4 resultados para security governance

em Boston University Digital Common


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The issue of ancestors has been controversial since the first encounters of Christianity with Shona religion. It remains a major theological problem that needs to be addressed within the mainline churches of Zimbabwe today. Instead of ignoring or dismissing the ancestor cult, which deeply influences the socio-political, religious, and economic lives of the Shona, churches in Zimbabwe should initiate a Christology that is based on it. Such a Christology would engage the critical day-to-day issues that make the Shona turn to their ancestors. Among these concerns are daily protection from misfortune, maintaining good health and increasing longevity, successful rainy seasons and food security, and responsible governance characterized by economic and political stability. Since the mid-16th century arrival of Jesuit missionaries in the Mutapa Kingdom, the Church has realized that many African Christians resorted to their ancestors in times of crisis. Although both Catholic and Protestant missionaries from the 1700s through the early 1900s fiercely attacked Shona traditional beliefs as superstitious and equated ancestors with evil spirits, the cult did not die. Social institutions, such as schools and hospitals provided by missionaries, failed to eliminate ancestral beliefs. Even in the 21st century, many Zimbabweans consult their ancestors. The Shona message to the church remains "Not without My Ancestors." This dissertation examines the significance of the ancestors to the Shona, and how selected denominations and new religious movements have interpreted and accommodated ancestral practices. Taking the missiological goal of "self-theologizing" as the framework, this dissertation proposes a "tripartite Christology" of "Jesus the Family Ancestor", "Jesus the Tribal Ancestor," and "Jesus the National Ancestor," which is based on the Shona "tripartite ancestrology." Familiar ecclesiological and liturgical language, idioms, and symbols are used to contribute to the wider Shona understanding of Jesus as the ancestor par excellence, in whom physical and spiritual needs-including those the ordinary ancestors fail to meet-are fulfilled.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of a real-world malicious applet is given to demonstrate the efficacy of the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently supports security policies in a more manageable, on-demand basis, in contrast to the rigid, piecemeal approach of TCP/IP.