858 resultados para IT Security, Internet, Personal Firewall, Security Mechanism, Security System, Security Threat, Security Usability, Security Vulnerability


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The genesis of this innovation lies in the commitment of a national Irish business enterprise to the professional development of its staff in general, and to the enhancement of its Information Technologies (IT) staff specifically, in collaboration with a national Higher Education (HE) provider. A postgraduate degree, awarded by the HE provider, seeks to bring coherence and cohesion to the education and training provision for newly recruited IT graduate staff of the business enterprise, simultaneously acting both as an induction process for new staff and as a professional capacity building exercise, thereby enhancing the enterprises organisational learning and collective competence in the areas of information technologies, IT security and technical service management. The curriculum was designed by the HE provider in collaboration with the business enterprise to offer it to circa sixteen IT staff per cycle of delivery through a model known generally as the new apprenticeship for professional practice which uses a combination of college-based, block release taught elements, regular day release seminars and substantial work-based learning, supported by the academic staff of the HE provider and work-based support staff/mentors of the business enterprise. Academic quality assurance, pedagogical, assessment and accreditation responsibilities remain with the HE provider. (...)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is increasing coverage in the literature relating to the different facets surrounding the security service of authentication, but there is a need for further research into the usability of graphical authentication. Specifically, the usability and viability of graphical authentication techniques for providing increased security needs to be further explored. There is a significant amount of evidence relating to traditional authentication techniques which highlight the fact that as technological advances grip modern societies, the requirement for more advanced authentication and security approaches increases. The exponential growth in the number of people using the Internet carries with it the high potential for increased security threats, suggesting that there are needs for further techniques to increase security in online environments. This paper presents the findings of how various interface design approaches affect the usability of a previously developed alternative graphical authentication technique called AuthentiGraph. The security design provided by Authentigraph has been established and justified in previous research by the authors. The primary focus of this paper is the usability of this technique. Using an experimental laboratory based approach, combined with an online survey, 20 university students evaluated a combination of five varying graphical interfaces in three different screen sizes. The outcome provides the interface design criteria best suited for the implementation and use of the AuthentiGraph technique.<br />

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyber-physical-social system (CPSS) allows individuals to share personal information collected from not only cyberspace but also physical space. This has resulted in generating numerous data at a user's local storage. However, it is very expensive for users to store large data sets, and it also causes problems in data management. Therefore, it is of critical importance to outsource the data to cloud servers, which provides users an easy, cost-effective, and flexible way to manage data, whereas users lose control on their data once outsourcing their data to cloud servers, which poses challenges on integrity of outsourced data. Many schemes have been proposed to allow a third-party auditor to verify data integrity using the public keys of users. Most of these schemes bear a strong assumption: the auditors are honest and reliable, and thereby are vulnerability in the case that auditors are malicious. Moreover, in most of these schemes, an auditor needs to manage users certificates to choose the correct public keys for verification. In this paper, we propose a secure certificateless public integrity verification scheme (SCLPV). The SCLPV is the first work that simultaneously supports certificateless public verification and resistance against malicious auditors to verify the integrity of outsourced data in CPSS. A formal security proof proves the correctness and security of our scheme. In addition, an elaborate performance analysis demonstrates that the SCLPV is efficient and practical. Compared with the only existing certificateless public verification scheme (CLPV), the SCLPV provides stronger security guarantees in terms of remedying the security vulnerability of the CLPV and resistance against malicious auditors. In comparison with the best of integrity verification scheme achieving resistance against malicious auditors, the communication cost between the auditor and the cloud server of the SCLPV is independent of the size of the processed data, meanwhile, the auditor in the SCLPV does not need to manage certificates.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The human being is understood as an integral being, complex, which has multiple dimensions: social, biological, psychological, anthropological, spiritual and others. As its biological dimension, the man presents the possibility of physical illness, which means that the body requires care. The sick away from humans in health and safety conditions, approaching them directly from the finitude and vulnerability condition, leading us to contact the major uncertainties of life: suffering of disease and death. Religiosity and spirituality are important coping strategy for human when faced with borderline situations. When people turn to religion to cope with stress is the religious and spiritual coping. The objective of this research was to evaluate the relationship between the views on death and the religious-spiritual coping in patients with chronic diseases hospitalized. The study included ten patients hospitalized for chronic disease complications Medical Clinic Unit of a public hospital in the city of Uberlndia/MG. two psychological scales were used: Scale Religious-Spiritual Coping Brief (CRE-Brief Scale) and Scale Brief Diverse Perspectives of Death and a structured interview (audiogravada) on the subject of death and religious and spiritual coping. The results indicated that 80% of the sample (N = 8) consisted of patients hospitalized due to chronic diseases, while 20% accounted for patients with AIDS complications. Analyzing the results of scale CRE-Brief, it emphasizes the use of strategies of religious and spiritual coping by participants as compared to CRE Total, all study participants had average or high scores for this index, with a low utilization CRE negative and average utilization CRE Positive. Regarding views on death, the results obtained by the Different Perspectives Quick Scale on Death suggest that this sample agrees with the view death as something that is part of the natural cycle of life (M8 - Death as a natural end) and features the prospect of death as uncertainty, mystery and ignorance (M4 - death as Unknown). The correlations between the measures the factors and items of CRE-Bref and dimensions of Short scales on different perspectives of Death notes the prevalence of correlations of M4 dimensions - Death as unknown and M8 - Death as a natural order to the creditor scale soon. In the interview analysis revealed a positive influence of religion/ spirituality on health, from the perspective of the respondent, highlighting the protection promoted by religion. It also noticed the use of prayer as a coping strategy of hospitalization and illness. Regarding the interview about the topic of death, there was a predominance of issues related to "afterlife", "unknown" and "abandonment", which are associated with the visions of death and mystery and death as a natural end. In the interviews there belief clues about death as a terrifying mystery connected, so the unknown and the feeling of fear on the same. The experience of illness can therefore be considered as a source of vulnerability, since it is present personal perception of danger (external) - own illness and possible death, especially in those patients undergoing ICU - and where control is insufficient for the sense of security, since the hospital providing care to the patient are delegated to third parties and patients assume a passive role. This fact is important and relevant to health professionals who deal daily with patients hospitalized for chronic diseases, since the recourse to religion and spirituality as a coping strategy that psychic movement was not constituted in a form of negative distance or even denial of health condition. On the contrary, it refers to a movement in search of comfort and security provided by the religion and spirituality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Em tempos de constantes mudanas, em que a informao circula rapidamente na internet e est acessvel a todos, os profissionais de comunicao e relaes pblicas tendem a preocupar-se cada vez mais com o que publicam e como publicam. Tem-se verificado que as foras de segurana procuram veicular a perceo de segurana e de bem-estar pblico a toda a populao atravs de uma maior divulgao das suas aes. Considermos relevante ter como objeto de estudo as notcias publicadas por dois jornais dirios, o Correio da Manh e o Pblico, no sentido de comparar estas informaes com o que publicado no site institucional da PSP e GNR pelos Gabinetes de Comunicao e Relaes Pblicas. Com esta anlise pretendemos compreender a relao existente entre as foras de segurana e os rgos de comunicao social, identificando que valores-notcia so expressos nas notcias analisadas e por conseguinte quais tm mais importncia nos media. Pretender-se- compreender de que forma os gabinetes de comunicao servem como fonte de informao oficial para os jornais. Assim, foi possvel constatar que as foras de segurana so relevantes como fonte de informao para os media e a personalizao e a infrao so valores-notcias mais presentes e no h alterao nos valores-notcia utilizados entre o que emitido pelos gabinetes de comunicao e o que publicado na maioria das notcias, contudo em algumas peas verificou-se que os jornalistas constroem uma notcia apoiando-se em valores-notcia como a dramatizao e o escndalo de modo a captarem a ateno dos leitores.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, trolling for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for cybersex known in IRC parlance as trolling. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about doing being ordinary (Sacks, 1992b) in formulating their first thoughts (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the quiet following the event as unusual. Normalising is accomplished by reference to the indexical it and location formulations, which participants use both to negotiate who can claim to experience the unnatural quiet and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced anywhere, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Groundwater constitutes a vital natural resource for sustaining Indias agricultural economy and meeting the countrys social, ecological and environmental goals. It is a unique resource, widely available, providing security against droughts and yet it is closely linked to surface-water resources and the hydrological cycle. Its availability depends on geo-hydrological conditions and characteristics of aquifers, from deep to alluvium, sediment crystalline rocks to basalt formations; and agro-climate from humid to subhumid and semi-arid to arid. Its reliable supply, uniform quality and temperature, relative turbidity, pollution-safe, minimal evaporation losses, and low cost of development are attributes making groundwater more attractive compared to other resources. It plays a key role in the provision of safe drinking water to rural populations. For example, already almost 80% of domestic water use in rural areas in India is groundwater-supplied, and much of it is being supplied to farms, villages and small towns. Inadequate control of the use of groundwater, indiscriminate application of agrochemicals and unrestrained pollution of the rural environment by other human activities make groundwater usage unsustainable, necessitating proper management in the face of the twin demand for water of good quality for domestic supply and adequate supply for irrigation, ensuring equity, efficiency and sustainability of the resource. Groundwater irrigation has overtaken surface irrigation in the early 1980s, supported by well energization. It is estimated that there are about 24 million energised wells and tube wells now and it is driven by demand rather than availability, evident through the greater occurrence of wells in districts with high population densities. Apart from aquifer characteristics, land fragmentation and landholding size are the factors that decide the density of wells. The rise and fall of local economies dependent on groundwater can be summarized as: the green revolution of 1980s, groundwaterbased agrarian boom, early symptoms of groundwater overdraft, and decline of the groundwater socio-ecology. The social characteristics and policy interventions typical of each stage provide a fascinating insight into the human-resource dynamics. This book is a compilation of nine research papers discussing various aspects of groundwater management. It attempts to integrate knowledge about the physical system, the socio-economic system, the institutional set-up and the policy environment to come out with a more realistic analysis of the situation with regard to the nature, characteristics and intensity of resource use, the size of the economy the use generates, and the negative socioeconomic consequences. Complex variables addressed in this regard focusing on northern Gujarat are the stock of groundwater available in the region, its hydrodynamics, its net outflows against inflows, the economics of its intensive use (particularly irrigation in semi-arid and arid regions), its criticality in the regional hydroecological regime, ethical aspects and social aspects of its use. The first chapter by Dinesh Kumar and Singh, dwells on complex groundwater socio-ecology of India, while emphasizing the need for policy measures to address indiscriminate over-exploitation of dwindling resources. The chapter also explores the nature of groundwater economy and the role of electricity prices on it. The next chapter on groundwater issue in north Gujarat provides a description of groundwater resource characteristics followed by a detailed analysis of the groundwater depletion and quality deterioration problems in the region and their undesirable consequences on the economy, ecosystem health and the society. Considering water-buyers and wellowning farmers individually, a methodology for economic valuation of groundwater in regions where its primary usage is in agriculture, and as assessment of the groundwater economy based on case studies from north Gujarat is presented in the fourth chapter. The next chapter focuses on the extent of dependency of milk production on groundwater, which includes the water embedded in green and dry fodder and animal feed. The study made a realistic estimate of irrigation water productivity in terms of the physics and economics of milk production. The sixth chapter analyses the extent of reduction in water usage, increase in yield and overall increase in physical productivity of alfalfa with the use of the drip irrigation system. The chapter also provides a detailed synthesis of the costs and benefits associated with the use of drip irrigation systems. A linear programmingbased optimization model with the objective to minimize groundwater use taking into account the interaction between two distinct components farming and dairying under the constraints of food security and income stability for different scenarios, including shift in cropping pattern, introduction of water-efficient crops, water- saving technologies in addition to the business as usual scenario is presented in the seventh chapter. The results show that sustaining dairy production in the region with reduced groundwater draft requires crop shifts and adoption of water-saving technologies. The eighth chapter provides evidences to prove that the presence of adequate economic incentive would encourage farmers to adopt water-saving irrigation devices, based on the findings of market research with reference to the level of awareness among farmers of technologies and the factors that decide the adoption of water-saving technologies. However, now the marginal cost of using electricity for agricultural pumping is almost zero. The economic incentives are strong and visible only when the farmers are either water-buyers or have to manage irrigation with limited water from tube-well partnerships. The ninth chapter explores the socio-economic viability of increasing the power tariff and inducing groundwater rationing as a tool for managing energy and groundwater demand, considering the current estimate of the countrys annual economic loss of Rs 320 billion towards electricity subsidy in the farm sector. The tenth chapter suggests private tradable property rights and development of water markets as the institutional tool for achieving equity, efficiency and sustainability of groundwater use. It identifies the externalities for local groundwater management and emphasizes the need for managing groundwater by local user groups, supported by a thorough analysis of groundwater socio-ecology in India. An institutional framework for managing the resource based on participatory approach that is capable of internalizing the externalities, comprising implementation of institutional and technical alternatives for resource management is also presented. Major findings of the analyses and key arguments in each chapter are summarized in the concluding chapter. Case studies of the social and economic benefits of groundwater use, where that use could be described as unsustainable, are interesting. The benefits of groundwater use are outlined and described with examples of social and economic impacts of groundwater and the negative aspects of groundwater development with the compilation of environmental problems based on up-to-date research results. This publication with a well-edited compilation of case studies is informative and constitutes a useful publication for students and professionals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Accurate supersymmetric spectra are required to confront data from direct and indirect searches of supersymmetry. SuSeFLAV is a numerical tool capable of computing supersymmetric spectra precisely for various supersymmetric breaking scenarios applicable even in the presence of flavor violation. The program solves MSSM RGEs with complete 3 x 3 flavor mixing at 2-loop level and one loop finite threshold corrections to all MSSM parameters by incorporating radiative electroweak symmetry breaking conditions. The program also incorporates the Type-I seesaw mechanism with three massive right handed neutrinos at user defined mass scales and mixing. It also computes branching ratios of flavor violating processes such as l(j) -> l(i)gamma, l(j) -> 3 l(i), b -> s gamma and supersymmetric contributions to flavor conserving quantities such as (g(mu) - 2). A large choice of executables suitable for various operations of the program are provided. Program summary Program title: SuSeFLAV Catalogue identifier: AEOD_v1_0 Program summary URL: http://cpc.cs.qub.ac.uk/summaries/AEOD_v1_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: GNU General Public License No. of lines in distributed program, including test data, etc.: 76552 No. of bytes in distributed program, including test data, etc.: 582787 Distribution format: tar.gz Programming language: Fortran 95. Computer: Personal Computer, Work-Station. Operating system: Linux, Unix. Classification: 11.6. Nature of problem: Determination of masses and mixing of supersymmetric particles within the context of MSSM with conserved R-parity with and without the presence of Type-I seesaw. Inter-generational mixing is considered while calculating the mass spectrum. Supersymmetry breaking parameters are taken as inputs at a high scale specified by the mechanism of supersymmetry breaking. RG equations including full inter-generational mixing are then used to evolve these parameters up to the electroweak breaking scale. The low energy supersymmetric spectrum is calculated at the scale where successful radiative electroweak symmetry breaking occurs. At weak scale standard model fermion masses, gauge couplings are determined including the supersymmetric radiative corrections. Once the spectrum is computed, the program proceeds to various lepton flavor violating observables (e.g., BR(mu -> e gamma), BR(tau -> mu gamma) etc.) at the weak scale. Solution method: Two loop RGEs with full 3 x 3 flavor mixing for all supersymmetry breaking parameters are used to compute the low energy supersymmetric mass spectrum. An adaptive step size Runge-Kutta method is used to solve the RGEs numerically between the high scale and the electroweak breaking scale. Iterative procedure is employed to get the consistent radiative electroweak symmetry breaking condition. The masses of the supersymmetric particles are computed at 1-loop order. The third generation SM particles and the gauge couplings are evaluated at the 1-loop order including supersymmetric corrections. A further iteration of the full program is employed such that the SM masses and couplings are consistent with the supersymmetric particle spectrum. Additional comments: Several executables are presented for the user. Running time: 0.2 s on a Intel(R) Core(TM) i5 CPU 650 with 3.20 GHz. (c) 2012 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

,TCB,,TCB,TCB,.TCB,.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Globalization brought some deep changes to the world (dis)order. Nowadays, more than in other moment in history, we are closer to the ones physically far, living in global village called by Marshall McLuhan (1962). The concepts and premises built in this new order, have totally broken with the ones that came out from Westphalia, which had last to the end of the cold war, like, for example, the concept of security. Since then, security has been facing one of its biggest transformations ever, completely disrupting the state border based idea and starting to be extended to other domains, as human, economic, environmental and IT security, among others. In this global and interdependent environment, new threats and risks have raised, which are demanding a comprehensive approach from the States, international organizations and other actors, to allow the analysis and understanding its impacts on the various society sectors and orders. Inside the enormous challenges to the global security, it is important to regard the organized crime, which covers, by itself, a set of threats and risks, enhanced by its connection to other types of criminality, such as terrorism. The goals pursued and the tactics used by criminal organizations during the perpetration of illegal activities, specially the drug smuggling, have impact in an wide spectrum of the social, economic financial and politic dimensions, which should not be underestimated, otherwise our own security may be compromised. Therefore, the current investigation intends to be an important catalyst to the idea debate inside security scope, through the analysis of the organized crime and the drug smuggling, adding to a discussion of this issue, which should be deeper and holistic, aiming a better understanding of the challenges provided by our society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Las vivencias presentadas, estn basadas en la experiencia de trabajo de la Biblioteca Nacional del Per, en el establecimiento penitenciario de rgimen cerrado Piedras Gordas ubicada en Ancn a 50 minutos fuera de la ciudad de Lima. Siendo la educacin un derecho humano que opera como un derecho llave, ya que abre el conocimiento de otros derechos. El Sistema Nacional de Bibliotecas - SNB a travs del centro coordinador de la Red Bibliotecas Educativas y Especializadas, realiz en forma experimental el servicio de maletas viajeras, como actividad de extensin bibliotecaria con el Programa Lectura sin barreras, enmarcado en los Derechos Humanos, accesibilidad a la informacin y la animacin y fomento de la lectura. As como el desarrollo de dos proyectos: Despertando talentos ocultos (2005) y Libres por la creatividad (2006).