Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "security design" wg kryterium: Temat


Wyświetlanie 1-10 z 10
Tytuł:
The fortified city of XXI century: antiterrorist protection of Lower Manhattan
Ufortyfikowane miasto XXI wieku: zabezpieczenie antyterrorystyczne Dolnego Manhattanu
Autorzy:
Jasiński, A.
Powiązania:
https://bibliotekanauki.pl/articles/369347.pdf
Data publikacji:
2017
Wydawca:
Zachodniopomorski Uniwersytet Technologiczny w Szczecinie. Wydawnictwo Uczelniane ZUT w Szczecinie
Tematy:
security design
antiterrorist protection
urban fortifications
prewencja sytuacyjna
ochrona antyterrorystyczna
miejskie fortyfikacje
Opis:
The Lower Manhattan, including rebuilded World Trade Center complex, due to its symbolic significance for American national memory as well as its functional significance for the American economy, is regarded as a high-profile target for potential terrorist attack. The paper presents a complex and multidimensional counter-terrorism prevention system of the WTC and Lower Manhattan. Security measures which are implemented there concern buildings, public spaces, city districts and suburbs. The impact of security measures on urban functions and cityscape will be discussed as well.
Dolny Manhattan, wraz z odbudowanym kompleksem World Trade Center, ze względu na swoje symboliczne znaczenie dla amerykańskiej pamięci narodowej i funkcjonalne znaczenie dla amerykańskiej gospodarki, został uznany za obarczony największym ryzykiem cel potencjalnego zamachu terrorystycznego. W artykule omówiony zostanie złożony system prewencji antyterrorystycznej jaki został zastosowany dla ochrony kompleksu WTC i Dolnego Manhattanu. Zabezpieczenia realizowane są w skali architektury, przestrzeni publicznej, dzielnicy i miasta. Poddany dyskusji zostanie także wpływ, jaki zabezpieczenia te wywierają na sposób funkcjonowania miasta i jego ukształtowanie.
Źródło:
Przestrzeń i Forma; 2017, 32; 23-44
1895-3247
2391-7725
Pojawia się w:
Przestrzeń i Forma
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A multiple case study of METI cybersecurity education and training: A basis for the development of a guiding framework for educational approaches
Autorzy:
Bacasdoon, J.
Bolmsten, J.
Powiązania:
https://bibliotekanauki.pl/articles/2172506.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime education and training
STCW Convention
cyber security course
cyber security course design
cyber security training
Opis:
Cyberattacks have become a serious global concern, effecting enormous losses to different sectors. In the shipping business, major companies report violations to their operations’ integrity and security, and losing great amounts of money. While the International Maritime Organization (IMO), through the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) 1978, as amended, is yet to release a standard for the cybersecurity education and training of seafarers, some maritime education and training institutions (METIs) have acted proactively and included cybersecurity knowledge and skills in their curricular offerings. This study looked into the cybersecurity course offerings of four METIs that served as the case studies of the researchers. In particular, the following objectives were addressed: the cybersecurity knowledge and skills included in their curriculum; the importance of the cybersecurity knowledge and skills to seafarers; and the educational approaches of the METIs in delivering their topics on cybersecurity. The first and third objectives were answered using different sources of qualitative data, including document analysis, interview and direct observation. The quantitative approach, in the form of a survey questionnaire, was used to address the second objective. The METIs, though not the same in content, were found to have included cybersecurity knowledge and skills in their curriculum. These knowledge and skills were perceived to be very important by seafarers. Similar to the content of their courses, the METIs delivered their cybersecurity courses by employing varied educational approaches. To address the gap on the lack of cybersecurity course design and delivery minimum standards, a framework in the shape of a lantern is developed and proposed to guide maritime courses designers, in particular, and other course designers, in general.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 319--334
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis
Autorzy:
Mohankumar, N.
Jayakumar, M.
Nirmala, Devi M.
Powiązania:
https://bibliotekanauki.pl/articles/2200703.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Design for Security
Hardware Security
PUF
TRNG
Wave Dynamic Differential Logic
Opis:
The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 4; 749--754
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Utilizing Modern Network Technologies in a Campus Network
Autorzy:
Goetzen, P.
Makuch, J.
Skowrońska-Kapusta, A.
Marchlewska, A.
Zachlod, R
Powiązania:
https://bibliotekanauki.pl/articles/108764.pdf
Data publikacji:
2010
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
computer networks
security
network design
Opis:
The purpose of this paper is to outline concepts and examples of reliable and ef-ficient communication systems for all parts involved in the modern education model. As proven in the presented paper, designing an academic-size network is a real challenge to a team of designers. The outcome vastly depends on the skill and experience of the design team.
Źródło:
Journal of Applied Computer Science Methods; 2010, 2 No. 2; 171-189
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secured Workstation to Process the Data of Different Classification Levels
Autorzy:
Zieliński, Z.
Furtak, J.
Chudzikiewicz, J.
Stasiak, A.
Brudka, M.
Powiązania:
https://bibliotekanauki.pl/articles/309351.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cryptographic protection
multilevel security
software design
UML
virtualization
Opis:
The paper presents some of the results obtained within the ongoing project related with functional requirements and design models of secure workstation for special applications (SWSA). SWSA project is directed toward the combination of the existing hardware and software virtualization with cryptography and identification technologies to ensure the security of multilevel classified data by means of some formal methods. In the paper the requirements for SWSA, its hardware and software architecture, selected security solution for data processing and utilized approach to designing secure software are presented. The novel method for secure software design employs dedicated tools to verify the confidentiality and the integrity of data using Unified Modeling Language (UML) models. In general, the UML security models are embedded in and simulated with the system architecture models, thus the security problems in SWSA can be detected early during the software design. The application of UML topology models enables also to verify the fundamental requirement for MLS systems, namely the hardware isolation of subjects from different security domains.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 5-12
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Computer-aided tool based on common criteria related design patterns
Autorzy:
Rogowski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/431960.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
Common Criteria
security assurance
design patterns
computer-aided tool
Opis:
The paper describes the results of an R&D project whose aim was to work out a computer tool supporting the development of IT products with built-in security features. The tool ensures that all security measures are applied into a product with regards to the requirements of the ISO/IEC 15408 standard (Common Criteria for Information Technology Security Evaluation). Nowadays there are only a few, limited solutions which support developers in using the Common Criteria methodology. The proposed tool supports three basic processes: security development, product development, and product evaluation as well as writing special evidence documents based on design patterns. Developers used the tool in software- and hardware projects and demonstrated it facilitates and speeds up the development processes of IT security-enhanced products.
Źródło:
Informatyka Ekonomiczna; 2013, 3(29); 111-127
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Utilizing Object Capabilities to Improve Web Application Security
Autorzy:
Koppmann, Michael
Kudera, Christian
Pucher, Michael
Merzdovnik, Georg
Powiązania:
https://bibliotekanauki.pl/articles/27272525.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
object capabilities
design patterns
web security
możliwości obiektów
wzorce projektowe
bezpieczeństwo sieci
Opis:
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform. With this change, authorization models change and no longer depend on operating system accounts and underlying access controls and file permissions. Instead, these accounts are now implemented in the applications themselves, including all of the protective measures and security controls that are required for this. Because of the inherent complexity, flaws in the authorization logic are among the most common security vulnerabilities in web applications. Most applications are built on the concept of the Access-Control List (ACL), a security model that decides who can access a given object. Object Capabilities, transferable rights to perform operations on specific objects, have been proposed as an alternative to ACLs, since they are not susceptible to certain attacks prevalent for ACLs. While their use has been investigated for various domains, such as smart contracts, they have not been widely applied for web applications. In this paper, we therefore present a general overview of the capability- based authorization model and adapt those approaches for use in web applications. Based on a prototype implementation, we show the ways in which Object Capabilities may enhance security, while also offering insights into existing pitfalls and problems in porting such models to the web domain.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-18
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data protection by design on the ground of a general data protection regulation
Autorzy:
Siemieniak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1179134.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
privacy by design
privacy protection
Opis:
Each member of the information society generates, often quite involuntarily, noticeable amounts of data being closely related to them. The range of such data may be extremely extensive as it may encompass the details on the geographical positioning, the data regarding the network behaviours or the data on ID numbers for the devices used. Hence, there exists a more and more intensified and permanent risk of the right for privacy , one of the most fundamental human right, being infringed on. Data controllers attempt to enter any personal data which are easily accessible due to the operational peculiarities applicable to various technological solutions. Such actions may infringe on the rights included into the charter of fundamental rights, namely the right for privacy and the right for personal data protection. Consequently, the data controllers remain under obligation to carry out a series of duties within the area of personal data protection that are related to appropriate technical and organisational means being applied in order to achieve full legal compliance on the matter. Privacy protection remains a complicated process involving the interactions from various areas including the law, software engineering, cycle management or ethics. One of the legal solutions to be introduced by the general data protection regulation is , the so called, “privacy by design” model. The following publication is intended to present the privacy by design model on the ground of the general data protection regulation.
Źródło:
World Scientific News; 2017, 85; 38-43
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Architectural safety for people with special needs in the context of the principles of accessibility
Bezpieczeństwo w wymiarze architektonicznym osób ze szczególnymi potrzebami w kontekście zasad dostępności
Autorzy:
Szmitkowski, Paweł Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/24202712.pdf
Data publikacji:
2023
Wydawca:
Szkoła Główna Służby Pożarniczej
Tematy:
security
people with special needs
threat
universal design
bezpieczeństwo
osoby ze szczególnymi potrzebami
zagrożenie
projektowanie uniwersalne
Opis:
The issue of safety of people with special needs is a serious challenge to the security system of the Polish population. This is a multi-faceted issue due to the very broad understanding of the issue of special needs. The actions taken to build it require taking into account both the daily functioning of this social group as well as accepted and unacceptable threats. The issues raised in the article concern ensuring the safety of people with special needs by adapting architectural solutions to their comprehensive functioning in the social environment.
Kwestia bezpieczeństwa osób ze szczególnymi potrzebami stanowi poważne wyznawanie dla systemu bezpieczeństwa ludności Polski. Jest to zagadnienie wieloaspektowe ze względu na bardzo szerokie rozumienie zagadnienia szczególnych potrzeb. Podjęte działania mające na celu jego budowanie wymagają wzięcia pod uwagę zarówno codziennego funkcjonowania tej grupy społecznej jak również zagrożeń o charakterze akceptowanym oraz nieakceptowanym. Podjęta w artykule problematyka dotyczy zapewnienia bezpieczeństwa osobom ze szczególnymi potrzebami poprzez dostosowanie architektury do ich kompleksowego funkcjonowania w środowisku społecz
Źródło:
Zeszyty Naukowe SGSP / Szkoła Główna Służby Pożarniczej; 2023, 86; 55--76
0239-5223
2720-0779
Pojawia się w:
Zeszyty Naukowe SGSP / Szkoła Główna Służby Pożarniczej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Police simulation systems in the education process of traffic police officers
Policyjne systemy symulacyjne w procesie kształcenia policjantów ruchu drogowego
Autorzy:
Nepelski, Mariusz
Powiązania:
https://bibliotekanauki.pl/articles/30097986.pdf
Data publikacji:
2020
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
security
Police
new technologies
simulation system
training
design
bezpieczeństwo
Policja
nowe technologie
system symulacyjny
szkolenie
projekt
Opis:
Technologies supporting the process of educating police personnel have become an indispensable element of the infrastructure of police schools. The primary source of financing for the technologies built is the National Center for Research and Development. In consultation with the Minister of National Defense and the minister competent for internal affairs, the institution carries out activities related to research for the benefit of state security and defense. In competitions for specifically defined research topics, projects that promise the most considerable real increase in national security are financed. The programs and projects being implemented aim not only to increase the Polish scientific and industrial entities’ potential but also to strive for technological independence by creating Polish “know-how” in critical technologies in the area of national security and defense. The article presents technologies supporting the training process of traffic officers developed by Polish scientific and industrial consortia. The first presented trainer is Simulator Supporting the Training of Police Officers in the Implementation of Activities at the Scene of a Road Accident (project no. DOB-BIO9/06/01/2018). On the other hand, the second training solution presented in the article is the Emergency Vehicle Driving Simulator During Typical and Extreme Operations (project no. OROB 001101/ID/11/1). The mentioned projects were co-financed by the National Center for Research and Development as part of a competition for the implementation and financing projects in the field of scientific research or development work for the national defense and security.
Technologie wspomagające proces kształcenia kadr Policji obecnie stały się niezbędnym elementem infrastruktury policyjnych szkół. Głównym źródłem finansowania budowanych technologii jest Narodowe Centrum Badań i Rozwoju. Instytucja ta w porozumieniu z Ministrem Obrony Narodowej i Ministrem właściwym do spraw wewnętrznych prowadzi działania związane z badaniami na rzecz bezpieczeństwa i obronności państwa. W konkursach na konkretnie sprecyzowane tematy badawcze finansowane są przedsięwzięcia, które w największym stopniu rokują rzeczywiste zwiększenie bezpieczeństwa narodowego. Celem realizowanych programów i projektów jest nie tylko zwiększenie potencjału polskich podmiotów naukowych i przemysłowych, ale także dążenie do niezależności technologicznej poprzez tworzenie polskiego „know-how” w zakresie krytycznych technologii z obszaru bezpieczeństwa i obronności państwa. W artykule zostaną przedstawione technologie wspomagające proces szkolenia funkcjonariuszy ruchu drogowego, które zostały wytworzone przez polskie konsorcja naukowo-przemysłowe. Pierwszym prezentowanym trenażerem jest Symulator wspomagający szkolenie policjantów w realizacji czynności na miejscu zdarzenia drogowego (projekt nr DOB-BIO9/06/01/2018). Natomiast drugim rozwiązaniem szkoleniowym przedstawionym w artykule jest Symulator kierowania pojazdami uprzywilejowanymi podczas działań typowych i ekstremalnych (projekt nr OROB 001101/ID/11/1). Wskazane projekty były współfinansowane przez Narodowe Centrum Badań i Rozwoju w ramach konkursu na wykonanie i finansowanie projektów w zakresie badań naukowych lub prac rozwojowych na rzecz obronności i bezpieczeństwa państwa.
Źródło:
Scientific Journal of the Military University of Land Forces; 2020, 52, 4(198); 845-853
2544-7122
2545-0719
Pojawia się w:
Scientific Journal of the Military University of Land Forces
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-10 z 10

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies