The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper combines FMEA and n2 approaches in order to create a methodology to determine risks associated with the components of an underwater system. This methodology is based on defining the risk level related to each one of the components and interfaces that belong to a complex underwater system. As far as the authors know, this approach has not been reported before. The resulting information from...
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
This paper reviews digital forensic phases and problems in evidence analysis phase and smart methods in this area. Among these phases, studies on the evidence analysis phase are examined. In the analysis of electronic evidences, use of smart methods and their development will contribute to information technology law and improvement of digital forensic devices. Effective evidence analysis both provides...
The increasing occurrence of large scale disasters calls out for a collaborative approach to crisis management, where multiple and heterogeneous organizations of first responders are deployed within the damaged area and must interact with each others in order to cooperate in the damage assessment and recovery actions. Such an approach requires a suitable communication platform to allow these organizations...
Nowadays the importance of the term DevOps (Developer Operations) has increased around the world, and Mexico is not the exception. This paper describes the implementation of information security and risk management best practices in a DevOps approach established in a Data Center of a large government organization of Mexico. The DevOps approach with security and risk management practices was named...
It has been recognized that current phishing filters in existence today are steadily lacking in effectiveness. Furthermore, users and organizations are lacking appropriate security policies and education, which has led to massive reports of data and privacy breaches in organizations. To address this issue, a phishing filter is proposed which will build upon and broaden the scope of existing techniques...
Advanced Persistent Threats are increasingly becoming one of the major concerns to many industries and organizations. Currently, there exists numerous articles and industrial reports describing various case studies of recent notable Advanced Persistent Threat attacks. However, these documents are expressed in natural language. This limits the efficient reusability of the threat intelligence information...
This paper presents a case study of a university campus in Kiziba refugee camp in Rwanda. It evaluates different aspects of this university as a unique example of education in an extreme environment. The goal is to answer what accommodations, educational and technical, need to be made for a university to function in such extreme environments. In the process, field measurements were made evaluating...
The Internet disruption has resulted in an exponential increase in the growth of new technologies [1] and resultant technology disruptions within the workplace [2]. With the rapid changes in the technology landscape, Chief Information Officers (CIO's) and key decision makers need to learn to maneuver though the plethora of emerging technologies that can result in business model innovation [3] and...
There is widening chasm between the ease of creating software and difficulty of "building security in". This paper reviews the approach, the findings and recent experiments from a seven-year effort to enable consistency across a large, diverse development organization and software portfolio via policies, guidance, automated tools and services. Experience shows that developing secure software...
This hands-on tutorial teaches participants how to audit static analysis alerts, using an auditing lexicon and rules. There is no widely-accepted lexicon or standard set of rules for auditing static analysis alerts in the software engineering community. Auditing rules and a lexicon should guide different auditors to make the same determination for an alert. Standard terms and processes are necessary...
The dynamic processes occurring on the market of logistics services determine the implementation of change and the search for optimal solutions. Modern logistics centres that are adjusted to the needs, while also supported by modern technology are the answer to the declared demand from courier firms that place an emphasis on the speed of delivery and quality of service. The application of RFID technologies...
This article discusses the assessment of the impact of the modern risk-based standards for ensuring the safety and security of Complex Industrial Facilities (CIF) of various industries. The focus pointed on the implementation the management systems based on PDCA cycle of safety process for CIF of fuel and energy complexes, including IT-Security. Furthermore, it is shown that the relevant applicability...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security operations in terms of detective and preventive capabilities. Successful threat intelligence within the cyber domain demands a knowledge base of threat information and an expressive way to represent this knowledge...
Advanced computer security systems rely on a host of detectors that examine anomalies, or known signatures, to qualify network traffic. Anomaly detectors usually come at greater cost in resources over signature detectors spurring the desire to translate anomalies into identifiable signatures. Automatic Signature Generation (ASG) attempts to automate the process of creating signatures to describe newly...
While most organizations continue to invest in traditional network defences, a formidable security challenge has been brewing within their own boundaries. Malicious insiders with privileged access in the guise of a trusted source have carried out many attacks causing far reaching damage to financial stability, national security and brand reputation for both public and private sector organizations...
Today numerous information security (IS) incidents in organizations' networks have become not only more sophisticated but also damaging. Hence the systems with proper security services in place to mitigate and promptly respond to IS threats by helping organizations better understand their current network situation, as well as to perform routine work in big IS-related data processing in automatic mode...
The purpose of this study was to evaluate the application system TULIS in the Main Library of UIN Syarif Hidayatulllah Jakarta by using COBIT 5 framework focuses on the process of managing security (APO13) and managed security services and to know the gap and provide recommendations to top management of the Library. This study used Likert scale calculations. The results of this study are as score...
Information is a valuable asset for the Governments institution, especially when the organization is carrying most important information, such as weather and natural disaster. The need for safeguards against information becomes very necessary issue for such organization. One standard that can be used to measure the maturity level of information security in an organization is the KAMI index developed...
The paper present a gateway level email security solution comprising of content filtering, URL verification and filtering to address the pressing issues from an organization perspective, the challenge of controlling email borne security threats. The encryption of mails was not viable since the receiver's system should support the decryption of the mails, which most of the most of the email recipients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.