834 resultados para IT Security, Internet, Personal Firewall, Security Mechanism, Security System, Security Threat, Security Usability, Security Vulnerability


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The genesis of this innovation lies in the commitment of a national Irish business enterprise to the professional development of its staff in general, and to the enhancement of its Information Technologies (IT) staff specifically, in collaboration with a national Higher Education (HE) provider. A postgraduate degree, awarded by the HE provider, seeks to bring coherence and cohesion to the education and training provision for newly recruited IT graduate staff of the business enterprise, simultaneously acting both as an induction process for new staff and as a professional capacity building exercise, thereby enhancing the enterprises organisational learning and collective competence in the areas of information technologies, IT security and technical service management. The curriculum was designed by the HE provider in collaboration with the business enterprise to offer it to circa sixteen IT staff per cycle of delivery through a model known generally as the new apprenticeship for professional practice which uses a combination of college-based, block release taught elements, regular day release seminars and substantial work-based learning, supported by the academic staff of the HE provider and work-based support staff/mentors of the business enterprise. Academic quality assurance, pedagogical, assessment and accreditation responsibilities remain with the HE provider. (...)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The human being is understood as an integral being, complex, which has multiple dimensions: social, biological, psychological, anthropological, spiritual and others. As its biological dimension, the man presents the possibility of physical illness, which means that the body requires care. The sick away from humans in health and safety conditions, approaching them directly from the finitude and vulnerability condition, leading us to contact the major uncertainties of life: suffering of disease and death. Religiosity and spirituality are important coping strategy for human when faced with borderline situations. When people turn to religion to cope with stress is the religious and spiritual coping. The objective of this research was to evaluate the relationship between the views on death and the religious-spiritual coping in patients with chronic diseases hospitalized. The study included ten patients hospitalized for chronic disease complications Medical Clinic Unit of a public hospital in the city of Uberlndia/MG. two psychological scales were used: Scale Religious-Spiritual Coping Brief (CRE-Brief Scale) and Scale Brief Diverse Perspectives of Death and a structured interview (audiogravada) on the subject of death and religious and spiritual coping. The results indicated that 80% of the sample (N = 8) consisted of patients hospitalized due to chronic diseases, while 20% accounted for patients with AIDS complications. Analyzing the results of scale CRE-Brief, it emphasizes the use of strategies of religious and spiritual coping by participants as compared to CRE Total, all study participants had average or high scores for this index, with a low utilization CRE negative and average utilization CRE Positive. Regarding views on death, the results obtained by the Different Perspectives Quick Scale on Death suggest that this sample agrees with the view death as something that is part of the natural cycle of life (M8 - Death as a natural end) and features the prospect of death as uncertainty, mystery and ignorance (M4 - death as Unknown). The correlations between the measures the factors and items of CRE-Bref and dimensions of Short scales on different perspectives of Death notes the prevalence of correlations of M4 dimensions - Death as unknown and M8 - Death as a natural order to the creditor scale soon. In the interview analysis revealed a positive influence of religion/ spirituality on health, from the perspective of the respondent, highlighting the protection promoted by religion. It also noticed the use of prayer as a coping strategy of hospitalization and illness. Regarding the interview about the topic of death, there was a predominance of issues related to "afterlife", "unknown" and "abandonment", which are associated with the visions of death and mystery and death as a natural end. In the interviews there belief clues about death as a terrifying mystery connected, so the unknown and the feeling of fear on the same. The experience of illness can therefore be considered as a source of vulnerability, since it is present personal perception of danger (external) - own illness and possible death, especially in those patients undergoing ICU - and where control is insufficient for the sense of security, since the hospital providing care to the patient are delegated to third parties and patients assume a passive role. This fact is important and relevant to health professionals who deal daily with patients hospitalized for chronic diseases, since the recourse to religion and spirituality as a coping strategy that psychic movement was not constituted in a form of negative distance or even denial of health condition. On the contrary, it refers to a movement in search of comfort and security provided by the religion and spirituality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Em tempos de constantes mudanas, em que a informao circula rapidamente na internet e est acessvel a todos, os profissionais de comunicao e relaes pblicas tendem a preocupar-se cada vez mais com o que publicam e como publicam. Tem-se verificado que as foras de segurana procuram veicular a perceo de segurana e de bem-estar pblico a toda a populao atravs de uma maior divulgao das suas aes. Considermos relevante ter como objeto de estudo as notcias publicadas por dois jornais dirios, o Correio da Manh e o Pblico, no sentido de comparar estas informaes com o que publicado no site institucional da PSP e GNR pelos Gabinetes de Comunicao e Relaes Pblicas. Com esta anlise pretendemos compreender a relao existente entre as foras de segurana e os rgos de comunicao social, identificando que valores-notcia so expressos nas notcias analisadas e por conseguinte quais tm mais importncia nos media. Pretender-se- compreender de que forma os gabinetes de comunicao servem como fonte de informao oficial para os jornais. Assim, foi possvel constatar que as foras de segurana so relevantes como fonte de informao para os media e a personalizao e a infrao so valores-notcias mais presentes e no h alterao nos valores-notcia utilizados entre o que emitido pelos gabinetes de comunicao e o que publicado na maioria das notcias, contudo em algumas peas verificou-se que os jornalistas constroem uma notcia apoiando-se em valores-notcia como a dramatizao e o escndalo de modo a captarem a ateno dos leitores.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A presente dissertao tem como intuito aplicar o regime de Responsabilidade Ambiental no permetro industrial da Monteiro, Ribas Indstrias, S.A.. Para tal, averiguou-se que na ordem jurdica nacional, o regime de Responsabilidade Ambiental (RA) encontra-se consagrada na legislao nacional pelo Decreto-Lei n 147/2008 de 29 de Julho (Diploma RA),e respetivas alteraes, aplicando-se a danos ambientais ou ameaas iminentes de danos ambientais causados aos recursos naturais nomeadamente espcies e habitats naturais protegidos, gua e solo. Tambm se verificou que este regime introduz obrigaes especficas para os operadores abrangidos, designadamente da responsabilidade do operador aplicar as medidas de preveno e reparao dos danos, devendo ser reportados os acontecimentos autoridade competente, Agncia Portuguesa do Ambiente. Para cumprimento do requisito da garantia financeira e sendo a Monteiro, Ribas Indstrias, S.A. enumerada no Anexo III do Decreto-Lei n 147/2008 de 29 de Julho, optou-se pela constituio de um fundo prprio no valor de 50.000,00. Com recurso metodologia proposta pela Norma Espanhola UNE 150008:2008 - Anlise e avaliao do Risco Ambiental, procedeu-se formulao de vrios cenrios e quantificao de riscos para a Monteiro, Ribas Indstrias, S.A. tendo-se apurado que os riscos estavam avaliados como baixo ou moderado. Por fim, conclui-se que em Portugal, embora exista um Decreto-Lei sobre Responsabilidade Ambiental, este tema ainda no est suficientemente desenvolvido pois no permite proceder a anlise e avaliao do risco ambiental, tendo sido tomado assim como referncia a metodologia aplicada na Norma Espanhola UNE 150008:2008.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Desde que existe informao, h necessidade de criar um sistema que permita gerir e garantir que a informao est segura e que cumpre os requisitos bsicos de segurana. Como tal, necessrio desenvolver tcnicas e mecanismos para que os requisitos sejam testados e melhorados continuamente. Com esta necessidade em vista, apareceram padres que do resposta a um conjunto vasto de problemas, em diferentes sistemas e aplicaes diversas. Estes tornaram-se guias de reflexo para quem os analisava, de arquitetura para quem os implementava e modelos para quem os geria. O padro ISO 27001 d resposta aos cuidados a ter para se conseguir um sistema de gesto da segurana da informao eficaz e eficiente. Esta norma preocupa-se com os detalhes de aplicao at forma como implementado e arquitetado o sistema. Os processos, atividades, fluxos de trabalho so essenciais para que esta norma seja cumprida. necessrio um bom escrutnio dos processos e suas atividades, assim como um fluxo de trabalho bem definido com papis e responsabilidades de cada ator. necessrio tambm assegurar a forma como gerido, a sua verificao e melhoria contnua. Foi aplicado no ISEP um exerccio com o qual se pretendeu verificar se os processos e outros aspetos seguiam estes cuidados e se estavam de acordo com a norma. Durante o exerccio foram verificados processos dentro de um certo mbito, todas as suas atividades, papis e responsabilidades, verificao de recursos, aplicao de controlos e aplicao de uma anlise de risco. Esta anlise tem como objetivo verificar o nvel de segurana dos recursos, algo que a norma ISO 27001 prope mas no especifica em que moldes. No final deste exerccio pretendeu-se melhorar o sistema de gesto de informao do ISEP em vertentes tais como a documentao, a qual especifica quais os passos realizados no decorrer do mesmo.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Globalization brought some deep changes to the world (dis)order. Nowadays, more than in other moment in history, we are closer to the ones physically far, living in global village called by Marshall McLuhan (1962). The concepts and premises built in this new order, have totally broken with the ones that came out from Westphalia, which had last to the end of the cold war, like, for example, the concept of security. Since then, security has been facing one of its biggest transformations ever, completely disrupting the state border based idea and starting to be extended to other domains, as human, economic, environmental and IT security, among others. In this global and interdependent environment, new threats and risks have raised, which are demanding a comprehensive approach from the States, international organizations and other actors, to allow the analysis and understanding its impacts on the various society sectors and orders. Inside the enormous challenges to the global security, it is important to regard the organized crime, which covers, by itself, a set of threats and risks, enhanced by its connection to other types of criminality, such as terrorism. The goals pursued and the tactics used by criminal organizations during the perpetration of illegal activities, specially the drug smuggling, have impact in an wide spectrum of the social, economic financial and politic dimensions, which should not be underestimated, otherwise our own security may be compromised. Therefore, the current investigation intends to be an important catalyst to the idea debate inside security scope, through the analysis of the organized crime and the drug smuggling, adding to a discussion of this issue, which should be deeper and holistic, aiming a better understanding of the challenges provided by our society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertao de mestrado integrado em Engenharia Eletrnica Industrial e de Computadores

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertao de mestrado em Direito e Informtica

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Resultats d'una enquesta passada als assistents a una sessi clnia en un EAP. Els objectius de l'enquesta, en relaci amb els professionals de la salut, sn: conixer l's que fan d'Internet en l'mbit professional; conixer quin s fan de la prescripci web; saber si utilitzen el correu electrnic per comunicar-se amb els pacients; saber com perceben la consulta sobre informaci mdica o de salut a Internet per part dels seus pacients; i, finalment, identificar els recursos informatius sobre salut a Internet que utilitzen ms, en relaci amb els seus pacients.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Raportointi liittyy kiinten osana yrityksen jokapiviseen toimintaan. Raportoinnin sislt ja muoto vaihtelevat organisaatiotasosta riippuen pivittisen toiminnan tarkkailusta kuukausittaiseen tulosraportointiin. Raportointi voidaan toteuttaa operatiivisten jrjestelmien kautta tai nykyisin entist suositumpana vaihtoehtona on keskitetty raportointi. Uuden raportointijrjestelmn hankintaprojekti on usein koko yrityst koskeva investointi. Jos raportointijrjestelmll on tarkoitus raportoida sek operatiivista toimintaa ett johdon tarpeita, on sen mukauduttava moneen tarkoitukseen. Aluksi on trke mritell tietotarpeet ja tavoitteet projektille unohtamatta riskien- ja projektinhallintaa sek investointilaskelmia. Jos raportoidaan mys yrityksen ulkopuolelle, tulee ottaa huomioon mahdolliset sdkset sek tietoturvallisuusnkkulmat. Mys yrityksen toimintatapoja ja prosesseja on syyt tarkastella kriittisesti ennen jrjestelmhankintaa jolloin voidaan havaita uusia raportointikohteita, tai toimintatapoja voidaan uudelleen organisoida parhaan toimintatavan saavuttamiseksi. Raportointijrjestelm hankittaessa turvaudutaan usein ulkopuoliseen ohjelmistotoimittajaan, joka integroi ja rtli jrjestelmn yrityksen omiin tarpeisiin soveltuvaksi. Raportointijrjestelmn hankintaprojekti ei lopu kyttnottoon vaan projektin alussa on huomioitava mys jrjestelmn huomattavasti pisin elinkaari eli kytt ja yllpito. Raportointi-, kuten ei moni muukaan tietojrjestelm, ole ikin valmis sill tarpeet ja toimintatavat muuttuvat ajan kuluessa ja kyttjien tietoisuus lisntyy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Las vivencias presentadas, estn basadas en la experiencia de trabajo de la Biblioteca Nacional del Per, en el establecimiento penitenciario de rgimen cerrado Piedras Gordas ubicada en Ancn a 50 minutos fuera de la ciudad de Lima. Siendo la educacin un derecho humano que opera como un derecho llave, ya que abre el conocimiento de otros derechos. El Sistema Nacional de Bibliotecas - SNB a travs del centro coordinador de la Red Bibliotecas Educativas y Especializadas, realiz en forma experimental el servicio de maletas viajeras, como actividad de extensin bibliotecaria con el Programa Lectura sin barreras, enmarcado en los Derechos Humanos, accesibilidad a la informacin y la animacin y fomento de la lectura. As como el desarrollo de dos proyectos: Despertando talentos ocultos (2005) y Libres por la creatividad (2006).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La presente investigacin diagnstica tiene como propsito responder a las siguientes preguntas: Que tan preparada se encuentra Bogot D.C., para afrontar la materializacin de un fenmeno natural, como lo es un terremoto? Y Es lo suficientemente eficaz para garantizar la seguridad, la gobernabilidad y la estabilidad socioeconmica de sus habitantes?.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nowadays due to the security vulnerability of distributed systems, it is needed mechanisms to guarantee the security requirements of distributed objects communications. Middleware Platforms component integration platforms provide security functions that typically offer services for auditing, for guarantee messages protection, authentication, and access control. In order to support these functions, middleware platforms use digital certificates that are provided and managed by external entities. However, most middleware platforms do not define requirements to get, to maintain, to validate and to delegate digital certificates. In addition, most digital certification systems use X.509 certificates that are complex and have a lot of attributes. In order to address these problems, this work proposes a digital certification generic service for middleware platforms. This service provides flexibility via the joint use of public key certificates, to implement the authentication function, and attributes certificates to the authorization function. It also supports delegation. Certificate based access control is transparent for objects. The proposed service defines the digital certificate format, the store and retrieval system, certificate validation and support for delegation. In order to validate the proposed architecture, this work presents the implementation of the digital certification service for the CORBA middleware platform and a case study that illustrates the service functionalities