Network Security at the Institute Level

نویسندگان

  • Christian Schwingenschlögl
  • Andreas Pilz
چکیده

– Nobody is really responsible for security management. – A wrong sense for security, i.e. someone did a security check years ago and there was no related activity afterwards. – Securing the Network is often considered a "non-productive" task. Unfortunately, this attitude is not likely to be changed before a major security incident occurs. But as everyone knows the alarm systems installed directly after a burglary are the most effective. – The institutes network is considered as "not interesting" for potential attackers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Static Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

متن کامل

The multilevel analysis of the social network in the older adults on the Urban HEART-2

Background: Social network in older adults refers to the interpersonal relationships and the perception of these relationships. Given the importance of the social network, the current study was conducted to answer three pivotal questions. First, do personal and district factors affect the social network of the elderly? Second, how much share do the personal and district factors have in the soci...

متن کامل

Security-Based Co-Expansion Planning of Gas and Electricity Networks Considering Demand Response

Coordinated expansion planning of power plants has always attracted the attention of power industry planners to arrive at the optimal mix that assures adequacy of energy supply. Here, we model the coordinates for expansion of electricity and gas networks while considering technical constraints, in order to minimize the total cost of investment and operation of electricity and gas networks for a...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Analyses of Labour Productivity among Small-Holder Cassava Farmers for Food Security and Empowerment in Central Madagascar

Labour productivity affects food security, but quantifying this relationship has been scarce with respect to empirical literature. The Central Madagascar dataset explores the influence of labour productivity and related variables on the food security status of cassava farmers. Drawing on both theory and empirical evidence, this paper argues that fundamental effects of links between labour produ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001