External environment of Mongolia’s security

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Home Automation Environment Security

Adequate security is a key requirement for home automation environments. Home Automation products are relatively new to the marketplace and many consumers are relatively unaware of the risks associated with home networks and remote management of these devices. Two key technologies involved in home networking and automation are Bluetooth and Jini. These technologies are littered with security ri...

متن کامل

Runtime Environment Security Models

The tremendous new potential offered by distributed computing, inside and outside the home and business, also carries with it the necessity to exercise certain security safeguards. As distributed, mobile, and executable content moves among devices, the opportunity for security breaches increases dramatically. Also, as device-todevice e-Commerce services become more automated [11], new types of ...

متن کامل

Engineering Security Agreements Against External Insider Threat

Companies are increasingly engaging in complex inter-organisational networks of business and trading partners , service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of third parties. Such extended enterprises create individuals who are neither completely insiders no...

متن کامل

Securing BGP Using External Security Monitors

Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and communicate using an overlay to alert ...

متن کامل

Using External Security Monitors to Secure BGP

External security monitors (ESMs) are a new network component for securing legacy protocols without requiring modifications to existing hardware, software, or the protocol. An ESM is an additional host that checks each message sent by a legacy host against a safety specification. ESMs use trusted hardware to assure remote principals that the safety specification is being enforced; ESMs use an o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mongolian Journal of International Affairs

سال: 2014

ISSN: 1023-3741

DOI: 10.5564/mjia.v0i10.114