نتایج جستجو برای: security threats

تعداد نتایج: 201039  

2012
Xiaowei Wang

One of an operating system's duties is to provide a trustful security architecture to protect user information from threats coming from all aspects the information world. Trojan horses, viruses, and other threats are all aimed at users' personal information. Therefore, the concept of access control has been introduced to system security area years ago. Typically, it guaranties that only process...

2016
Ammar Yassir Alaa A. K. Ismaeel R. Valecha R. Chen T. Herath A. Vishwanath J. Wang

Computer network security has been a subject of concern for a long period. Many efforts have been made to address the existing and emerging threats such as viruses and Trojan among others without any significant success. Worse, new issues and threats have been emerging given that technology changes and becomes obsolete in a short while. In this regard, this research delves into the current netw...

2012
ALEXANDRA KNIGHT

The link between environmental degradation and international security has attracted new attention due to the publication of the United Nations report A More Secure World: Our Shared Responsibility, authored by the High Level Panel on Threats, Challenges and Change, a group of experts assembled by Kofi Annan and tasked with advising the Security Council about new global threats. The panel specif...

2005
H. Tschofenig D. Kroeselberg

This threats document provides a detailed analysis of the security threats relevant to the Next Steps in Signaling (NSIS) protocol suite. It calls attention to, and helps with the understanding of, various security considerations in the NSIS Requirements, Framework, and Protocol proposals. This document does not describe vulnerabilities of specific parts of the NSIS protocol suite.

Journal: :Studies in health technology and informatics 2009
Eva Henriksen Monika Alise Johansen Anders Baardsgaard Johan Gustav Bellika

This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identif...

2005
Jean-Pierre Dubois P. G. Jreije

the most secure web system out of the available generic and web security technology which can be used as a guideline for organizations building their web sites. The framework is designed to provide necessary security services, to address the known security threats, and to provide some cover to other security problems especially unknown threats. The requirements for the design are discussed whic...

Journal: :J. Inf. Sci. Eng. 2006
Jong-Phil Yang Kyung Hyune Rhee

Because of the stateless character of HTTP, cookies were invented to maintain continuity and states on the Web. Cookies which have user-related information are transmitted and stored, so an attacker can easily copy and modify them for his own purpose. Therefore, cookies are exposed to serious security threats such as network threats, end-system threats, and cookie-harvesting threats. In this pa...

Journal: :IJCNIS 2014
Tope Olufon Carlene E.-A. Campbell Stephen Hole Kapilan Radhakrishnan Arya Sedigh

As computer networks become more critical to enterprises, it is inevitable that efficient security policies are designed, case in point: wireless networks, in order to effectively ensure the confidentiality, availability, and integrity of the data traversing these networks. The primary objective of this paper is to appropriately simulate an enterprise network, and evaluate the threats, and poss...

Journal: :IJCWT 2013
Ilona Ilvonen Pasi Virtanen

Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The sce...

Journal: :IACR Cryptology ePrint Archive 2010
Manoj Kumar

In 2009, Jena et al. proposed a novel remote user authentication scheme using smart card based on ECDLP and claimed that the proposed scheme withstands to security threats. This paper shows that Jena et al.’s scheme is vulnerable to serious security threats and also does not satisfy the attributes of an ideal password authentication scheme .

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید