21 resultados para information security policy

em University of Queensland eSpace - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Australia is an increasingly important ally for the United States. It is willing to be part of challenging global missions, and its strong economy and growing self-confi dence suggest a more prominent role in both global and regional affairs. Moreover, its government has worked hard to strengthen the link between Canberra and Washington. Political and strategic affi nities between the two countries have been refl ected in--and complemented by--practiced military interoperability, as the two allies have sustained a pattern of security cooperation in relation to East Timor, Afghanistan and Iraq in the last 4 years. This growing collaboration between the two countries suggests that a reinvention of the traditional bilateral security relationship is taking place. At the core of this process lies an agreement about the need for engaging in more proactive strategic behavior in the changing global security environment, and a mutual acceptance of looming military and technological interdependence. But this new alliance relationship is already testing the boundaries of bipartisan support for security policy within Australia. Issues of strategic doctrine, defense planning, and procurement are becoming topics of fi erce policy debate. Such discussion is likely to be sharpened in the years ahead as Australia’s security relationship with the United States settles into a new framework.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Australian foreign and security policy confronts a series of difficult challenges in coping with the emergence of an Islamic extremist threat in Southeast Asia. Australian policy makers are being drawn into unfamiliar linkages with moderate Islam, and into closer cooperation with Indonesia, the most populous Islamic nation in the world, in an attempt to offset Islamic extremists. Further, they must achieve those objectives at a time when important interests are at stake beyond Southeast Asia, when bipartisan agreement about the direction of foreign policy is waning, and when divisions over the appropriate trajectory of Australian security policy are intense. A delicacy almost unprecedented in Australian foreign policy will be required.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Korea is one of the world's most volatile areas, not least because traditional UN mediation and peacekeeping missions are impossible. Having intervened in the Korean War on behalf of the southern side, the UN is a party to the conflict, rather than a neutral arbiter. The situation is particularly problematic because political interactions are characterized by a high degree of state-control over security policy. In both parts of the peninsula the state has, at least until recently, exercised the exclusive right to deal with the opponent on the other side of the hermetically divided peninsula. Given these domestic and international constrains, alternative approaches to conflict resolution are urgently needed. The recently proliferating literature on human security offers possible solutions, for it urges policy makers to view security beyond the conventional military-based defence of the state and its territory. Using such a conceptual framework, the essay assesses the potential significance non-state interactions between North and South, particularly those that promote communication, information exchange and face-to-face encounters. Even though these interactions remain limited, they are of crucial importance, for they provide an opportunity to reduce the stereotypical threat images that continue to fuel conflict on the peninsula.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our method uses reachability matrices to identify potentially undesirable information flows based on the fault modes of the system's components.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Science communication. including extension services. plays a key role in achieving sustainable native vegetation management. One of the pivotal aspects of the debate on sustainable vegetation management is the scientific information underpinning policy-making. In recent years. extension services have Shifted their focus from top-down technology transfer to bottom-up participation and empowerment. I here has also been a broadening of communication strategies to recognise the range of stakeholders involved in native vegetation management and to encompass environmental concerns. This paper examines the differences between government approaches to extension services to deliver policy and the need for effective communication to address broader science issues that underpin native vegetation management. The importance of knowing the learning styles of the stakeholders involved in native vegetation management is discussed at a time of increasing reliance on mass communication for information exchange and the importance of personal communication to achieve on-ground sustainable management. Critical factors for effective science-management communication are identified Such as: (i) undertaking scientific studies (research) with community involvement, acceptance and agreed understanding of project objectives (ii) realistic community consultation periods: (iii) matching communication channels with stakeholder needs; (iv) combining scientific with local knowledge in in holistic (biophysical and social) approach to understanding in issued and (v) regional partnerships. These communication factors are considered to be essential to implementing on-ground natural resource management strategics and actions, including those concerned with native vegetation management.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we present a no-switching protocol and show that switching is not required for coherent-state continuous-variable quantum key distribution. Further, this protocol achieves higher information rates and a simpler experimental setup compared to previous protocols that rely on switching. We propose an optimal eavesdropping attack against this protocol, assuming individual Gaussian attacks. Finally, we investigate and compare the no-switching protocol applied to the original Bennett-Brassard 1984 scheme.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The authors use experimental surveys to investigate the association between individuals' knowledge of particular wildlife species and their stated willingness to allocate funds to conserve each. The nature of variations in these allocations between species (e.g., their dispersion) as participants' knowledge increases is examined. Factors influencing these changes are suggested. Willingness-to-pay allocations are found not to measure the economic value of species, but are shown to be policy relevant. The results indicate that poorly known species, e.g., in remote areas, may obtain relatively less conservation support than they deserve.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.