982 resultados para ONLINE SECURITY


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristics that relate to online security behavior and characterizes the higher-risk individuals that pose threats to the university’s cybersecurity. Based on these findings and insights from interviews with phishing victims, the study concludes with recommendations to help similat organizations increase end-user cybersecurity compliance and mitigate the risks caused by humans in the organizational cybersecurity chain.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper describes an online survey that was conducted to explore typical Internet users' awareness and knowledge of specific technologies that relate to their security and privacy when using a Web browser to access the Internet. The survey was conducted using an anonymous, online questionnaire. Over a four month period, 237 individuals completed the questionnaire. Respondents were predominately Canadian, with substantial numbers from the United Kingdom and the United States. Important findings include evidence that users have tried to educate themselves regarding their online security and privacy, but with limited success; different interpretations of the term "secure Web site" can lead to very different levels of trust in a site; respondents strongly expressed their skepticism about privacy policies, but nevertheless believe that sites can be trusted to respect their stated policies; and users may confuse browser cookies with other types of data stored locally by browsers, leading to inappropriate conclusions about the risks they present.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This paper contributes to research in online security and reducing personal footprint by evaluating the levels of privacy provided by the Firefox browser. The aim of identifying conditions that would minimize data leakage and maximize data privacy is addressed by assessing and comparing data leakage in the four possible browsing modes: normal and private modes using a browser installed on the host PC or using a portable browser from a connected USB device respectively. To provide a firm foundation for analysis, a series of carefully designed, pre-planned browsing sessions were repeated in each of the various modes of Firefox. This included low RAM environments to determine any effects low RAM may have on browser data leakage. The results show that considerable data leakage may occur within Firefox. In normal mode, all of the browsing information is stored within the Mozilla profile folder in Firefox-specific SQLite databases and sessionstore.js. While passwords were not stored as plain text, other confidential information such as credit card numbers could be recovered from the Form history under certain conditions. There is no difference when using a portable browser in normal mode, except that the Mozilla profile folder is located on the USB device rather than the host's hard disk. By comparison, private browsing reduces data leakage. Our findings confirm that no information is written to the Firefox-related locations on the hard disk or USB device during private browsing, implying that no deletion would be necessary and no remnants of data would be forensically recoverable from unallocated space. However, two aspects of data leakage occurred equally in all four browsing modes. Firstly, all of the browsing history was stored in the live RAM and was therefore accessible while the browser remained open. Secondly, in low RAM situations, the operating system caches out RAM to pagefile.sys on the host's hard disk. Irrespective of the browsing mode used, this may include Firefox history elements which can then remain forensically recoverable for considerable time.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background reading for coursework to prepare a technical report as part of the orientation phase. These items are business documents (i.e. grey literature) which might be read as a prelude or complement to finding information in peer reviewed academic publications. grey literature links and articles to be used in preparation of technical report. See also overview guidance document for this assignment http://www.edshare.soton.ac.uk/8017/

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Since the advent of the internet in every day life in the 1990s, the barriers to producing, distributing and consuming multimedia data such as videos, music, ebooks, etc. have steadily been lowered for most computer users so that almost everyone with internet access can join the online communities who both produce, consume and of course also share media artefacts. Along with this trend, the violation of personal data privacy and copyright has increased with illegal file sharing being rampant across many online communities particularly for certain music genres and amongst the younger age groups. This has had a devastating effect on the traditional media distribution market; in most cases leaving the distribution companies and the content owner with huge financial losses. To prove that a copyright violation has occurred one can deploy fingerprinting mechanisms to uniquely identify the property. However this is currently based on only uni-modal approaches. In this paper we describe some of the design challenges and architectural approaches to multi-modal fingerprinting currently being examined for evaluation studies within a PhD research programme on optimisation of multi-modal fingerprinting architectures. Accordingly we outline the available modalities that are being integrated through this research programme which aims to establish the optimal architecture for multi-modal media security protection over the internet as the online distribution environment for both legal and illegal distribution of media products.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Statistics can be useful when assessing the practical relevance of varying rules and practices on the involuntary loss of nationality across EU member states. Yet while much progress has been made within the EU in recent years with regard to the collection of comparable and reliable information on the acquisition of nationality, statistics on the loss of nationality are hard to find and, where available, difficult to interpret. In this comparative report, the authors explore the landscape of existing statistical data on loss of nationality in the European Union. They identify challenges to the existing methods of data collection and data interpretation and introduce an online statistical database, bringing together all existing statistical data on loss of nationality in the EU. These data are summarised in tables and graphs and discussed with reference to the relevant national and European sources. The authors conclude with recommendations to policy-makers on how to improve data collection in this area.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

I test the Duffie, Gârleanu, and Pedersen hypothesis that security prices incorporate expected future securities lending income. To determine whether institutional investors anticipate gains from future lending of securities, I examine their trading behavior around loan-fee increases. The evidence suggests that institutions buy shares in response to an increase in lending fees, and that this could explain the premium associated with high- lending-fee stocks. Expected future lending income affects stock prices, although the effect seems to be attenuated by the negative information that arises from short selling.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Diss., 2015

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND Advanced heart failure (HF) is associated with high morbidity and mortality; it represents a major burden for the health system. Episodes of acute decompensation requiring frequent and prolonged hospitalizations account for most HF-related expenditure. Inotropic drugs are frequently used during hospitalization, but rarely in out-patients. The LAICA clinical trial aims to evaluate the effectiveness and safety of monthly levosimendan infusion in patients with advanced HF to reduce the incidence of hospital admissions for acute HF decompensation. METHODS The LAICA study is a multicenter, prospective, randomized, double-blind, placebo-controlled, parallel group trial. It aims to recruit 213 out-patients, randomized to receive either a 24-h infusion of levosimendan at 0.1 μg/kg/min dose, without a loading dose, every 30 days, or placebo. RESULTS The main objective is to assess the incidence of admission for acute HF worsening during 12 months. Secondarily, the trial will assess the effect of intermittent levosimendan on other variables, including the time in days from randomization to first admission for acute HF worsening, mortality and serious adverse events. CONCLUSIONS The LAICA trial results could allow confirmation of the usefulness of intermittent levosimendan infusion in reducing the rate of hospitalization for HF worsening in advanced HF outpatients.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Gestor de contrasenyes online segur en aplicació web en Java que funciona en un servidor Apache Tomcat 7.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aquest TFC proposa la implementació d'un gestor de contrasenyes online que ha de garantir unes funcionalitats mínimes de desar i recuperar contrasenyes alhora que ha de garantir la confidencialitat de les dades emmagatzemades al servidor.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Institute has professionals with extensive experience in training, specifically with experience in the field of police and emergencies training. Moreover, it also has very talented people. But above all, our institution has public professionals with a desire to serve, who love security and emergency responders and want to provide them with the best knowledge to make them every day better professionals. In the quest for continuous training improvement, its during 2009 when e-learning begins to have a presence at the Institute. Virtual training methodology becomes a facilitator for the training of various professionals, avoiding geographical displacement and easing the class schedule.