834 resultados para IT Security, Internet, Personal Firewall, Security Mechanism, Security System, Security Threat, Security Usability, Security Vulnerability


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

En l'actualitat, la maduresa del camp de la investigaci P2P emps a travs de nous problemes, relacionats amb la seguretat. Per aquesta ra, la seguretat comena a convertir-se en una de les qestions clau en l'avaluaci d'un sistema P2P, i s important proporcionar mecanismes de seguretat per a sistemes P2P. El projecte JXTAOverlay fa un esfor per utilitzar la tecnologia JXTA per proporcionar un conjunt genric de funcions que poden ser utilitzades pels desenvolupadors per desplegar aplicacions P2P. No obstant aix, encara que el seu disseny es va centrar en qestions com ara l'escalabilitat o el rendiment general, no va tenir en compte la seguretat. Aquest treball proposa un marc de seguretat, adaptat especficament a la idiosincrsia del JXTAOverlay.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

JXME is the JXTA protocols implementation formobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxied version, identifies existing vulnerabilities and proposes further improvements in this field.

Relevância:

70.00% 70.00%

Publicador:

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Aquest projecte inclou una aproximaci als conceptes de RFID i targetes contactless centrant-se en lampliament usat MIFARE Classic chip. Lobjectiu principal es mostrar el seu funcionament i les seves vulnerabilitats, aix com alguns exemples prctics fent una anlisi de diferents serveis que les utilitzen.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Uusien mobiilien laitteiden ja palveluiden kehitys ovat herttneet yritysten mielenkiinnon soveltaa langattomia sovelluksia omassa liiketoiminnassaan. Erilaisten tekniikoiden myt mys mahdollisuuksien kirjo on laajentumassa, mik johtaa erilaisten verkkojen ja laitteiden yhteniselle hallinnalle asetettavien vaatimusten kasvuun. Yritysten siirtyess soveltamaan uusia langattomia palveluita ja sovelluksia on mys huomioon otettavaa sovellusten sek palveluiden vaatima tietoturva ja sen hallittavuus. Tutkimuksessa esitetn langattoman shkisen liiketoiminnan mritelm sek kyseisien teknologioiden kytt edistvt tekijt. Tutkimus luo viitekehyksen yrityksen langattomien teknologioiden kytlle ja siihen olennaisesti vaikuttavista tekijist. Viitekehyst on kytetty todelliseen esimerkkiin, liikkuva myyntihenkil, kyseisten teknologioiden, palveluiden, tietoturvan ja hallittavuuden nkkulmasta. Johtoptksin on arvioitu mobiilien ja langattomien teknologioiden sek palveluiden, tietoturvan ja hallittavuuden tilaa ja analysoimalla niit tulevaa ajatellen.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Tutkimuksen tavoitteena oli muodostaa viitekehys sijoittajaviestinnn strategian muodostamiseen ja soveltaa viitekehyst kytnnss. Tutkimusongelma nousi case-yrityksest, SSH Communications Security Oyj:st, joka listautui vuoden 2000 lopussa. Teoreettinen viitekehys perustuu aikaisempaan kirjallisuuteen sijoittajaviestinnst, strategian kehittmisest ja rahoitusteoriasta. Rahoitusteorian alueet, joita ksiteltiin tutkimuksessa ovat; vapaaehtoinen tiedottaminen, markkinatehokkuus ja agenttiteoria. Tutkimuksen empiirinen osa toteutettiin soveltamalla teoreettista viitekehyst case yritykseen. Empiirisess osuudessa kytiin lpi seuraavat vaiheet; nykyisen tilan ulkoinen ja sisinen analyysi, tavoitteiden asettaminen ja sijoittajaviestint strategia ehdotuksen muodostaminen case yritykseen. Tutkielman viimeinen kappale kokoaa trkeimmt lydkset, pohtii tyn teoreettista kontribuutiota ja liikkeenjohdollisia kytkksi sek esitt tutkimuksen herttmi ehdotuksia jatkotutkimuksille

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Mobile technologies have brought about major changes in police equipment and police work. If a utopian narrative remains strongly linked to the adoption of new technologies, often formulated as 'magic bullets' to real occupational problems, there are important tensions between their 'imagined' outcomes and the (unexpected) effects that accompany their daily 'practical' use by police officers. This article offers an analysis of police officers' perceptions and interactions with security devices. In so doing, it develops a conceptual typology of strategies for coping with new technology inspired by Le Bourhis and Lascoumes: challenging, neutralizing and diverting. To that purpose, we adopt an ethnographic approach that focuses on the discourses, practices and actions of police officers in relation to three security devices: the mobile digital terminal, the mobile phone and the body camera. Based on a case study of a North American municipal police department, the article addresses how these technological devices are perceived and experienced by police officers on the beat.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We expose the ubiquitous interaction between an information screen and its viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the services security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericssons Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericssons own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The ninth annual Suomenlinna seminar, organised by the Department of Strategic and Defence Studies, Finnish National Defence College, was held in May 2006. It brought together a representative group of specialists in security studies for two days of presentations and discussion about the most pressing issues of today the challenges facing European Unions crisis management in Africa.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Inhimilliseen turvallisuuteen kriisinhallinnan kautta oppimisen mahdollisuuksia ja haasteita Kylmn sodan jlkeen aseelliset konfliktit ovat yleens alkaneet niin sanotuissa hauraissa valtioissa ja kyhiss maissa, ne ovat olleet valtioiden sisisi ja niihin on osallistunut ei-valtiollisia aseellisia ryhmittymi. Usein ne johtavat konfliktikierteeseen, jossa sota ja vakaammat olot vaihtelevat. Koska kuolleisuus konflikteissa voi jd alle kansainvlisen mritelmn (1000 kuollutta vuodessa), kutsun tllaisia konflikteja uusiksi konflikteiksi. Kansainvlinen yhteis on pyrkinyt kehittmn kriisinhallinnan ja rauhanrakentamisen malleja, jotta pysyv rauhantila saataisiin aikaiseksi. Inhimillinen turvallisuus perustuu nkemykseen, jossa kunnioitetaan jokaisen yksiln ihmisoikeuksia ja jolla on vaikutusta mys kriisinhallinnan ja rauhanrakentamisen toteuttamiseen. Tutkimukseen kuuluu kaksi empiirist osaa: Delfoi tulevaisuuspaneeliprosessin sek kriisinhallintahenkilstn haastattelut. Viisitoista eri alojen kriisinhallinta-asiantuntijaa osallistui paneeliin, joka toteutettiin vuonna 2008. Paneelin tulosten mukaan tulevat konfliktit usein ovat uusien konfliktien kaltaisia. Lisksi kriisinhallintahenkilstlt edellytetn vuorovaikutus- ja kommunikaatiokyky ja luonnollisesti mys varsinaisia ammatillisia valmiuksia. Tulevaisuuspaneeli korosti vuorovaikutus- ja kommunikaatiotaitoja erityisesti siviilikriisinhallintahenkilstn kompetensseissa, mutta samat taidot painottuivat sotilaallisen kriisinhallinnan henkilstn kompetensseissakin. Kriisinhallinnassa tarvitaan mys selv tynjakoa eri toimijoiden kesken. Kosovossa tyskennelleen henkilstn haastatteluaineisto koostui yhteens 27 teemahaastattelusta. Haastateltavista 9 oli ammattiupseeria, 10 reservist rekrytoitua rauhanturvaajaa ja 8 siviilikriisinhallinnassa tyskennellytt henkil. Haastattelut toteutettiin helmi- ja keskuun vlisen aikana vuonna 2008. Haastattelutuloksissa korostui vuorovaikutus- ja kommunikaatiotaitojen merkitys, sill monissa kytnnn tilanteissa haastateltavat olivat ratkoneet ongelmia yhteistyss muun kriisinhallintahenkilstn tai paikallisten asukkaiden kanssa. Kriisinhallinnassa toteutui oppimisprosesseja, jotka usein olivat luonteeltaan mynteisi ja informaalisia. Tllaisten onnistumisten vaikutus yksiln minkuvaan oli mynteinen. Tllaisia prosesseja voidaan kuvata itse koskeviksi oivalluksiksi. Kriisinhallintatehtviss oppimisella on erityinen merkitys, jos halutaan kehitt toimintoja inhimillisen turvallisuuden edistmiseksi. Siksi on trke, ett kriisinhallintakoulutusta ja kriisinhallintatyss oppimista kehitetn ottamaan huomioon oppimisen eri tasot ja ulottuvuudet sek niiden merkitys. Informaaliset oppimisen muodot olisi otettava paremmin huomioon kriisinhallintakoulutusta ja kriisinhallintatehtviss oppimista kehitettess. Palautejrjestelm olisi kehitettv eri tavoin. Koko kriisinhallintaoperaation on saatava tarvittaessa mys kriittist palautetta onnistumisista ja eponnistumisista. Monet kriisinhallinnassa tyskennelleet kaipaavat kunnollista palautetta tyrupeamastaan. Liian rutiininomaiseksi koettu palaute ei edist yksiln oppimista. Spontaanisti monet haastatellut pitivt trken, ett kriisinhallinnassa tyskennelleill olisi mahdollisuus debriefing- tyyppiseen kotiinpaluukeskusteluun. Pelkk tllainen mahdollisuus ilmeisesti voisi olla monelle mynteinen uutinen, vaikka tilaisuutta ei hydynnettisikn. Paluu kriisinhallintatehtvist Suomeen on monelle haasteellisempaa kuin niss tehtviss tyskentelyn aloittaminen ulkomailla. Tutkimuksen tulokset kannustavat tutkimaan kriisinhallintaa oppimisen nkkulmasta. On mys olennaista, ett kriisinhallinnan palautejrjestelmi kehitetn mahdollisimman hyvin edistmn sek yksilllist ett organisatorista oppimista kriisinhallinnassa. Kriisinhallintaoperaatio on oppimisymprist. Kriisinhallintahenkilstn kommunikaatio- ja vuorovaikutustaitojen kehittminen on olennaista tavoiteltaessa kestv rauhanprosessia, jossa konfliktialueen asukkaatkin ovat mukana.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.