clozapine.

  9. Framework for a Risk-Informed Groundwater Compliance Strategy for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam

    2010-09-01

    Note: This document was prepared before the NTS was renamed the Nevada National Security Site (August 23, 2010); thus, all references to the site herein remain NTS. Corrective Action Unit (CAU) 98, Frenchman Flat, at the Nevada Test Site (NTS) was the location of ten underground nuclear tests between 1965 and 1971. As a result, radionuclides were released in the subsurface in the vicinity of the test cavities. Corrective Action Unit 98 and other CAUs at the NTS and offsite locations are being investigated. The Frenchman Flat CAU is one of five Underground Test Area (UGTA) CAUs at the NTS that are being evaluated as potential sources of local or regional impact to groundwater resources. For UGTA sites, including Frenchman Flat, contamination in and around the test cavities will not be remediated because it is technologically infeasible due to the depth of the test cavities (150 to 2,000 feet [ft] below ground surface) and the volume of contaminated groundwater at widely dispersed locations on the NTS. Instead, the compliance strategy for these sites is to model contaminant flow and transport, estimate the maximum spatial extent and volume of contaminated groundwater (over a period of 1,000 years), maintain institutional controls, and restrict access to potentially contaminated groundwater at areas where contaminants could migrate beyond the NTS boundaries.

  10. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  14. Prioritization strategies for pandemic influenza vaccine in 27 countries of the European Union and the Global Health Security Action Group: a review

    Directory of Open Access Journals (Sweden)

    Haas Walter

    2007-09-01

    Full Text Available Abstract Background Although there is rapid progress in vaccine research regarding influenza pandemic vaccines it is expected that pandemic influenza vaccine production can only start once the pandemic virus has been recognized. Therefore, pandemic vaccine capacity will be limited at least during the first phase of an influenza pandemic, requiring vaccine prioritization strategies. WHO recommends developing preliminary priorities for pandemic vaccine use. The goal of this review is to provide a thorough overview of pandemic vaccine prioritization concepts in the 27 European Union (EU member states and the four non-EU countries of the Global Health Security Action Group. Methods Between September and December 2006 data was collected for each country through two data sources: (i the national influenza pandemic plan; (ii contacting key persons involved in pandemic planning by email and/or phone and/or fax Results Twenty-six (84% countries had established at least one vaccine priority group. Most common reported vaccine priority groups were health care workers (HCW (100%, essential service providers (ESP (92% and high risk individuals (HRI (92%. Ranking of at least one vaccine priority group was done by 17 (65% of 26 countries. Fifteen (88% of these 17 countries including a ranking strategy, decided that HCW with close contact to influenza patients should be vaccinated first; in most countries followed and/or ranked equally by ESP and subsequently HRI. Rationales for prioritization were provided by 22 (85% of 26 countries that established vaccine priority groups. There was large variation in the phrasing and level of detailed specification of rationales. Seven (32% of 22 countries providing rationales clearly associated each vaccine priority group with the specific rationale. Ten (32% of the 31 countries studied countries have consulted and involved ethical experts to guide decisions related to vaccine prioritization. Conclusion In the majority of

  15. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  16. Ethical Hacking in Information Security Curricula

    Science.gov (United States)

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  17. A new course or simply discourse? : The security discourse strategies of Felipe Calderón Hinojosa and Enrique Peña Nieto in the Mexican war on drugs

    OpenAIRE

    Ölfvingsson, Petter

    2017-01-01

    Since the beginning of the Mexican war on drugs in late 2006, violence has increased dramatically. By examining six presidential speeches from different years and with an analysis grounded in the work of Norman Fairclough and his Critical Discourse Analysis (CDA), this thesis analyses the security discourse strategies used by the two Mexican Presidents Felipe Calderón Hinojosa and Enrique Peña Nieto. By studying the parts where they talk about insecurity and organized crime, the study aims to...

  18. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage; Infraestructura de apoyo a las estrategias de operacion frente a la ocurrencia de sucesos extraordinarios: Area segura de almacenamiento de equipos

    Energy Technology Data Exchange (ETDEWEB)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-07-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  19. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-06-15

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  20. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  1. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  4. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  5. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  6. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    accompany the drawing up of a new security strategy for the country. A step in the right direction would be if, after public debate, the Government submitted a new version of the country’s security strategy for consideration and approval to the Parliament as the supreme representative body. The new strategy would thus be assigned greater importance than that of 2003 which was adopted only by the Government and, as a result, was often denied the status of a binding document. A broader public debate over the new security strategy would help ensure that the extended concept of security is more fully implemented in practice.

  7. Assessment of Food Security Situation of Tiv Farming households in ...

    African Journals Online (AJOL)

    The analysis of food security situation shows that majority (64.1%) of these households were food secured. This could be because those strategies for ensuring food security is working for majority of the families. Also on the strategies put in place to ensure households' food security were the use of high yielding crop ...

  8. 76 FR 41278 - Cargo Security Risk Reduction; Public Listening Sessions

    Science.gov (United States)

    2011-07-13

    ... SECURITY Coast Guard Cargo Security Risk Reduction; Public Listening Sessions AGENCY: Coast Guard, DHS... public and private sector stakeholders, across the Security Spectrum.\\1\\ \\1\\ The Security Spectrum... progress and development of a CDC Security National Strategy to reduce risks associated with the transport...

  9. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  10. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  11. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public... Mangement Agency. (2009). Nebraska 2009 state homeland security strategy. Retrieved August 19, 2010, from http://www.nema.ne.gov/content/home_news/2009

  12. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  13. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  14. Effective Management of Information Security and Privacy

    Science.gov (United States)

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  15. Simplified Threshold RSA with Adaptive and Proactive Security

    DEFF Research Database (Denmark)

    Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2006-01-01

    We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security of a pr...... of a proactive threshold signature scheme which was previously assumed to be only statically secure. As a separate contribution we prove that our protocol is secure in the UC framework.......We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security...

  16. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  17. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  18. Environmental Threats to Security, Stability, and U.S. Interests in Southern Africa: Opportunity Knocks - Time for a Comprehensive Region Defense Environmental International Cooperation and Environmental Security Assistance Strategy

    Science.gov (United States)

    2009-01-01

    environmental efforts. Such as strategy should be centered upon three pillars: 1. Geography (anchor state and ink spot approach) 2. Environmental...Furthermore, human induced soil erosion and degradation - driven by tree cutting for firewood and charcoal production, commercial afforestation and...of stream flow), and fishing.59 Much of this is due to illegal logging for charcoal production (for domestic and transborder markets) enabled by

  19. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  20. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  2. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  3. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  4. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  5. Secure Directories

    OpenAIRE

    Chadwick, David W.

    2000-01-01

    This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol. Security can be provided by three functions: an application level firewall, an authentication mechanism, and an access control scheme. A description of the X.500 and LDAP access control models is presented followed by the authentication method...

  6. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  7. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  8. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  9. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  10. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe......, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following...... World War I it is not surprising that a salient feature of the defence debate is aversion against armed conflict. The Wilsonian agenda of a new system of collective security featuring prominently in the peace talks as well as in European debate generally does indeed have ramifications in Danish...

  11. Streamlining National Security Workshop. The Overseas Group, Issue Paper 11-01, October 2001

    National Research Council Canada - National Science Library

    Pasquarett, Mike; Kievit, James; Carney, Pat; Dillon, Dick

    2001-01-01

    .... national security organizations remained relatively unchanged. After his election, President Bush directed his national security team to undertake a sweeping review of future strategies and their supporting structures...

  12. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  13. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  14. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  15. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  16. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in

  17. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  18. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  19. Performance Issues on Integration of Security Services

    Science.gov (United States)

    Pereira, Fábio Dacêncio; Moreno, Edward David

    The integration of security services is an important solution to combat anomalies and attacks on computer systems, assuming that possible difficulties of a security service may be compensated by others. The current works that aim to integrate two or more security services are usually focused on a particular implementation strategy, because the systematic approach to integrated security systems requires the analysis of relations between security data. In our work was proposed and developed a Security Services Integrated Layer (SSIL), consisting of an organization pattern of information security, as well as behavioral models to analyze the occurrence of abnormality identified. The Hidden Markov Model and the proposed solutions as subHMM and Sequential Model allowed the integration of security services based on behavior. In this article we highlight the rates of detection of anomalies and a critical analysis of results.

  20. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  1. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  2. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  3. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  4. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  5. Homeland Security Affairs Journal, Volume V - 2009: Issue 2, May

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. May 2009. This issue of Homeland Security Affairs opens on a...

  6. Homeland Security Affairs Journal, Volume V - 2009: Issue 1, January

    OpenAIRE

    2009-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. January 2009. In this issue of Homeland Security Affairs we ...

  7. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear view of a country’s...

  8. Control Systems Security Test Center - FY 2004 Program Summary

    Energy Technology Data Exchange (ETDEWEB)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  9. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  10. Security Strategy of the Bureau of Diplomatic Security.

    Science.gov (United States)

    2011-06-10

    The curriculum is extremely demanding both mentally and physically and requires agents to be in excellent health and physical conditioning...Countries with Anti-American Incidents Mauritania 1 Kenya 1 Somalia 2 Zimbabwe 1 Target of Anti-American Incidents American...Countries with Anti-American Incidents Chad 1 Ethiopia 1 Nigeria 1 Sudan 1 Zimbabwe 1 Target of Anti-American Incidents

  11. A Design Methodology for Computer Security Testing

    OpenAIRE

    Ramilli, Marco

    2013-01-01

    The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. ...

  12. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    computer codes and methodologies applied to SSTAR. Another section of the report details the SSTAR safety design approach which is based upon defense-in-depth providing multiple levels of protection against the release of radioactive materials and how the inherent safety features of the lead coolant, nitride fuel, fast neutron spectrum core, pool vessel configuration, natural circulation, and containment meet or exceed the requirements for each level of protection. The report also includes recent results of a systematic analysis by LANL of data on corrosion of candidate cladding and structural material alloys of interest to SSTAR by LBE and Pb coolants; the data were taken from a new database on corrosion by liquid metal coolants created at LANL. The analysis methodology that considers penetration of an oxidation front into the alloy and dissolution of the trailing edge of the oxide into the coolant enables the long-term corrosion rate to be extracted from shorter-term corrosion data thereby enabling an evaluation of alloy performance over long core lifetimes (e.g., 30 years) that has heretofore not been possible. A number of candidate alloy specimens with special treatments or coatings which might enhance corrosion resistance at the temperatures at which SSTAR would operate were analyzed following testing in the DELTA loop at LANL including steels that were treated by laser peening at LLNL; laser peening is an approach that alters the oxide-metal bonds which could potentially improve corrosion resistance. LLNL is also carrying out Multi-Scale Modeling of the Fe-Cr system with the goal of assisting in the development of cladding and structural materials having greater resistance to irradiation.

  13. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  14. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  15. Privacy and security disclosures on telecardiology websites

    NARCIS (Netherlands)

    Dubbeld, L.

    2006-01-01

    This article discusses telemedicine providers¿ online privacy and security disclosures. It presents the results of an exploratory study of a number of telecardiology companies¿ Web sites, providing insight in some of the current strategies towards data protection and information security in the

  16. Social Security and Fighting Poverty in Tunisia

    Directory of Open Access Journals (Sweden)

    Hasna Khemili

    2018-02-01

    Full Text Available The objective of this study was to examine the role of social security in fighting poverty in Metlaoui, Tunisia, using survey data collected between July 2012 and January 2014, covering 200 poor households. We used questionnaire data, which gave a thorough analysis of the reactions, behavior, and strategies adopted by poor households as a result of various forms of risk. Social security has an effect on a number of different areas, including health, education, housing, and income. Our methodology explored both complete and partial risk-sharing, to investigate the impact of social security schemes on the strategies adopted by households to cope with economic shocks. The estimation results of different models showed that social security could help social security-covered households choose less costly strategies to cope with risks. However, the role of social security remains insufficient, given that covered households had less confidence in its services and they adopted strategies of self-insurance or income smoothing. Overall, the results showed that social security plays an important role in Metlaoui, but it remains insufficient, especially for households that are not covered by social security and are suffering from heavy health expenditures.

  17. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  18. Year 2000 Conversion Within the Defense Security Service

    National Research Council Canada - National Science Library

    1999-01-01

    .... Our objective was to determine whether the Defense Security Service effectively planned, executed, and coordinated year 2000 management strategies to ensure that year 2000 related issues would...

  19. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  20. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  1. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  2. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  3. Concepts and Practices of Cooperative Security

    DEFF Research Database (Denmark)

    Keating, Vincent; Wheeler, Nicholas J

    2013-01-01

    This chapter considers how the security dilemma can be overcome in ways that promote cooperation and even trust, mitigating or transcending the international uncertainty that can otherwise inhibit interstate cooperation. It argues that there are two mechanisms to create the trust necessary...... for the development of a security community, Charles Osgood's GRIT strategy and a unilateral 'leap of trust.' Both of these, however, initially require elites to develop security dilemma sensibility. The long-term stability of security communities is fundamentally linked to the presence of embedded trust among...

  4. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  5. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  6. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  7. 49 CFR 1542.201 - Security of the secured area.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section...

  8. Open source systems security certification

    CERN Document Server

    Damiani, Ernesto; El Ioini, Nabil

    2009-01-01

    Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems, including OSS, meet performance and security requirements as well as achieving the necessary certifications, according to the overall strategy of OSS usage on the part of the adopter

  9. Guide to National Security Policy and Strategy

    Science.gov (United States)

    2004-07-01

    response by the losing side at war’s end throughout history. Others blamed the protesters—“the hippie -freak/pinko/commie/fags”—for undermining the...by freeing censorship in television, movies, music , art, and literature. On all levels, in various forms and degrees, reports on the horrors and...is music without instruments.” So did John F. Kennedy: “Diplomacy and defense are not substitutes for one another. Either alone would fail.”29 Major

  10. Multibiometric Systems: Fusion Strategies and Template Security

    Science.gov (United States)

    2008-01-01

    help as CSE graduate directors, Dr. Li Xiao for her encouragement and support, Dr. Jon Sticklen for his support during my tenure as a teaching assistant...are due to physical factors like vocal tract shape, and other characteristics such as word or phoneme pronunciation (e.g., dialect), use of...Specification of CASIA Iris Image Database (ver 1.0). http://www.nlpr.ia.ac.cn/ english /irds/irisdatabase.htm, March 2007. [40] K. Choi, H. Choi, and J. Kim

  11. Guide to National Security Policy and Strategy

    Science.gov (United States)

    2006-06-01

    developed states caused socialism to flourish, creating revolutionary pressures that threatened the established order. Karl Marx promulgated his economic...left unfinished, and, in fact, breaks off abruptly in the midst of a paragraph.23 More important than the details of this modest biography is what it...Great War of the Ancient Greeks, New York: Thomas Seltzer, 1920, for parallels with the First World War; or Carlos Alonso Zaldívar, “Tucídides, en

  12. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  13. Enhancing passenger safety and security in Ghana: Appraising ...

    African Journals Online (AJOL)

    There are increasing calls for regular monitoring and evaluation of safety and security strategies of public transport (PT) operators, especially in developing countries where PT safety and security concerns abound. In respect of this, this study examined the passenger safety and security interventions of PT operators in ...

  14. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    Science.gov (United States)

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  15. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  16. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  17. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  18. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  19. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  20. Sustainable Food Security Measurement: A Systemic Methodology

    Science.gov (United States)

    Findiastuti, W.; Singgih, M. L.; Anityasari, M.

    2017-04-01

    Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.

  1. Water Security in the Syr Darya Basin

    Directory of Open Access Journals (Sweden)

    Kai Wegerich

    2015-08-01

    Full Text Available The importance of water security has gained prominence on the international water agenda, but the focus seems to be directed towards water demand. An essential element of water security is the functioning of public organizations responsible for water supply through direct and indirect security approaches. Despite this, there has been a tendency to overlook the water security strategies of these organizations as well as constraints on their operation. This paper discusses the critical role of water supply in achieving sustainable water security and presents two case studies from Central Asia on the management of water supply for irrigated agriculture. The analysis concludes that existing water supply bureaucracies need to be revitalized to effectively address key challenges in water security.

  2. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  3. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  4. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  5. Practical unix & internet security

    National Research Council Canada - National Science Library

    Garfinkel, Simson; Spafford, Gene; Schwartz, Alan

    2003-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Part I. Computer Security Basics 1. Introduction: Some Fundamental Questions What Is Computer Security? What Is an Operating System? What Is a...

  6. Practical unix & internet security

    National Research Council Canada - National Science Library

    Garfinkel, Simson; Spafford, Gene; Schwartz, Alan

    2003-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Part I. Computer Security Basics 1. Introduction: Some Fundamental Questions What Is Computer Security? What Is an Operating System? What Is a Deployment...

  7. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  8. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  9. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    Science.gov (United States)

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  10. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  11. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  12. Security Management of Intelligent Technologies in Business Intelligence Systems

    OpenAIRE

    Kadan, A.

    2012-01-01

    The article discusses the security methods of intelligent technologies in Business Intelligence (BI) systems. Security technologies are considered taking into account BI four-layer architecture which includes: а) transactional systems layer; b) ETL-procedures – extraction, conversions and data loading layer; c) data warehouses and data marts layer; d) OLAP-tools and user interface layer. The characteristic of the general BI systems security technologies, data storage security strategies and i...

  13. Homeland Security Affairs Journal, Volume III - 2007: Issue 3, September

    OpenAIRE

    2007-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. September 2007. Six years after the attacks of 9/11, the pra...

  14. Cloud Security Engineering: Theory, Practice and Future Research

    OpenAIRE

    Choo, K-K. R.; Rana, O. F.; Rajarajan, M.

    2017-01-01

    The eleven papers in this special issue address security and privacy concerns associated with cloud computing. This special issue is dedicated to the identification of techniques that enable security mechanisms to be engineered and implemented in cloud services and cloud systems. A key focus is on the integration of theoretical foundations with practical deployment of security strategies that make cloud systems more secure for both end users and providers – enabling end users to increase the ...

  15. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  16. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  17. From Secure Memories to Smart Card Security

    Science.gov (United States)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  18. Spacepower for Australias Security - Grand Strategy or Strategy of Grandeur

    Science.gov (United States)

    2012-06-01

    and Griffith, The Illustrated Art of War, 91. 29 Max Weber and Talcott Parsons , The Theory of Social and Economic Organization (New York: Free Press...Weber, Max, and Talcott Parsons . The Theory of Social and Economic Organization. New York: Free Press, 1964. Weeden, Brian C., and T.S. Kelso...air traffic control, aerodromes, design standards and legislation, inspection regimes, maintenance schedules, training and education , and tens of

  19. New computer security measures

    CERN Multimedia

    IT Department

    2008-01-01

    As a part of the long-term strategy to improve computer security at CERN, and especially given the attention focused to CERN by the start-up of the LHC, two additional security measures concerning DNS and Tor will shortly be introduced. These are described in the following texts and will affect only a small number of users. "PHISHING" ATTACKS CONTINUE CERN computer users continue to be subjected to attacks by people trying to infect our machines and obtain passwords and other confidential information by social engineering trickery. Recent examples include an e-mail message sent from "La Poste" entitled "Colis Postal" on 21 August, a fake mail sent from web and mail services on 8 September, and an e-mail purporting to come from Hallmark Cards announcing the arrival of an electronic postcard. However, there are many other examples and there are reports of compromised mail accounts being used for more realistic site-specific phishing attempts. Given the increased publicity rela...

  20. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  1. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  2. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  3. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  4. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  5. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...

  6. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...... models to evaluate qualitative and quantitative security properties of socio-technical systems and to synthesise optimal attack and defence strategies. In support to this claim we develop analysis techniques for widely-used graphical security models such as attack trees and attack-defence trees. Our...

  8. A Survey of the European Security Market

    OpenAIRE

    Carlos Martí Sempere

    2011-01-01

    This document synthesizes the results of the research made on the European security market. It deals with questions of interest regarding the provision of security goods and services for protecting society from terrorism and organised crime. It explores issues such as market revenues, demand and supply, industrial capabilities, technology, research and development, innovation, business strategies, competition as well as market structure, agents' conduct and economic performance. The research ...

  9. Security in Libraries: Matching Responses to Risks

    Directory of Open Access Journals (Sweden)

    Martin Gill

    2008-09-01

    Full Text Available Security in libraries is a major issue. The need to permit public access and at the same time protect what are often valuable resources can sometimes conflict. In this paper it is argued that it is vital to develop a holistic strategy, and one of the best ways of developing effective responses is to understand how offenders behave and target security resources to counteracting specific threats.

  10. A Survey of Sensor Network Security

    OpenAIRE

    Vaseashta, A.; S. VASEASHTA

    2008-01-01

    Sensor networks deploy sensor nodes to detect and monitor environmental events and interactions. Existing sensor networks focus on communication within the bounds of resource restrained sensor nodes at the expense of security. In this paper, a review of sensor network components, architectures, algorithms and protocols aims to increase awareness of sensor network limitations and resulting strategies to ensure information security within wireless sensor networks. Because sensor networks deploy...

  11. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  12. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  13. Sustainable development strategy formation for business corporations

    Directory of Open Access Journals (Sweden)

    L. A. Zaporozhtseva

    2016-01-01

    Full Text Available The article explains the concept of the company sustainable development strategy based on its economic security level, which includes the economic security concept loss threat control; and the concept of company sustainable development based on the fact, that the company in a developed market should not only "defend", but also ensure its development. After it implementation of decomposition is applied to the system of strategic economic security through a balanced scorecard, which allows translating the mission and vision into a set of operational goals and targets. The main components of strategic economic security provision are: business processes, finance, contractors and staff; based on the state which economic security level is determined as: high, normal, low or critical. After that, the strategic prospects are set, i.e. transition from the lowest to the highest economic security level takes place, passing the economic security fields. In order to do this, certain company development strategy is selected, the mechanism for its implementation is being worked out. At the same time, company sustainable development strategy is identified in the case of a growth strategy use, which implies a transition from endogenous development strategy to introductive or introspective development strategy with further access to multi-integral development strategy. If there is inverse relationship, one can not speak of any sustainable development strategy. Besides, development, implementation and use of monitoring for the design process of the company's development strategy taking into account its economic security level acquires great importance.

  14. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  15. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  16. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism.......Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  17. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  18. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  19. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  20. A Hierarchical Security Architecture for Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  1. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  2. Social Security Administration

    Science.gov (United States)

    ... a my Social Security account. Newsroom Social Security's Fiscal Year (FY) 2017 Agency Financial Report (AFR) Our ... Us Accessibility FOIA Open Government Glossary Privacy Report Fraud, Waste or Abuse Site Map Other Government Websites: ...

  3. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  4. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  5. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  6. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  7. Security system signal supervision

    Energy Technology Data Exchange (ETDEWEB)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  8. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  9. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  10. Network Security Visualization

    Science.gov (United States)

    1999-09-27

    Internet Scanner 5.2 User Guide for Windows NT”, Internet Security Systems, Inc., 1998. “SBIR Topic AF97-043 Network Security Visualization...to the Server application to import into the NSV system database data that gets queried from ISS Internet Security Scanner 5.4. Objective #5 was... Internet Security Scanner scan of a live network and imported through a Cartridge component. The data was accessed through the Server component and

  11. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  12. Computer Security Models

    Science.gov (United States)

    1984-09-01

    September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...given in Section 5, in the form of questions and answers about security modeling. A glossary of terms used in the context of computer security is...model, so we will not be able to pursue it in this report. MODEL CHARACTERISTICS Computer security models are engineering models, giving them somewhat

  13. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  14. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  15. Advanced Linux Security

    OpenAIRE

    Ranjit Nimbalkar

    2013-01-01

    Using mandatory access control greatly increases the secu-rity of an operating system. SELinux, which is an implemen-tation of Linux Security Modules (LSM), implements several measures to prevent unauthorized system usage. The se-curity architecture used is named Flask, and provides a clean separation of security policy and enforcement. This paper is an overview of the Flask architecture and the implementation in Linux.

  16. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  17. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  18. Lemnos interoperable security project.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  19. Crayons and security

    Directory of Open Access Journals (Sweden)

    Sue Dwyer

    1999-04-01

    Full Text Available Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  20. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  1. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  2. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...... the US role in Africa using geopolitical theories derived from Zbigniew Brzezinski, Mahan and Thomas P.M. Barnett. The paper will explore the possible roles of AFRICOM as instrument of US foreign policy and the implications thereof for Danish policy on the African continent....

  3. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  4. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  5. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  6. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  7. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. Social Security: Theoretical Aspects

    Directory of Open Access Journals (Sweden)

    O. I. Kashnik

    2013-01-01

    Full Text Available The paper looks at the phenomena of security and social security from the philosophical, sociological and psychological perspective. The undertaken analysis of domestic and foreign scientific materials demonstrates the need for interdisciplinary studies, including pedagogy and education, aimed at developing the guidelines for protecting the social system from destruction. The paper defines the indicators, security level indices and their assessment methods singled out from the analytical reports and security studies by the leading Russian sociological centers and international expert organizations, including the United Nations.The research is aimed at finding out the adequate models of personal and social security control systems at various social levels. The theoretical concepts can be applied by the teachers of the Bases of Life Safety course, the managers and researches developing the assessment criteria and security indices of educational environment evaluation, as well as the methods of diagnostics and expertise of educational establishments from the security standpoint. 

  9. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  10. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  11. Public Health in Serbia through the Lens of Security: A Review Article

    OpenAIRE

    Rokvić, Vanja; Zoran JEFTIĆ; Vladimir AJZENHAMER

    2016-01-01

    Background: In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemp...

  12. Process Control Systems in the Chemical Industry: Safety vs. Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  13. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  14. Effects of Different Strategies Adopted by Rural Women on their ...

    African Journals Online (AJOL)

    ADENIYI

    Multistage sampling procedure was adopted for this research work. Data collected ... Keywords: Backyard farming, food security strategies, food security constraints and reduction of meals. ..... expenditures on basic services such as health.

  15. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  16. Household Food Security Policy Analysis A System Dynamics Perspective

    OpenAIRE

    Isdore Paterson Guma; Agnes Semwanga Rwashana; Benedict Oyo

    2015-01-01

    Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodo...

  17. Security-aware cooperation in cognitive radio networks

    CERN Document Server

    Zhang, Ning

    2014-01-01

    This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into

  18. An approach based on defense-in-depth and diversity (3D) for the reliability assessment of digital instrument and control systems of nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Paulo Adriano da; Saldanha, Pedro L.C., E-mail: pasilva@cnen.gov.b, E-mail: Saldanha@cnen.gov.b [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Coord. Geral de Reatores Nucleares; Melo, Paulo F. Frutuoso e, E-mail: frutuoso@nuclear.ufrj.b [Universidade Federal do Rio de Janeiro (PEN/COPPE/UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-Graduacao em Engenharia. Programa de Engenharia Nuclear; Araujo, Ademir L. de [Associacao Brasileira de Ensino Universitario (UNIABEU), Angra dos Reis, RJ (Brazil)

    2011-07-01

    The adoption of instrumentation and control (I and C) digital technology has been slower in nuclear power plants. The reason has been unfruitful efforts to obtain evidence in order to prove that I and C systems can be used in nuclear safety systems, for example, the Reactor Protection System (RPS), ensuring the proper operation of all its functions. This technology offers a potential improvement for safety and reliability. However, there still no consensus about the model to be adopted for digital systems software to be used in reliability studies. This paper presents the 3D methodology approach to assess digital I and C reliability. It is based on the study of operational events occurring in NPPs. It is easy to identify, in general, the level of I and C system reliability, showing its key vulnerabilities, enabling to trace regulatory actions to minimize or avoid them. This approach makes it possible to identify the main types of digital I and C system failure, with the potential for common cause failures as well as evaluating the dominant failure modes. The MAFIC-D software was developed to assist the implementation of the relationships between the reliability criteria, the analysis of relationships and data collection. The results obtained through this tool proved to be satisfactory and complete the process of regulatory decision-making from licensing I and C digital of NPPs and call still be used to monitor the performance of I and C digital post-licensing during the lifetime of the system, providing the basis for the elaboration of checklists of regulatory inspections. (author)

  19. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  20. Complicating food security: Definitions, discourses, commitments

    Directory of Open Access Journals (Sweden)

    William Ramp

    2014-12-01

    Full Text Available Food security is now commonly seen as one of the defining global issues of the century, intertwined with population and consumption shifts, climate change, environmental degradation, water scarcity, and the geopolitics attending globalization. Some analysts suggest that food security threats are so urgent that philosophical scruples must be set aside in order to concentrate all resources on developing and implementing radical strategies to avert a looming civilizational crisis. This article suggests that definitions of food security invoke commitments and have consequences, and that continued critical and conceptual attention to the language employed in food security research and policy is warranted.

  1. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  2. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    Science.gov (United States)

    2014-12-01

    House, HR70-14 ed., Homeland Security Database , November 1, 1955. 82 Ibid., iii. 83 Ibid., 33. 24...Tansley, “The Early History of Plant Biology in Britain,” JSTOR : Journal of Ecology, 35, December 1947. doi: http://www.jstor.org/stable/2256503. 303...Strategy, Panel Report to Nelson A. Rockefeller, Special Assistant to the President, White House, HR70-14 ed., Homeland Security Database , November

  3. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  4. Energy Security and Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Emily Meierding

    2013-02-01

    Full Text Available Published by Palgrave MacmillanOver the last decade the topic of energy security has reappeared on global policy agendas. Most analyses of international energy geopolitics examine the interests and behaviour of powerful energy-importing countries like the US and China. This chapter begins by examining foreign powers’ expanded exploitation of oil and uranium resources in Sub-Saharan Africa. It goes on to examine how energy importers’ efforts to enhance their energy security through Africa are impacting energy security within Africa. It assesses Sub-Saharan states’ attempts to increase consumption of local oil and uranium reserves. Observing the constraints on these efforts, it then outlines some alternative strategies that have been employed to enhance African energy security. It concludes that, while local community-based development projects have improved the well-being of many households, they are not a sufficient guarantor of energy security. Inadequate petroleum access, in particular, remains a development challenge. Foreign powers’ efforts to increase their oil security are undermining the energy security of Sub-Saharan African citizens.

  5. AGRICULTURAL PESTS AND FOOD SECURITY AND SFETY

    African Journals Online (AJOL)

    dell

    2012-08-05

    Aug 5, 2012 ... Agricultural pest management control strategies are primarily concerned with food security and safety. Popular .... most of the farmers considered IPM as a computer technology that was not suitable for their own environment or not .... Training modules on conservation agriculture. Land and Water Digital.

  6. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  7. Mitigations for Security Vulnerabilities Found in Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Trent D. Nelson

    2006-05-01

    Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

  8. Building Partner Capacity: Inventory of Department of Defense Security Cooperation and Department of State Security Assistance Efforts

    Science.gov (United States)

    2017-03-24

    provides a security assurance for the proposed visitor when classified information is involved in the visit or assignment; and to facilitate...effort on the basis of agency input and information available in our prior and ongoing work. Our inventory of security cooperation efforts used to...issues in support of U.S. national security strategies through information exchanges, exercises, and workshops. 10 U.S.C. § 1051, Multilateral

  9. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  10. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  11. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  12. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...... of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t

  13. SecurID

    CERN Document Server

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  14. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  15. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  16. European Cyber Security Policy

    OpenAIRE

    Bendiek, Annegret

    2012-01-01

    The gradually developing European cyber security policy tries to establish minimum standards in all EU member states with regard to prevention, resilience and international cooperation. It aims to foster national security without compromising democratic principles or unduly limiting individual liberties. However, it is hard to find a balance between these goals, and the EU’s measures thus inevitably raise questions about the democratic implications of European cyber security policy. Are the i...

  17. Information Security Training & Awareness

    OpenAIRE

    Hogervorst, Monique

    2009-01-01

    Information security standards, best practices and literature all identify the need for Training & Awareness, the theory is clear. The surveys studied show that in the real world the situation is different: the focus of businesses is still on technical information security controls aimed at the external attacker. And although threats and vulnerabilities point out that personnel security becomes more important, the attitude of managers and employees does not reflect tha...

  18. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  19. Design for Security Workshop

    Science.gov (United States)

    2014-09-30

    Apps  Content providers  DRM for movies, songs, etc.  Finance companies  Account data, passwords  IOT  home automation , health, etc... devices and systems  Tools for secure interplay between hardware and software  Design environment for modeling and simulating hardware attacks and...and email  Improperly secured devices – no PIN lock  User intervention – jailbreaking, unlocking  Mobile has become the enterprise security

  20. Enhancing mobile learning security

    OpenAIRE

    Shonola, Shaibu Adekunle; Joy, Mike

    2016-01-01

    Mobile devices have been playing vital roles in modern day education delivery as students can access or download learning materials on their smartphones and tablets, they can also install educational apps and study anytime, anywhere. The need to provide adequate security for portable devices being used for learning cannot be underestimated. In this paper, we present a mobile security enhancement app, designed and developed for Android smart mobile devices in order to promote security awarenes...

  1. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  2. Rome Laboratory Computer Security

    Science.gov (United States)

    1993-10-11

    34) 11101993 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") Title and Subtitle Rome Laboratory Computer Security Contract or Grant Number...Rome Laboratory Computer Security 5. FUNDING NUMBERS 6. AUTHOR(S) Joseph Giordano 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...UNCLASSIFIED 20. LIMITATION OF ABSTRACT None COMPUTER SECURITY OBJECTIVE: TO DEVELOP & DEMONSTRATE THE TOOLS & TECHNOLOGY NECESSARY TO REALIZE TRUSTED C31

  3. Computer Security Assistance Program

    Science.gov (United States)

    1997-09-01

    Information COMPUTER SECURITY ASSISTANCE PROGRAM OPR: HQ AFCA/SYS (CMSgt Hogan) Certified by: HQ USAF/SCXX (Lt Col Francis X. McGovern) Pages: 5...Distribution: F This instruction implements Air Force Policy Directive (AFPD) 33-2, Information Protection, establishes the Air Force Computer Security Assistance...Force single point of contact for reporting and handling computer security incidents and vulnerabilities including AFCERT advisories and Defense

  4. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  5. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  6. 77 FR 66351 - Establishing the White House Homeland Security Partnership Council

    Science.gov (United States)

    2012-11-02

    ... expertise, drive innovation, engage in collective action, broaden investments to achieve shared goals, and..., and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring...

  7. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  8. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  9. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  10. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  11. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  12. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  13. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  14. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  15. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  16. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  17. Corporate strategic plan for safeguards and security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department`s diverse security needs. As an integral part of the nation`s security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation`s and international security environments.

  18. Diversity Strategies for Nuclear Power Plant Instrumentation and Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wood, Richard Thomas [ORNL; Belles, Randy [ORNL; Cetiner, Mustafa Sacit [ORNL; Holcomb, David Eugene [ORNL; Korsah, Kofi [ORNL; Loebl, Andy [ORNL; Mays, Gary T [ORNL; Muhlheim, Michael David [ORNL; Mullens, James Allen [ORNL; Poore III, Willis P [ORNL; Qualls, A L [ORNL; Wilson, Thomas L [ORNL; Waterman, Michael E. [U.S. Nuclear Regulatory Commission

    2010-02-01

    This report presents the technical basis for establishing acceptable mitigating strategies that resolve diversity and defense-in-depth (D3) assessment findings and conform to U.S. Nuclear Regulatory Commission (NRC) requirements. The research approach employed to establish appropriate diversity strategies involves investigation of available documentation on D3 methods and experience from nuclear power and nonnuclear industries, capture of expert knowledge and lessons learned, determination of best practices, and assessment of the nature of common-cause failures (CCFs) and compensating diversity attributes. The research described in this report does not provide guidance on how to determine the need for diversity in a safety system to mitigate the consequences of potential CCFs. Rather, the scope of this report provides guidance to the staff and nuclear industry after a licensee or applicant has performed a D3 assessment per NUREG/CR-6303 and determined that diversity in a safety system is needed for mitigating the consequences of potential CCFs identified in the evaluation of the safety system design features. Succinctly, the purpose of the research described in this report was to answer the question, 'If diversity is required in a safety system to mitigate the consequences of potential CCFs, how much diversity is enough?' The principal results of this research effort have identified and developed diversity strategies, which consist of combinations of diversity attributes and their associated criteria. Technology, which corresponds to design diversity, is chosen as the principal system characteristic by which diversity criteria are grouped to form strategies. The rationale for this classification framework involves consideration of the profound impact that technology-focused design diversity provides. Consequently, the diversity usage classification scheme involves three families of strategies: (1) different technologies, (2) different approaches within

  19. Quantum Secure Direct Communication Based on Chaos with Authentication

    Science.gov (United States)

    Huang, Dazu; Chen, Zhigang; Guo, Ying; Lee, Moon Ho

    2007-12-01

    A quantum secure direct communication protocol based on chaos is proposed with authentication. It has an advantage over distributing the secret message directly and verifying the communicators’ identities with the assistance of a trusted center. To ensure the security of the secret message and the process of verification, the initial order of the travel particles is disturbed according to a chaotic sequence generated secretly via the general Arnold map. Security analysis demonstrates that the present scheme is secure against several attack strategies, such as the man-in-the-middle attack and Trojan horse attack.

  20. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  1. Securing Personal Network Clusters

    NARCIS (Netherlands)

    Jehangir, A.; Heemstra de Groot, S.M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  2. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  3. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  4. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  5. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    thereby reducing the number of bits required for transmissions . Further assume that the system designers would like even greater security regarding...scenarios. A common systemic security analogy for cognition lies within the context of a command and control structure’s observe, orient, decide... telephony , satellite communications and networks). Critical Program Information (CPI): ICT that is a critical component is defined as Critical

  6. CIOs Uncensored: Security Smarts.

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  7. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  8. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  9. Hydrological extremes and security

    Directory of Open Access Journals (Sweden)

    Z. W. Kundzewicz

    2015-04-01

    Full Text Available Economic losses caused by hydrological extremes – floods and droughts – have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes − floods and droughts − are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state’s task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  10. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  11. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  12. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  13. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  14. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  15. Wireless physical layer security.

    Science.gov (United States)

    Poor, H Vincent; Schaefer, Rafael F

    2017-01-03

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  16. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  17. Energy security in Yemen

    Energy Technology Data Exchange (ETDEWEB)

    Torosyan, Emil

    2009-09-15

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  18. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  19. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  20. Safety and Security in a School Environment: The Role of Dress Code Policies

    Science.gov (United States)

    Workman, Jane E.; Freeburg, Beth Winfrey

    2006-01-01

    This study examined high school student handbooks for evidence that school administrators consider dress codes as one strategy to address the physical and psychological security of students. "Physical" security refers to freedom from actual harm to the body. "Psychological security refers to freedom from implied threats to personal well-being.…

  1. 76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Science.gov (United States)

    2011-06-14

    ... expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from National Strategy for... Protection and Programs Directorate, DHS, on the white paper, ``Enabling Distributed Security in Cyberspace...

  2. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  3. What Price Sovereignty? The Two Faces of Engagement and the Paradox of Power: A Comparison of the Security and Grand Strategies of the United States and the European Union

    Science.gov (United States)

    2012-01-01

    successive governments regardless of ideology . American grand strategy developed in stages, seeking to achieve specific geopolitical imperatives, facilitated...advertising of the Market Empire eventually translated into other realms of mass consumption as well, like the exportation of American Hollywood cinema ...policy behavior as seen in the dichotomy between the American analytical and ideological tradition approaches to American foreign policy. 71 A

  4. 48 CFR 3034.004 - Acquisition strategy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Acquisition strategy. 3034.004 Section 3034.004 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND... Acquisition strategy. See (HSAR) 48 CFR 3009.570 for policy applicable to acquisition strategies that consider...

  5. DEMOGRAPHIC SECURITY: THEORY, METHODOLOGY, EVALUATION

    Directory of Open Access Journals (Sweden)

    Mikhail V. Karmanov

    2015-01-01

    Full Text Available The paper analyzes the theoretical aspects of demographic security. Reviewed and analyzed the point of view of various scholars to the definition of demographic security. The main directions of statistical analysis of demographic security.

  6. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  7. Improving the security of secure direct communication based on the secret transmitting order of particles

    Science.gov (United States)

    Li, Xi-Han; Deng, Fu-Guo; Zhou, Hong-Yu

    2006-11-01

    We analyzed the security of the secure direct communication protocol based on the secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang[Phys. Rev. A 73, 022338 (2006)] and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon, or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.

  8. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  9. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  10. Agile IT Security Implementation Methodology

    CERN Document Server

    Laskowski, Jeff

    2011-01-01

    The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts.

  11. A Strategy for Mexico?

    Science.gov (United States)

    2011-06-10

    taking action in a foreign country. In 2010 there were more than 15,000 people killed in Mexico.4 Complicating this statistic was the belief that...control over the population .31 In an attempt to gain the upper hand in restoring order throughout the country the Calderon administration began battling...what is being called the existing strategy was the Merida Initiative.43 The Merida initiative is a security cooperation agreement between the United

  12. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  13. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  14. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  15. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  16. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  17. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  18. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts.......Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...

  19. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  20. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  1. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  2. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  3. Information security of educational environments of school

    Directory of Open Access Journals (Sweden)

    Dzyatkovskaya Elena N.

    2016-01-01

    Full Text Available The information as an important ecological factor, which defines the security, development and health of children is considered. The article raises the problem of distortion of the information environment of childhood in the post-industrial era. The aim is to ensure information security educational environment for all participants in the educational process. It is proved that the hygienic approach to solving problems is insufficient. Adaptive-developing strategy for information security of the educational environments for children was theoretically justified and proved by the practical results of medical, physiological and neuropsychological research. It provides the school work on the compensation of violations of the information environment of childhood; development resources of students’ resistance to information stress; expanding the sphere of their adaptation to the information load (adaptive norm; the principles and structure of management of educational process on the basis of system-wide control of complex, self-regulating systems.

  4. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  5. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  6. Network Security Visualization

    National Research Council Canada - National Science Library

    1999-01-01

    The application of interactive, three-dimensional viewing techniques to the representation of security-related, computer network status and events is expected to improve the timeliness and efficiency...

  7. Architecting Security with Paradigm

    Science.gov (United States)

    Andova, Suzana; Groenewegen, Luuk P. J.; Verschuren, Jan H. S.; de Vink, Erik P.

    For large security systems a clear separation of concerns is achieved through architecting. Particularly the dynamic consistency between the architectural components should be addressed, in addition to individual component behaviour. In this paper, relevant dynamic consistency is specified through Paradigm, a coordination modeling language based on dynamic constraints. As it is argued, this fits well with security issues. A smaller example introduces the architectural approach towards implementing security policies. A larger casestudy illustrates the use of Paradigm in analyzing the FOO voting scheme. In addition, translating the Paradigm models into process algebra brings model checking within reach. Security properties of the examples discussed, are formally verified with the model checker Literal>mCRL2Literal>.

  8. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  9. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  10. Proliferation Security Initiative (PSI)

    National Research Council Canada - National Science Library

    Squassoni, Sharon

    2005-01-01

    President Bush announced the Proliferation Security Initiative (PSI) on May 31, 2003. Since then, 16 nations have pledged their cooperation in interdicting shipments of weapons of mass destruction-related...

  11. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  12. National Special Security Events

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ...) as National Special Security Events (NSSE) Beginning in September 1998 through February 2007, there have been 27 events designated as NSSEs Some of these events have included presidential inaugurations, presidential nominating conventions...

  13. Intelligent Sensors Security

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2010-01-01

    Full Text Available The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408 used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC related security design patterns and to improve the effectiveness of the sensor development process.

  14. Aggression And Attachment Security

    Directory of Open Access Journals (Sweden)

    Prem Verma

    2007-06-01

    Full Text Available Objective:The aim of the present study is to examine the factors related aggression in Iranian and Indian school children. Method: Attachment security (dependency, availability, and total considered as the variable. The KSS questionnaire was administrated students in the 5th grade; 300 were Iranian and 300 were Indian consisted of 150 boys and 150 girls. Results: Attachment security demonstrated significant negative correlations with aggression in the boys, girls and the total Iranian sample. The dependency on mothers was the only case with insignificant correlation.In the Indian sample, attachment security was also found to be significantly negatively correlated with aggression. The only exception was the correlation between mother's availability and aggression in girls, which was not significant Conclusion: It is important that parents treat their children in a tender, manner so that a secure attachment develop between them.

  15. VMware vsphere security cookbook

    CERN Document Server

    Greer, Mike

    2014-01-01

    This book is intended for virtualization professionals who are experienced with the setup and configuration of VMware vSphere, but didn't get the opportunity to learn how to secure the environment properly.

  16. Internet security concerns.

    Science.gov (United States)

    Simpson, R L

    1997-12-01

    Despite all the media hype, critical security issues do surround the Internet. Nurses need to ask two key questions: How is the Internet used in my organization and What kind of Internet connection do we have?

  17. Roadmap on optical security

    NARCIS (Netherlands)

    javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millan, M.S.; Nishchal, N.K.; Torroba, R.; Barrera, J.F.; He, W.; Peng, X.; Stern, A.; Rivenson, Y.; Alfalou, A.; Brosseau, C.; Guo, C.; Sheridan, J.T.; Situ, G.; Naruse, M.; Matsumoto, T.; Juvells, I.; Tajahuerce, E.; Lancis, J.; Chen, Wen; Chen, X.; Markman, A.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2016-01-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical

  18. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...... the bottleneck of sorting networks. And we show how to utilize this construction for four-player MPC. Another line of work has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement...

  19. Media and Security Team

    Data.gov (United States)

    Federal Laboratory Consortium — The Media And Security Team led by Prof. Min Wu was established in Fall 2001 at University of Maryland, College Park. A number of research and education activities...

  20. Intelligent Sensors Security

    Science.gov (United States)

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  1. Managing for Enterprise Security

    National Research Council Canada - National Science Library

    Caralli, Richard A; Allen, Julia H; Stevens, James F; Willke, Bradford J; Wilson, William R

    2004-01-01

    Security has become one of the most urgent issues for many organizations. It is an essential requirement for doing business in a globally networked economy and for achieving organizational goals and mission...

  2. Department of Homeland Security

    Science.gov (United States)

    ... critical infrastructure sectors in the United States and globally. Nov 9 Press Release Acting Secretary Duke Meets ... Travel Alerts Get a Homeland Security Job Do Business with DHS Verify Employment Eligibility (E-Verify) Find ...

  3. NGO field security

    Directory of Open Access Journals (Sweden)

    Randolph Martin

    1999-04-01

    Full Text Available In an environment of increased exposure, deterioration in the rules of war and loss of perceived neutrality, the community of NGOs operating incomplex emergencies is facing significantly increased risks to staff safety and security.

  4. Security Engineering Pilot

    Science.gov (United States)

    2013-02-28

    Analysis Signal Copy Selected Sub-Bands • Gimbaled , Stabilized EO/IR Camera Ball • High Precision GPS & INS (eventual swarm capable inter- UAV coherent...37 Appendix A: System aware Cyber Security UAV Application Project, Presentation to the DoD, November 2012 43...Appendix B: System Aware Cyber Security UAV Application Project, Presentation to DoD, January 7, 2013 ...... 76 UNCLASSIFIED Contract Number

  5. Data Security in Biomedicine

    OpenAIRE

    Horňáková, Anna

    2011-01-01

    This thesis analyzes current state of use of biometrics in computer security. It provides an overview of the most commonly used anatomical-physiological and behavioral biometric identification methods. The result of the work will be a new set of methods, which allows reliable identification of the user in the most comfortable way. These new principles of data security will be used to enhance the protection of specialized health record. This will contribute to expansion of generally conceived ...

  6. Information Security Incident Management

    Directory of Open Access Journals (Sweden)

    D. I. Persanov

    2010-03-01

    Full Text Available The present report highlights the points of information security incident management in an enterprise. Some aspects of the incident and event classification are given. The author presents his view of the process scheme over the monitoring and processing information security events. Also, the report determines a few critical points of the listed process and gives the practical recommendations over its development and optimization.

  7. Computer Security: Competing Concepts

    OpenAIRE

    Nissenbaum, Helen; Friedman, Batya; Felten, Edward

    2001-01-01

    This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing systems (in particular, Mozilla) so that values relevant to web-browser systems are better served than presently they are. The tension, which ...

  8. Data port security lock

    Science.gov (United States)

    Quinby, Joseph D [Albuquerque, NM; Hall, Clarence S [Albuquerque, NM

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  9. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    be achieved through bringing the five dimensions to the analysis and using them to study both the interlinking and the interweaving of security, bordering and governance. Overall, the analysis presented here suggests that the five dimensions of broadening, deepening, thickening, practice and being can all...... contribute to a more expansive understanding of how EU security in the 2000s has been related to bordering and governance processes, and how these have been increasingly interwoven within the EU....

  10. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  11. Security in Internet

    OpenAIRE

    Felician ALECU

    2006-01-01

    A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  12. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  13. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  14. Farm Households' Food Insecurity and their Coping Strategies in ...

    African Journals Online (AJOL)

    This paper argues that understanding farm households' perceptions of food security, food security status, its causes and coping strategies across wealth status and agro-ecology are prerequisites to improve food security status and coping ability. The study is based on data collected from Arsi Negele District in 2009.

  15. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  16. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  17. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  18. Balancing security and liberty within the European human rights framework. A critical reading of the Court’s case law in the light of surveillance and criminal law enforcement strategies after 9/11

    Directory of Open Access Journals (Sweden)

    Paul J.A. de Hert

    2005-07-01

    Full Text Available Literature concerning human rights protection by the European Court on Human Rights after 9/11 is very often coloured by optimism. Some authors hold that judicial control by the European Court on national anti-terrorism measures is very strict, especially compared to U.S. judicial review. Others suggest the existence of a strict privacy test developed by the European Court as a bulwark again anti-terrorism measures that give too much discretion to law enforcement authorities. In this paper we discuss the ‘classical’ European framework with regard to ‘hard’ anti-terrorism measures and the privacy framework that is relevant for new, ‘softer’ anti-terrorism measures. it is argued that this optimistic reading of the European human rights framework in the area of security especially with regard to the latter is flawed and based on a misunderstanding of the case law of the European Court. This analysis leaves little room for optimism about judicial review of the legislator in Europe and urges for an attitude of self-restraint.

  19. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  20. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides