863 resultados para information security policy


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we present a no-switching protocol and show that switching is not required for coherent-state continuous-variable quantum key distribution. Further, this protocol achieves higher information rates and a simpler experimental setup compared to previous protocols that rely on switching. We propose an optimal eavesdropping attack against this protocol, assuming individual Gaussian attacks. Finally, we investigate and compare the no-switching protocol applied to the original Bennett-Brassard 1984 scheme.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Politics of the New Germany takes a new approach to understanding politics in the post-unification Federal Republic. Assuming only elementary knowledge, it focuses on debates and issues in order to help students understand both the workings of Germany's key institutions and some of the key policy challenges facing German politicians. Written in a straightforward style by four experts, each of the chapters draws on a rich variety of real-world examples. Packed with boxed summaries of key points, a guide to further reading and a range of seminar questions for discussion at the end of each chapter, this book highlights both the challenges and opportunities facing policy-makers in such areas as foreign affairs, economic policy, immigration, identity politics and institutional reforms. The book also takes a bird's-eye view of the big debates that define German politics over time, regardless of which party happens to be in power. It pinpoints three key themes that have characterised German politics over the last sixty years; reconciliation, consensus and transformation. Table of Contents: Introduction 1. Germany and the Burden of History 2. Germany’s Post-War Development, 1945-1989 3. Towards German Unity? 4. A Blockaded System of Government? 5. The Party System and Electoral Behaviour: The Path to Stable Instability? 6. Economic Management: The End of the German Model? 7. Citizenship and Demographics: A Country of Immigration? 8. The Reform of the Welfare State? 9. Germany and the European Union: A European Germany or a German Europe? 10. Foreign and Security Policy: A New Role for the Twenty-First Century? 11. Conclusion

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The role of the European Union in global politics has been of growing interest over the past decade. The EU is a key player in global institutions such as the World Trade Organization (WTO) and NATO. It continues to construct an emerging identity and project its values and interests throughout contemporary international relations. The capacity of the EU to both formulate and realise its goals, however, remains contested. Some scholars claim the EU’s `soft power’ attitude rivals that of the USA’s `hard power’ approach to international relations. Others view the EU as insufficiently able to produce a co-ordinated position to project upon global politics. Regardless of the position taken within this debate, the EU’s relationship with its external partners has an increasingly important impact upon economic, political and security concerns on an international level. Trade negotiations, military interventions, democracy promotion, international development and responses to the global economic crisis have all witnessed the EU playing a central role. This has seen the EU become both a major force in contemporary institutions of global governance and a template for supranational governance that might influence other attempts to construct regional and global institutions. This volume brings together a collection of leading EU scholars to provide a state-of-the-art overview covering these and other debates relating to the EU’s role in contemporary global governance. The Handbook is divided into four main sections: Part I: European studies and global governance – provides an overview and critical assessment of the leading theoretical approaches through which the EU’s role in global governance has been addressed within the literature. Part II: Institutions – examines the role played by the key EU institutions in pursuing a role for the EU in contemporary international relations. Part III: Policy and issue areas – explores developments within particular policy sectors, assessing the different impact that the EU has had in different issue areas, including foreign and security policy, environmental policy, common commercial policy, the Common Agricultural Policy, development policy, accession policy, the Neighbourhood Policy and conflict transformation. Part IV: The global multilevel governance complex and the EU – focuses on the relationship between the EU and the institutions, regions and countries with which it forms a global multilevel governance complex, including chapters on the EU’s relationship with the WTO, United Nations, East Asia, Africa and the USA.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Random number generation is a central component of modern information technology, with crucial applications in ensuring communications and information security. The development of new physical mechanisms suitable to directly generate random bit sequences is thus a subject of intense current research, with particular interest in alloptical techniques suitable for the generation of data sequences with high bit rate. One such promising technique that has received much recent attention is the chaotic semiconductor laser systems producing high quality random output as a result of the intrinsic nonlinear dynamics of its architecture [1]. Here we propose a novel complementary concept of all-optical technique that might dramatically increase the generation rate of random bits by using simultaneously multiple spectral channels with uncorrelated signals - somewhat similar to use of wave-division-multiplexing in communications. We propose to exploit the intrinsic nonlinear dynamics of extreme spectral broadening and supercontinuum (SC) generation in optical fibre, a process known to be often associated with non-deterministic fluctuations [2]. In this paper, we report proof-of concept results indicating that the fluctuations in highly nonlinear fibre SC generation can potentially be used for random number generation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The principal methods of compression and different types of non-encrypted objects are described. An analysis is made of the results obtained from examinations of the speed of compression for objects when using passwords with different length. The size of the new file obtained after compression is also analyzed. Some evaluations are made with regard to the methods and the objects used in the examinations. In conclusion some deductions are drawn as well as recommendations for future work.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Евгений Николов, Димитрина Полимирова - Докладът представя текущото състояние на “облачните изчисления” и “облачните информационни атаки” в светлината на компютърната вирусология и информационната сигурност. Обсъдени са категориите “облачни възможни информационни атаки” и “облачни успешни информационни атаки”. Коментирана е архитектурата на “облачните изчисления” и основните компоненти, които изграждат тяхната инфраструктура, съответно “клиенти” (“clients”), „центрове за съхранение на данни“ (“datacenters”) и „разпределени сървъри“ (“dirstributed servers”). Коментирани са и услугите, които се предлагат от “облачните изчисления” – SaaS, HaaS и PaaS. Посочени са предимствата и недостатъците на компонентите и услугите по отношение на “облачните информационни атаки”. Направен е анализ на текущото състояние на “облачните информационни атаки” на територията на България, Балканския полуостров и Югоизточна Европа по отношение на компонентите и на услугите. Резултатите са представени под формата на 3D графични обекти. На края са направени съответните изводи и препоръки под формата на заключение.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper dials with presentations of the Bulgarian Cultural and Historical Heritage in the Cyberspace. The study was taking place at the Information management course with bachelor students in Information Technologies, Information Brokerage and Information Security at the University of Library Studies and Information Technologies. The students describe about 300 different objectives – cultural and historical, material and immaterial.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Based on extensive quantitative and qualitative analyses of a corpus of American presidential speeches that includes all inaugural addresses and State of the Union messages from 1789 to 2008, as well as major foreign and security policy speeches after 1945, this research monograph analyzes the various forms and functions of intertextual references found in the discourse of American presidents. Working within an original, interdisciplinary theoretical framework established by theories of intertextuality, discourse analysis, and presidential studies, the book discusses five different types of presidential intertextuality, all of which contribute jointly to creating a set of carefully manipulated and politically powerful images of both the American nation and the American presidency. The book is intended for scholars and students in political and presidential studies, communications, American cultural studies, and linguistics, as well as anyone interested in the American presidency in general.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A 2012-es év várhatóan nem hoz radikális változást a világgazdaságban és a világpolitikában, meglepetésekkel azonban számolni kell. A gazdasági válság hatását nemcsak Európában, hanem azon kívül is érzékeljük, a válság rányomja bélyegét az érintett államok belpolitikájára és nemzetközi kapcsolataira. Az Egyesült Államok meghatározó tényező marad 2012-ben, még akkor is, ha ezt néhányan vitatják. A BRIC államok kimagasló mutatóik ellenére sem vonhatják ki magukat a válság hatása alól. 2012-ben az Egyesült Államok új védelmi stratégiát adott ki, amelyben egyértelműen kimutathatók a háborúk következményei. Az Al Kaida terrorszervezet ugyan jelentősen meggyengült, de a dzsihádizmussal továbbra is számolni kell, főként a válságkörzetekben. ______________ The year 2012 will probably not bring radical changes in the global economy and world policy. However, one should count on surprises. The results of the economic crisis are felt not only in Europe but outside Europe as well and it will have an effect on the domestic politics and on the international connections of the respective countries. The United States will remain a determinant factor in 2012 as well, although even if some dispute this observation. The BRIC states, in spite of theirs outstanding economic achievements, cannot avoid the detrimental effects of the crisis. As for security policy, the USA delivered a new defence strategy in 2012 that summarises the consequences of the wars. Although Al-Qaida lost its strength remarkably, one has to count on jihadism mainly in crisis areas.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This research seeks to understand how the problem of information security is treated in Brazil by the public thematization and also how it can affect the political and economic aspects of both Brazilian companies and government by using a study case based on the document leak event of the National Security Agency by Snowden. For this, the study case of sites, blogs and news portal coverage was carried out from the perspective of evidential paradigm, studies of movement and event concept. We are interested in examining how the media handles the information security topic and what its impact on national and international political relations. The subject matter was considered the largest data leakage in history of the NSA, which ranks as the world's largest agency of expression intelligence. This leak caused great repercussions in Brazil since it was revealed that the country was the most watched by the United States of America, behind only USA itself. The consequences were: a big tension between Brazil and the US and a public discussion about privacy and freedom on Internet. The research analyzed 256 publications released by Brazilian media outlets in digital media, in the period between June and July 2013.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This research seeks to understand how the problem of information security is treated in Brazil by the public thematization and also how it can affect the political and economic aspects of both Brazilian companies and government by using a study case based on the document leak event of the National Security Agency by Snowden. For this, the study case of sites, blogs and news portal coverage was carried out from the perspective of evidential paradigm, studies of movement and event concept. We are interested in examining how the media handles the information security topic and what its impact on national and international political relations. The subject matter was considered the largest data leakage in history of the NSA, which ranks as the world's largest agency of expression intelligence. This leak caused great repercussions in Brazil since it was revealed that the country was the most watched by the United States of America, behind only USA itself. The consequences were: a big tension between Brazil and the US and a public discussion about privacy and freedom on Internet. The research analyzed 256 publications released by Brazilian media outlets in digital media, in the period between June and July 2013.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This project is about retrieving data in range without allowing the server to read it, when the database is stored in the server. Basically, our goal is to build a database that allows the client to maintain the confidentiality of the data stored, despite all the data is stored in a different location from the client's hard disk. This means that all the information written on the hard disk can be easily read by another person who can do anything with it. Given that, we need to encrypt that data from eavesdroppers or other people. This is because they could sell it or log into accounts and use them for stealing money or identities. In order to achieve this, we need to encrypt the data stored in the hard drive, so that only the possessor of the key can easily read the information stored, while all the others are going to read only encrypted data. Obviously, according to that, all the data management must be done by the client, otherwise any malicious person can easily retrieve it and use it for any malicious intention. All the methods analysed here relies on encrypting data in transit. In the end of this project we analyse 2 theoretical and practical methods for the creation of the above databases and then we tests them with 3 datasets and with 10, 100 and 1000 queries. The scope of this work is to retrieve a trend that can be useful for future works based on this project.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Questa tesi tratta un argomento che si è fatto sempre più interessante, soprattutto in questi ultimi anni, l'integrità firmware e hardware di un sistema. Oggigiorno milioni di persone fanno completamente affidamento al proprio sistema lasciando nelle loro mani moli di dati personali e non, molte delle quali si affidano ai moderni antivirus i quali, però, non sono in grado di rilevare e gestire attacchi che implicano l'alterazione dei firmware. Verranno mostrati diversi attacchi di questo tipo cercando di fare capire come la relativa sicurezza sia importante, inoltre saranno discussi diversi progetti reputati interessanti. Sulla base delle ricerche effettuate, poi, sarà mostrata la progettazione e l'implementazione di un software in grado di rilevare alterazioni hardware e firmware in un sistema.