security network Articles
-
Advances in network topology security visualisation
The pervasive aspect of the internet increases the demand for tools that support both monitoring and auditing of security aspects in computer networks. Ideally, these tools should provide a clear and objective presentation of security data in such a way as to let network administrators detect or even predict network security breaches. However, most of these data are still presented only in raw ...
-
The governance of cybersecurity: a framework for policy
Problems with information and network security have quickly moved up the political agenda. The current discussion on the governance of cybersecurity primarily focuses on technological measures and awareness raising. Although these certainly are important issues, the debate is lacking a framework to identify what role is appropriate for government. This paper provides a framework to assess what ...
-
DHT-based security infrastructure for trusted internet and grid computing
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing ...
-
The study on the methods of secure communications on mobile device for intelligent services
Intelligent environments connect freely available to all things on the network. But there is a higher possibility of various security threats as the convergence service can occur and the information in the network is becoming very extensive. To solve this issue, the suggested engine in this paper provides the solution to protect sensitive information in intelligent environments.Keywords: ...
-
Network security mechanisms utilising network address translation
A new protocol technology is just starting to emerge from the laboratory environment. Its stated purpose is to provide a means whereby networks, and the services that reside on them, can be protected from adversarial compromise. This protocol called Dynamic Network Address Translation (Dynat) is designed to protect computer networks against cyber attacks. Briefly, Dynat changes network ...
-
Securing Your Wireless Network
Some people think that simply setting a password provides enough security for their industrial wireless networks. But there are others who want their networks locked down behind a multi-layer fortress of security. In either case – and for any case in between, ESTeem can provide a suitable answer. But first, let’s talk about why security is necessary. There are intentional and ...
-
Misuse-based intrusion detection using Bayesian networks
This paper presents an application of Bayesian networks to the process of intrusion detection in computer networks. The presented system, called Bayesian system for intrusion detection (Basset) extends functionality of Snort, an open-source network intrusion detection system (NIDS), by incorporating Bayesian networks as additional processing stages. The flexible nature of this solution allows it ...
-
Identifying network intrusion with defensive forecasting
With tremendous growth of computing devices connected to networks, information systems security has become an issue of serious global concern. Various researches reveal that many organisations reported computer security breaches, and financial losses due to the security breach will be significant considering the fact that the financial losses on a per-incident basis are estimated 0.5% to 1% of ...
-
Efficient network security as a strategic game
We implement game and mechanism design theories to develop a network–wide autonomous consumer–centric and delay–efficient security protocol, DSIC–S. It induces a dominant strategy incentive compatible equilibrium among all rational and selfish nodes. We show that our protocol is network–wide socially desirable and Pareto optimal. DSIC–S guarantees the delivery of consumer's security services ...
-
Secure Wireless Networks that Provide Connections at ANY Distance
Private wireless networks have traditionally been limited in distance to how far a remote transmitter can link either to a Master or repeater site. The wireless network is designed so all remote locations have a communication path back to a central location for data collection, control, or ...
-
Secure Wireless Networks that provide Connections at ANY Distance
Private wireless networks have traditionally been limited in distance to how far a remote transmitter can link either to a Master or repeater site. The wireless network is designed so all remote locations have a communication path back to a central location for data collection, control, or ...
-
Inclusive wireless technology for emergency communications in the UK
We begin with a short review of the limitations of UK practice and government policy on wireless emergency communications. We focus on the limitations of current practice with reference to brief case studies from two recent emergencies: The Carlisle storms and flooding of January 2005, and the terrorist bombings of London's public transport on 7 July 2005. The public, including elderly and ...
-
Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures
The systematic protection of critical information infrastructures requires an analytical process to identify the critical components and their interplay, to determine the threats and vulnerabilities, to assess the risks and to prioritise countermeasures where risk is unacceptable. The abstraction-based approach presented here builds on a model-based construction of an attack graph with ...
-
Acceptance of modern biotechnology in developing countries: a case study of the Philippines
Recently, public acceptance of transgenic food has become a political issue, not only in industrialised, but also in developing countries with democratic systems such as India and the Philippines. This article presents a methodology that can be applied to assess public acceptance of agricultural biotechnology in developing countries. In the case of the Philippines, a survey of 65 respondents ...
-
Modern security management – Digital companies benefit from a new version of Network Management System
With the new version V1.0 SP1 of Sinec NMS Network Management System, Siemens is offering even more opportunities for the management of large data volumes and complex network structures as well as an overview of security-related network topics. V1.0 SP1 provides central, policy-based firewall and Network Address Translation (NAT) management for the convenient configuration of firewall ...
By Siemens AG
-
Features of wireless Access Points
A wireless access point (WAP) is a device that connects one or more computers to a physical wired network that already exists. A wireless access point is an important component in wireless to wired LAN connectivity because it is in charge of negotiating a connection between the end-user and, typically, a wired LAN. A wireless access point serves as a link between the network's wired and wireless ...
-
Emergent information security in critical infrastructures
The growing tendency to inter-weaving infrastructures makes them more complex, less manageable, and more vulnerable to random system failures. Several information systems are usually added to manage and control such infrastructures. However, in this internet era these information infrastructures have increasingly become the targets of sophisticated (denial of service) attacks, which cause random ...
-
A framework for evaluating risk to the transportation network from terrorism and security policies
Examining the risk imposed on the transportation network by both security policies and terrorist activity is critical to understanding higher-level risks, such as those related to national security and the economy. This paper presents a framework for evaluating risk to the road transportation network from direct targeting by terrorists, collateral damage, and pre-attack and post-attack security ...
-
The development of a strategic risk analysis framework for interconnected surface transportation systems
Transportation networks are centre to the daily lives of millions of citizens around the world. By design, they are open and freely accessible systems that may be exploited for malicious purposes. Transportation networks, especially in dense urban environments, are integral part of larger synergistic systems forming a network of networks. The present paper introduces a strategic risk assessment ...
-
Public, Powerful, and Free: The Hacker’s Arsenal
from sencode.co.uk While it is true that some elite hacking tools are passed in the shadows, most of these business-breaking programs are available on the public internet and have thousands of developers. For any aspiring hacker, these applications allow them to complete tasks in seconds which, 5 years ago, would make an experienced hacker take pause. Bypassing anti-virus, collecting passwords, ...
Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you