111 resultados para Linux security module

em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

El objeto del presente documento es proporcionar una serie de directrices de configuración de seguridad para sistemas operativos Suse Linux Enterprise Server 11. Este sistema operativo proporciona un conjunto interesante de mecanismos de seguridad que permiten alcanzar un nivel de seguridad aceptable. Mediante la aplicación de las directrices expuestas en este documento se podrá garantizar una configuración adecuada del sistema operativo Suse Linux Enterprise Server 11 en lo relativo a la seguridad lógica.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the near future, access to data and home automation systems in the home supported by the implementation of GNU-Linux operating systems in our homes, a reality of the first order for the implementation of real homes and automated digital awarding a cost reduction by the intensive use of the resources provided directly by the Open Software Community. The future possibilities seem almost endless: telecommuting, centralized household accounts, software distributed online training for young people in the house, multimedia at all levels, design and artistic creation (particularly through electronic digital displays are spreading rapidly in our homes), targeted towards home automation automated digital, integrated control of home security, digital entertainment ... and with free applications at no additional cost that can be easily downloaded from the usual repositories, ensuring the online update of these tools. In short, new ways of understanding in the home automation, telecommuting and digital entertainment within the broader framework of our Information Society.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aquest projecte pretén estudiar i analitzar tres distribucions Linux especialitzades en seguretat de xarxes. En aquest estudi es descriuran les característiques tècniques de cada distribució així com la classificació de les seves eines principals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper analyzes the role of traders' priors (proper versus improper) on the implications of market transparency by comparing a pre-trade transparent market with an opaque market in a set-up based on Madhavan (1996). We show that prices may be more informative in the opaque market, regardless of how priors are modelled. In contrast, the comparison of market liquidity and volatility in the two market structures are affected by prior specification. Key words: Market microstructure, Transparency, Prior information

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This note describes ParallelKnoppix, a bootable CD that allows creation of a Linux cluster in very little time. An experienced user can create a cluster ready to execute MPI programs in less than 10 minutes. The computers used may be heterogeneous machines, of the IA-32 architecture. When the cluster is shut down, all machines except one are in their original state, and the last can be returned to its original state by deleting a directory. The system thus provides a means of using non-dedicated computers to create a cluster. An example session is documented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As a consequence of the terrorist attacks of 9/11 and the US-led war against Iraq, WMD and their proliferation have become a central element of the EU security agenda. In December 2003, the European Council adopted even a EU Strategy against Proliferation of WMD. The approach adopted in this Strategy can be largely described as a ‘cooperative security provider’ approach and is based on effective multilateralism, the promotion of a stable international and regional environment and the cooperation with key partners. The principal objective of this paper is to examine in how far the EU has actually implemented the ‘cooperative security provider’ approach in the area which the Non-proliferation Strategy identifies as one of its priorities – the Mediterranean. Focusing on the concept of security interdependence, the paper analyses first the various WMD dangers with which the EU is confronted in the Mediterranean area. Afterwards, it examines how the EU has responded to these hazards in the framework of the Barcelona process and, in particular, the new European Neighbourhood Policy. It is argued that despite its relatively powerful rhetoric, the EU has largely failed, for a wide range of reasons, to apply effectively its non-proliferation approach in the Mediterranean area and, thus, to become a successful security provider.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The European Neighbourhood Policy’s birth has taken place in parallel with the renewed momentum of the European Security and Defence Policy, which has launched 14 operations since 2003. Both policies’ instruments have converged in the neighbouring area covered by ENP: Georgia, in the East and the Palestinian Territories in the South. In both cases, the Security Sector Reform strategies have been the main focus for ESDP and an important objective for ENP. In this paper, two objectives are pursued: first, to assess the EU’s involvement in both cases in SSR terms; and second, to analyse whether the convergence of ESDP operations with a broader EU neighbourhood policy implies that the former has become an instrument for the a EU external action.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Los requisitos del Negocio que requieren un gran crecimiento generan mayor complejidad en los Centros de Cómputo.Son los administradores quienes necesitan gestionar el creciente volumen de datos, aplicaciones, y usuarios, así como la rápida proliferación de los servidores y los diferentes sistemas operativos. En este proyecto se pretende reducir la complejidad en la gestión de los Centros de Cómputo, combinando la automatización de la gestión del ciclo de vida y todas las medidas de contingencia necesarias para mantener la integridad de los mismos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the independence processes in the African continent, armed conflicts, peace and security have raised concern and attention both at the domestic level and at the international scale. In recent years, all aspects have undergone significant changes which have given rise to intense debate. The end of some historical conflicts has taken place in a context of slight decrease in the number of armed conflicts and the consolidation of post-conflict reconstruction processes. Moreover, African regional organizations have staged an increasingly more active internal shift in matters related to peace and security, encouraged by the idea of promoting “African solutions to African problems”. This new scenario, has been accompanied by new uncertainties at the security level and major challenges at the operational level, especially for the African Union. This article aims to ascertain the state of affairs on all these issues and raise some key questions to consider.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tal i com estableix la Carta de les Nacions Unides, el Consell de Seguretat determina l’existència d’una amenaça a la pau, un trencament de la pau o un acte d’agressió i decideix les mesures que han de fer-se servir per restaurar la pau i seguretat internacionals, també l’ús de la força. L’objectiu d’aquest article és explorar la legitimitat d’aquest ús de la força. Amb aquest objectiu, el text parteix d’una definició centrada en les seves dimensions legal, normativa i social. En segon lloc, s’analitzarà com aquestes dimensions estan representades als debats del Consell de Seguretat de la guerra d’Irak de 2003, un dels usos de la força més controvertits i que més debat ha generat als darrers anys. Finalment, l’anàlisi proposat permet treure algunes conclusions sobre les bases canviants de la legitimitat de l’ús de la força.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

En aquest projecte es desenvolupa una distribució GNU/Linux adaptada als laboratoris de docència del departament d’enginyeria de la informació i de les comunicacions. Partint de una anàlisi exhaustiu de les necessitats del departament i gràcies a la col·laboració dels seus membres s’ha realitzat la distribució dEICbian, un sistema que permetrà facilitar les tasques docents als laboratoris del departament. Amb l’objectiu de mantenir el sistema actualitzat també s’ha desenvolupat un generador de noves versions de la distribució dEICbian per tal de garantir tenir, sempre, un sistema modern i lliure d’errors als laboratoris del departament. L’opinió dels usuaris, expressada mitjançant enquestes, ha estat favorable i ara només resta el darrer pas: la seva implementació als laboratoris.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present text, based on previous work done by the authors on peace research (Grasa 1990 and 2010) and the disarmament campaigns linked to Human Security (Alcalde 2009 and 2010), has two objectives. First, to present a new agenda for peace research, based on the resolution/transformation of conflicts and the promotion of collective action in furtherance of human security and human development. Second, to focus specifically on collective action and on a positive reading of some of the campaigns that have taken place during the last decades in order to see how the experiences of such will affect the future agenda for peace research and action for peace.