The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
On behalf of the FGCT 2017 conference, the program committee has the pleasure to welcome the attendees to participate in the Sixth edition of the International Conference on the Future Generation Communication Technologies (FGCT 2017) which is dedicated to addressing the challenges in computing technologies for the new generation.
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
In recent years, many organizations, companies and government agencies have been suffering from brutality of targeted attacks. Especially, destructive targeted attacks such as Shamoon and Samas have been causing significant damages on the targets' cyber assets, disputing their critical business operations. Since such attacks tend to access many hosts simultaneously, a rapid incident response is essential...
Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a computer system or network, an entire organization, etc.) can be attacked and indicates the countermeasures that can be taken to prevent the attackers to reach their objective. In this paper, we built an Attack Tree focused on the goal “compromising...
Cloud Computing is emerging amongst all the ascending technologies as the most prodigious process in the chronicles of computing. As it still takes some time to settle, a new challenge as felt whilst its implementation across has been a relatively more gratuitously new. Today as Cloud technology is increasingly expanding across the globe for its resulting benefits but still it needs time to offer...
The urgent task of the organization of confidential calculations in crucial objects of informatization on the basis of domestic TPM technologies (Trusted Platform Module) is considered. The corresponding recommendations and architectural concepts of the special hardware TPM module (Trusted Platform Module) which is built in a computing platform are proposed and realize a so-called “root of trust”...
Millennials are arriving to university sometimes uncomfortable with the methods of some courses. Ideas that worked with previous generations of students begin to fail when digital natives receive paper and pencil as tools. Courses must update from old paper-based methods to hands-on and computerized versions. The present work discusses about this update and comments on one implementation in the course...
This paper presents our practice of teaching the contemporary ARMv7M architecture and ARM assembly programming, and our experience of using μVision, a professional embedded software development environment, for assembly programming assignments on ARM Cortex-M processor-based systems. ARM architectures are dominantly used in mobile devices and embedded systems [4]. The survey data on the use of μVision...
In today's cloud computing platforms, more and more users are now working or collaborating in multi-cloud environment, in which collaborators, clouds, computing nodes may belong to different institutions or organizations. Those different organizations might have their own policies. Security is still a big concern in cloud computing. To help cloud vendors and customers to detect and prevent from being...
In this talk, I'll revisit the role of Software in Software-Defined Networking and argue how not only control plane but also forwarding is becoming increasingly only a matter of software development. In short, I'll discuss how x86 is already on its way to transform the networking as we know it.
This study examines the privacy and security obstacles encountered during the implementation of an electronic health record system known as the e-SiHi system (i.e. Electronic System for Integrated Health Information). e-SiHi was recently adopted by King Saud University Medical City (KSUMC), Saudi Arabia. The research proposed a solution to the challenge of lack of trust of healthcare physicians, which...
Exploring the design space of the memory hierarchy requires the use of effective methodologies, tools, and models to evaluate different parameter values. Reuse distance is of one of the locality models used in the design exploration and permits analytical cache miss estimation, program characterization, and synthetic trace generation. Unfortunately, the reuse distance is limited to a single locality...
Given the growing sophistication of cyber attacks, designing a perfectly secure system is not generally possible. Quantitative security metrics are thus needed to measure and compare the relative security of proposed security designs and policies. Since the investigation of security breaches has shown a strong impact of human errors, ignoring the human user in computing these metrics can lead to misleading...
This paper presents the development and assessment of a computer organization course for undergraduate students in computer science that has been infused with data security concepts. The infusion gives an opportunity for students to learn essential cybersecurity topics in an introductory computer science course. Specifically, students were introduced to the well-known data encryption algorithm called...
This paper starts with describing some methods of teaching the history of malware and the response to adult learners visiting an online malware museum. We also discuss some of the methodologies and tools that a student can use to see live malware processes on his/her laptop while enrolled in a malware class. The paper also discusses how to learn more about the activity of the malware, methods to remove...
Every day we entrust our privacy, safety, and security to police officers sworn to protect and serve. While many critical infrastructure computer systems have been well studied, the computer infrastructure supporting these officers remains to be surveyed in public literature. We remedy this by characterizing a sample police department's systems through a security lens, discussing weak points and areas...
The purpose of this research is to identify factors of phishing victim based on the Heuristic Systematic Model and propose phishing awareness guidelines. In this research, the explanatory sequential mixed method is chosen. Therefore, survey and interview method been applied for data collection purpose. In summary, this research concluded that the major factors that influence user becomes a phishing...
This paper makes a contribution to the development of computational archival science by thinking about and linking computational and archival thinking. It suggests that archival thinking and the archival problem space encompasses questions about the nature of consciousness, highlighting how these questions seem to be apparent within the fundamental archival principles of respect des fonds, provenance...
Green computing has been receiving lot of attention because of the growing environmental concerns and swelling energy consumption costs. Developments of computing performance and reduction in the consumption of energy and carbon footprints are among the most important objectives of green computing. Aim of this study is to explore and advance the green computing implementation practices among United...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.