نتایج جستجو برای: security threats

تعداد نتایج: 201039  

2018
Francesco Restuccia Salvatore D'Oro Tommaso Melodia

The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is app...

2013
Abdulsalam Ya’u Gital Abdul Samad Shamala Subramaniam

This paper survey security issues in collaborative virtual environments (CVEs) systems. In CVE, multiple users work on different computers which are interconnected through different networks to interact in a shared virtual world. Due to the nature of the geographically disperse users and their connection via different networks, there are numerous security threats that denied fulfillments of mos...

2004
Richard Carney RICHARD CARNEY Robert Schuman

Modern political economies are distinguished from each other by the institutions that mediate actors’ interactions, falling somewhere along a spectrum between pure market and non-market mechanisms. But how did these institutions originally emerge? With regard to the financial sector, I argue that higher levels of national security threats in combination with economic backwardness lead to a fina...

2013
Amirudin Abdul Wahab

The cyber threat landscape has evolved in fairly dramatic ways. Cyber threats come in various different forms both technical and content related threats. Emerging threats have become sophisticated and a lot more disastrous involving state actors, state-sponsored actors, international organized criminals and Internet hacker activist groups. Today‘s cyber threats pose challenges to the Government...

2002
Trent Jaeger David Safford Hubertus Franke

The goal of this white paper is to establish an architecture for providing security services for Linux-based enterprise-level Internet servers. While Linux provides good security features, equivalent to other comparable operating systems, the emerging security threats require stronger security mechanisms in the Linux kernel. We present a design that will make Linux substantially more secure aga...

2007
Danny Smith

This paper examines the common threats to data security in open systems highlighting some of the more recent threats, and looks at some of the tools and techniques that are currently available to enhance the security of a Unix system. Since many programs are written without security issues in mind, the topic of secure programming methodologies is also discussed, with some examples of coding tec...

2014
Pelin Angin Bharat Bhargava

A security feature is a customer-valued capability of software for mitigating a set of security threats. Incremental development of security features, using the Scrum method, often leads to developing ineffective features in addressing the threats they target due to factors such as incomplete security tests. This paper proposes the use of security assurance cases to maintain a global view of th...

Journal: :IJSSE 2014
Per Håkon Meland Elda Paja Erlend Andreas Gjære Stéphane Paul Fabiano Dalpiaz Paolo Giorgini

Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, we address this deficiency by proposing an approach that extends goal modell...

Journal: :CoRR 2010
Tatini Mal-Sarkar Swarup Bhunia

With increasing complexity of modern-day mobile devices, security of these devices in presence of myriad attacks by an intelligent adversary is becoming a major issue. The vast majority of cell phones still remain unsecured from many existing and emerging security threats [1]. There are two major modes of threats for mobile wireless devices hardware and software. In the hardware field, many thr...

2006
C. Onwubiko A. P. Lenaghan

With the significant reliance of proactive monitoring of computer networks on security information management systems, a requirement is to provide appropriate and comprehensive countermeasures to perceived threats on the entire network. A security response mechanism is proposed that combines both generic and fuzzy response models to provide automated (static and dynamic) security countermeasure...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید