816 resultados para Information security
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.
Resumo:
The basic idea behind improving local food security consists of two paths; first, accessibility (price, stock) and second, availability (quantity and biodiversity); both are perquisites to the provision of nutrients and a continuous food supply with locally available resources. The objectives of this thesis are to investigate if indigenous knowledge still plays an important role in traditional farming in the Minangkabau`s culture, thus supporting local food security. If the indigenous knowledge still plays a role in food culture in the Minangkabau`s culture which is linked to the matrilineal role and leads to a sound nutrition. Further, it should be tested if marantau influences traditional farming and food culture in Minangkabau`s, and if the local government plays a role in changing of traditional farming systems and food culture. Furthermore this thesis wants to prove if education and gender are playing a role in changing traditional farming system and food culture, and if the mass media affects traditional farming systems and food culture for the Minangkabau. The study was completed at four locations in West Sumatera; Nagari Ulakan (NU) (coastal area), Nagari Aia Batumbuak (NAB) (hilly area), Nagari Padang Laweh Malalo (NPLM) (lake area), Nagari Pandai Sikek (NPS) (hilly area). The rainfall ranged from 1400- 4800 mm annually with fertile soils. Data was collected by using PRA (Participatory Rural Appraisal) to investigate indigenous knowledge (IK) and its interactions, which is also combining with in depth-interview, life history, a survey using semi-structured-questionnaire, pictures, mapping, and expert interview. The data was collected from June - September 2009 and June 2010. The materials are; map of area, list of names, questionnaires, voices recorder, note book, and digital camera. The sampling method was snowball sampling which resulted in the qualitative and quantitative data taken. For qualitative data, ethnography and life history was used. For quantitative, a statistical survey with a semi-structured questionnaire was used. 50 respondents per each site participated voluntarily. Data was analyzed by performing MAXQDA 10, and F4 audio analysis software (created and developed by Philip-University Marburg). The data is clustered based on causality. The results show that; the role of IK on TFS (traditional farming system) shown on NPLM which has higher food crop biodiversity in comparison to the other three places even though it has relatively similar temperature and rainfall. This high food crop biodiversity is due to the awareness of local people who realized that they lived in unfavourable climate and topography; therefore they are more prepared for any changes that may occur. Carbohydrate intake is 100 % through rice even though they are growing different staple crops. Whereas most of the people said in the interviews that not eating rice is like not really eating for them. In addition to that, mothers still play an important role in kitchen activities. But when the agriculture income is low, mothers have to decide whether to change the meals or to feel insecure about their food supply. Marantau yields positive impact through the remittances it provides to invest on the farm. On the other hand, it results in fewer workers for agriculture, and therefore a negative impact on the transfer of IK. The investigation showed that the local government has a PTS (Padi Tanam Sabatang) programme which still does not guarantee that the farmers are getting sufficient revenue from their land. The low agricultural income leads to situation of potential food insecurity. It is evident that education is equal among men and women, but in some cases women tend to leave school earlier because of arranged marriages or the distances of school from their homes. Men predominantly work in agriculture and fishing, while women work in the kitchen. In NAB, even though women work on farmland they earn less then men. Weaving (NPS) and kitchen activity is recognized as women’s work, which also supports the household income. Mass media is not yielding any changes in TFS and food culture in these days. The traditional farming system has changed because of intensive agricultural extension which has introduced new methods of agriculture for the last three decades (since the 1980’s). There is no evidence that they want to change any of their food habits because of the mass media despite the lapau activity which allows them to get more food choices, instead preparing traditional meal at home. The recommendations of this thesis are: 1) The empowerment of farmers. It is regarding the self sufficient supply of manure, cooperative seed, and sustainable farm management. Farmers should know – where are they in their state of knowledge – so they can use their local wisdom and still collaborate with new sources of knowledge. Farmers should learn the prognosis of supply and demand next prior to harvest. There is a need for farm management guidelines; that can be adopted from both their local wisdom and modern knowledge. 2) Increase of non-agricultural income Increasing the non-agricultural income is strongly recommended. The remittances can be invested on non-agricultural jobs. 3) The empowerment of the mother. The mother plays an important role in farm to fork activities; the mother can be an initiator and promoter of cultivating spices in the backyard. Improvement of nutritional knowledge through information and informal public education can be done through arisan ibu-ibu and lapau activity. The challenges to apply these recommendations are: 1) The gap between institutions and organizations of local governments. There is more than one institution involved in food security policy. 2) Training and facilities for field extension agriculture (FEA) is needed because the rapid change of interaction between local government and farmer’s dependent on this agency.
Resumo:
Inadequate links between researchers and farmers has resulted in low uptake of research advances recommended to improve food security in the central highlands of Kenya. Access to timely and accurate information by extension agents and farmers is paramount in dissemination of soil fertility management practices. Hence, the study sought to investigate the effect of education levels on communication channels used to disseminate soil fertility technologies in the Central highlands of Kenya. Questionnaires were used to elicit information from 105 extension agents and 240 farmers. About 50.5% of the extension officers were certificate holders while 29.5% were diploma holders from agricultural institutes. Majority of the farmers had attained primary education (59.6%) while 25.8% and 9.2% had attained secondary and post secondary education, respectively. Research institutions were the most accessible sources of information on soil fertility management practices by extension agents while internet and scientific conferences were the least scored as accessible sources of soil fertility management information by extension agents. Education levels significantly influenced preference of individual approach methods by farmers. There was a significant positive relationship between education and accessibility of internet as a source of information on green manure. The implication of the study was that education levels influenced the mode of communication used in the transfer of soil fertility research outputs to the end users. Consequently, it is extremely important to consider education levels in selection of dissemination pathways used in agriculture.
Resumo:
Content related to the second INFO2009 assignment for Group 6's radio interview on data security and the DPA
Resumo:
Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/
Resumo:
Contains visually-appealing and informative "infographics" containing descriptions of common security vulnerabilities and general information about security. Suitable for use in a blog post or printed out and on the wall in an educational area. Also contains video podcasts demonstrating common security exploits in realistic web systems, and offering practical advice on fixing them. Created by "Am and the Raging Otters".
Resumo:
Published on Jun 7, 2012 by icocomms This ICO training video helps answer questions about the Data Protection Act, its impact on the working environment and how to handle and protect people's information. (Produced by Central Office of Information, Crown Copyright 2006)
Resumo:
Over the last decades the issue of insecurity due to an increase in crime rates and its possible impact on the stability of Latin American democracies has sparked an ongoing debate. In this context, the present article studies, for the case of Argentina, how experiences and sensations of insecurity may be articulated to demands for greater punitive rigor. The analysis is based on two types of information. Initially, data from international surveys such as Latinoabarometer are considered. Then, these are compared to data from prolonged on-site observations in a poor neighborhood of a mid-sized Argentine city. The combination of these different types of data shows the complexity of the process. Contrary to what is often assumed, experiences and sensations of insecurity do not lineally lead to demands for greater punitive rigor. The way in which social actors elaborate their experiences of insecurity is highly situational and not systematic. We have found that there is not necessarily a consistent process of ‘meaning construction’ that articulates experiences and sensations of insecurity with political demands.
Resumo:
Loans are illiquid assets that can be sold in a secondary market even that buyers have no certainty about their quality. I study a model in which a lender has access to new investment opportunities when all her assets are illiquid. To raise funds, the lender may either borrow using her assets as collateral, or she can sell them in a secondary market. Given asymmetric information about assets quality, the lender cannot recover the total value of her assets. There is then a role for the government to correct the information problem using fiscal tools.
Resumo:
This study examines current and forthcoming measures related to the exchange of data and information in EU Justice and Home Affairs policies, with a focus on the ‘smart borders’ initiative. It argues that there is no reversibility in the growing reliance on such schemes and asks whether current and forthcoming proposals are necessary and original. It outlines the main challenges raised by the proposals, including issues related to the right to data protection, but also to privacy and non-discrimination.
Resumo:
At present, collective action regarding bio-security among UK cattle and sheep farmers is rare. Despite the occurrence of catastrophic livestock diseases such as bovine spongiform encephalopathy (BSE) and foot and mouth disease (FMD), within recent decades, there are few national or local farmer-led animal health schemes. To explore the reasons for this apparent lack of interest, we utilised a socio-psychological approach to disaggregate the cognitive, emotive and contextual factors driving bio-security behaviour among cattle and sheep farmers in the United Kingdom (UK). In total, we interviewed 121 farmers in South-West England and Wales. The main analytical tools included a content, cluster and logistic regression analysis. The results of the content analysis illustrated apparent 'dissonance' between bio-security attitudes and behaviour.(1) Despite the heavy toll animal disease has taken on the agricultural economy, most study participants were dismissive of the many measures associated with bio-security. Justification for this lack of interest was largely framed in relation to the collective attribution or blame for the disease threats themselves. Indeed, epidemic diseases were largely related to external actors and agents. Reasons for outbreaks included inadequate border control, in tandem with ineffective policies and regulations. Conversely, endemic livestock disease was viewed as a problem for 'bad' farmers and not an issue for those individuals who managed their stock well. As such, there was little utility in forming groups to address what was largely perceived as an individual problem. Further, we found that attitudes toward bio-security did not appear to be influenced by any particular source of information per se. While strong negative attitudes were found toward specific sources of bio-security information, e.g. government leaflets, these appear to simply reflect widely held beliefs. In relation to actual bio-security behaviours, the logistic regression analysis revealed no significant difference between in-scheme and out of scheme farmers. We concluded that in order to support collective action with regard to bio-security, messages need to be reframed and delivered from a neutral source. Efforts to support group formation must also recognise and address the issues relating to perceptions of social connectedness among the communities involved. (c) 2008 Elsevier B.V. All rights reserved.
Resumo:
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows various representations of information to be used in the enforcement of secure information flow in deterministic or nondeterministic systems. A flexible semantics-based analysis technique is presented, which uses the input-output relational model induced by an attacker's observational power, to compute the information released by the computational system. An illustrative attacker model demonstrates the use of the technique to develop a termination-sensitive analysis. The technique allows the development of various information flow analyses, parametrised by the attacker's observational power, which can be used to enforce what declassification policies.
Resumo:
Societal concern is growing about the consequences of climate change for food systems and, in a number of regions, for food security. There is also concern that meeting the rising demand for food is leading to environmental degradation thereby exacerbating factors in part responsible for climate change, and further undermining the food systems upon which food security is based. A major emphasis of climate change/food security research over recent years has addressed the agronomic aspects of climate change, and particularly crop yield. This has provided an excellent foundation for assessments of how climate change may affect crop productivity, but the connectivity between these results and the broader issues of food security at large are relatively poorly explored; too often discussions of food security policy appear to be based on a relatively narrow agronomic perspective. To overcome the limitation of current agronomic research outputs there are several scientific challenges where further agronomic effort is necessary, and where agronomic research results can effectively contribute to the broader issues underlying food security. First is the need to better understand how climate change will affect cropping systems including both direct effects on the crops themselves and indirect effects as a result of changed pest and weed dynamics and altered soil and water conditions. Second is the need to assess technical and policy options for either reducing the deleterious impacts or enhancing the benefits of climate change on cropping systems while minimising further environmental degradation. Third is the need to understand how best to address the information needs of policy makers and report and communicate agronomic research results in a manner that will assist the development of food systems adapted to climate change. There are, however, two important considerations regarding these agronomic research contributions to the food security/climate change debate. The first concerns scale. Agronomic research has traditionally been conducted at plot scale over a growing season or perhaps a few years, but many of the issues related to food security operate at larger spatial and temporal scales. Over the last decade, agronomists have begun to establish trials at landscape scale, but there are a number of methodological challenges to be overcome at such scales. The second concerns the position of crop production (which is a primary focus of agronomic research) in the broader context of food security. Production is clearly important, but food distribution and exchange also determine food availability while access to food and food utilisation are other important components of food security. Therefore, while agronomic research alone cannot address all food security/climate change issues (and hence the balance of investment in research and development for crop production vis à vis other aspects of food security needs to be assessed), it will nevertheless continue to have an important role to play: it both improves understanding of the impacts of climate change on crop production and helps to develop adaptation options; and also – and crucially – it improves understanding of the consequences of different adaptation options on further climate forcing. This role can further be strengthened if agronomists work alongside other scientists to develop adaptation options that are not only effective in terms of crop production, but are also environmentally and economically robust, at landscape and regional scales. Furthermore, such integrated approaches to adaptation research are much more likely to address the information need of policy makers. The potential for stronger linkages between the results of agronomic research in the context of climate change and the policy environment will thus be enhanced.