Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "security design" wg kryterium: Temat


Tytuł:
The fortified city of XXI century: antiterrorist protection of Lower Manhattan
Ufortyfikowane miasto XXI wieku: zabezpieczenie antyterrorystyczne Dolnego Manhattanu
Autorzy:
Jasiński, A.
Powiązania:
https://bibliotekanauki.pl/articles/369347.pdf
Data publikacji:
2017
Wydawca:
Zachodniopomorski Uniwersytet Technologiczny w Szczecinie. Wydawnictwo Uczelniane ZUT w Szczecinie
Tematy:
security design
antiterrorist protection
urban fortifications
prewencja sytuacyjna
ochrona antyterrorystyczna
miejskie fortyfikacje
Opis:
The Lower Manhattan, including rebuilded World Trade Center complex, due to its symbolic significance for American national memory as well as its functional significance for the American economy, is regarded as a high-profile target for potential terrorist attack. The paper presents a complex and multidimensional counter-terrorism prevention system of the WTC and Lower Manhattan. Security measures which are implemented there concern buildings, public spaces, city districts and suburbs. The impact of security measures on urban functions and cityscape will be discussed as well.
Dolny Manhattan, wraz z odbudowanym kompleksem World Trade Center, ze względu na swoje symboliczne znaczenie dla amerykańskiej pamięci narodowej i funkcjonalne znaczenie dla amerykańskiej gospodarki, został uznany za obarczony największym ryzykiem cel potencjalnego zamachu terrorystycznego. W artykule omówiony zostanie złożony system prewencji antyterrorystycznej jaki został zastosowany dla ochrony kompleksu WTC i Dolnego Manhattanu. Zabezpieczenia realizowane są w skali architektury, przestrzeni publicznej, dzielnicy i miasta. Poddany dyskusji zostanie także wpływ, jaki zabezpieczenia te wywierają na sposób funkcjonowania miasta i jego ukształtowanie.
Źródło:
Przestrzeń i Forma; 2017, 32; 23-44
1895-3247
2391-7725
Pojawia się w:
Przestrzeń i Forma
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Myślenie i analizy projektowe w przedsięwzięciach administracji samorządowej w obszarze bezpieczeństwa i porządku publicznego – ujęcie metodyczne
Design-oriented thinking and analyses in the undertakings of local and regional authorities in the field of security and public order: a methodological approach
Autorzy:
Ziarko, Janusz
Powiązania:
https://bibliotekanauki.pl/articles/1200491.pdf
Data publikacji:
2020
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
design-oriented thinking
design-oriented approaches
security design
security and public order
myślenie projektowe
podejścia projektowe
projektowanie bezpieczeństwa
bezpieczeństwo i porządek publiczny
Opis:
Głównym celem artykułu jest teoretyczna synteza zawartych w literaturze wyników badań nad myśleniem projektowym, aby lepiej zrozumieć jego zasady i cechy charakterystyczne oraz towarzyszące mu procesy, a także zaproponować sposoby wykorzystania poczynionych ustaleń dotyczących myślenia projektowego w działaniach na rzecz bezpieczeństwa i porządku publicznego (BiPP) w środowiskach lokalnych. Przedstawiono dwa metodyczne podejścia, nieodzowne w myśleniu projektowym. Pierwsze to metodyka, której istotę wyraża triada: inspiracja, ideacja, implementacja, znajdująca zastosowanie w projektowaniu działań dla BiPP dostosowanych do aktualnych uwarunkowań konkretnego miejsca i czasu. Drugie to metodyka projektowania rozpoczynająca się od zdefiniowania modelu normatywnego danej formy działalności dla BiPP. Przedstawiono też zasady wypracowania modelu projektowej działalności, zapewniającego optymalne zaspokojenie potrzeb danej osoby/grupy, oraz wdrożenia go do praktyki i jego dalszego doskonalenia.
The overriding goal of the paper is to present a theoretical synthesis of the findings of the research on design-oriented thinking found in the subject literature in order to better understand its principles and characteristic features and accompanying processes, and to suggest ways of using such findings with regard to design-oriented thinking in safety and public order activities (Polish: BiPP) in local environments. Two methodical approaches have been proposed, indispensable in design-oriented thinking. The first one rests on methodology, the essence of which is expressed by the inspiration, ideation and implementation triad, used in the design of activities for BiPP adapted to the current conditions of a particular place and time. The second one hinges upon design methodology, which begins with defining the normative model of a given form of activity for BiPP. A model of this activity has been worked out to ensure a design activity model that would guarantee otpimal satisfation of the needs of a given community, and to facilitate its implementation and further development
Źródło:
Bezpieczeństwo. Teoria i Praktyka; 2020, 4; 35-54
1899-6264
2451-0718
Pojawia się w:
Bezpieczeństwo. Teoria i Praktyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A multiple case study of METI cybersecurity education and training: A basis for the development of a guiding framework for educational approaches
Autorzy:
Bacasdoon, J.
Bolmsten, J.
Powiązania:
https://bibliotekanauki.pl/articles/2172506.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
maritime cyber security
maritime education and training
STCW Convention
cyber security course
cyber security course design
cyber security training
Opis:
Cyberattacks have become a serious global concern, effecting enormous losses to different sectors. In the shipping business, major companies report violations to their operations’ integrity and security, and losing great amounts of money. While the International Maritime Organization (IMO), through the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW) 1978, as amended, is yet to release a standard for the cybersecurity education and training of seafarers, some maritime education and training institutions (METIs) have acted proactively and included cybersecurity knowledge and skills in their curricular offerings. This study looked into the cybersecurity course offerings of four METIs that served as the case studies of the researchers. In particular, the following objectives were addressed: the cybersecurity knowledge and skills included in their curriculum; the importance of the cybersecurity knowledge and skills to seafarers; and the educational approaches of the METIs in delivering their topics on cybersecurity. The first and third objectives were answered using different sources of qualitative data, including document analysis, interview and direct observation. The quantitative approach, in the form of a survey questionnaire, was used to address the second objective. The METIs, though not the same in content, were found to have included cybersecurity knowledge and skills in their curriculum. These knowledge and skills were perceived to be very important by seafarers. Similar to the content of their courses, the METIs delivered their cybersecurity courses by employing varied educational approaches. To address the gap on the lack of cybersecurity course design and delivery minimum standards, a framework in the shape of a lantern is developed and proposed to guide maritime courses designers, in particular, and other course designers, in general.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2022, 16, 2; 319--334
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis
Autorzy:
Mohankumar, N.
Jayakumar, M.
Nirmala, Devi M.
Powiązania:
https://bibliotekanauki.pl/articles/2200703.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Design for Security
Hardware Security
PUF
TRNG
Wave Dynamic Differential Logic
Opis:
The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 4; 749--754
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Utilizing Modern Network Technologies in a Campus Network
Autorzy:
Goetzen, P.
Makuch, J.
Skowrońska-Kapusta, A.
Marchlewska, A.
Zachlod, R
Powiązania:
https://bibliotekanauki.pl/articles/108764.pdf
Data publikacji:
2010
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
computer networks
security
network design
Opis:
The purpose of this paper is to outline concepts and examples of reliable and ef-ficient communication systems for all parts involved in the modern education model. As proven in the presented paper, designing an academic-size network is a real challenge to a team of designers. The outcome vastly depends on the skill and experience of the design team.
Źródło:
Journal of Applied Computer Science Methods; 2010, 2 No. 2; 171-189
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secured Workstation to Process the Data of Different Classification Levels
Autorzy:
Zieliński, Z.
Furtak, J.
Chudzikiewicz, J.
Stasiak, A.
Brudka, M.
Powiązania:
https://bibliotekanauki.pl/articles/309351.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cryptographic protection
multilevel security
software design
UML
virtualization
Opis:
The paper presents some of the results obtained within the ongoing project related with functional requirements and design models of secure workstation for special applications (SWSA). SWSA project is directed toward the combination of the existing hardware and software virtualization with cryptography and identification technologies to ensure the security of multilevel classified data by means of some formal methods. In the paper the requirements for SWSA, its hardware and software architecture, selected security solution for data processing and utilized approach to designing secure software are presented. The novel method for secure software design employs dedicated tools to verify the confidentiality and the integrity of data using Unified Modeling Language (UML) models. In general, the UML security models are embedded in and simulated with the system architecture models, thus the security problems in SWSA can be detected early during the software design. The application of UML topology models enables also to verify the fundamental requirement for MLS systems, namely the hardware isolation of subjects from different security domains.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 5-12
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Computer-aided tool based on common criteria related design patterns
Autorzy:
Rogowski, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/431960.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
Common Criteria
security assurance
design patterns
computer-aided tool
Opis:
The paper describes the results of an R&D project whose aim was to work out a computer tool supporting the development of IT products with built-in security features. The tool ensures that all security measures are applied into a product with regards to the requirements of the ISO/IEC 15408 standard (Common Criteria for Information Technology Security Evaluation). Nowadays there are only a few, limited solutions which support developers in using the Common Criteria methodology. The proposed tool supports three basic processes: security development, product development, and product evaluation as well as writing special evidence documents based on design patterns. Developers used the tool in software- and hardware projects and demonstrated it facilitates and speeds up the development processes of IT security-enhanced products.
Źródło:
Informatyka Ekonomiczna; 2013, 3(29); 111-127
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Designing Defensible Spaces in Large Cities. Outlooks for Polish Urban Areas
Autorzy:
Kowalczyk, Jan
Powiązania:
https://bibliotekanauki.pl/articles/558260.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Warszawski. Centrum Europejskie
Tematy:
Defensible Space,
Oscar Newman,
Public Security,
Crime Prevention,
Urban Design
Opis:
Disappointment with low effectiveness of resocialization and the crime rates in American cities led to formulation of alternative theories concerningcrime prevention. One of these theories – the Defensible Space concept created by Oscar Newman, was based on the assumption that urban design can create suitable conditions for increase in crime or, on the contrary – prevent illegal acts from happening. The goal of this article is to analyse the concept of Defensible Space and the main factors conditioning its creation, as well as the possibility of implementing Newman’s postulates in Polish urban environment.
Źródło:
Studia Europejskie - Studies in European Affairs; 2017, 3; 215-229
1428-149X
2719-3780
Pojawia się w:
Studia Europejskie - Studies in European Affairs
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Utilizing Object Capabilities to Improve Web Application Security
Autorzy:
Koppmann, Michael
Kudera, Christian
Pucher, Michael
Merzdovnik, Georg
Powiązania:
https://bibliotekanauki.pl/articles/27272525.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
object capabilities
design patterns
web security
możliwości obiektów
wzorce projektowe
bezpieczeństwo sieci
Opis:
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform. With this change, authorization models change and no longer depend on operating system accounts and underlying access controls and file permissions. Instead, these accounts are now implemented in the applications themselves, including all of the protective measures and security controls that are required for this. Because of the inherent complexity, flaws in the authorization logic are among the most common security vulnerabilities in web applications. Most applications are built on the concept of the Access-Control List (ACL), a security model that decides who can access a given object. Object Capabilities, transferable rights to perform operations on specific objects, have been proposed as an alternative to ACLs, since they are not susceptible to certain attacks prevalent for ACLs. While their use has been investigated for various domains, such as smart contracts, they have not been widely applied for web applications. In this paper, we therefore present a general overview of the capability- based authorization model and adapt those approaches for use in web applications. Based on a prototype implementation, we show the ways in which Object Capabilities may enhance security, while also offering insights into existing pitfalls and problems in porting such models to the web domain.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-18
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data protection by design on the ground of a general data protection regulation
Autorzy:
Siemieniak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1179134.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
privacy by design
privacy protection
Opis:
Each member of the information society generates, often quite involuntarily, noticeable amounts of data being closely related to them. The range of such data may be extremely extensive as it may encompass the details on the geographical positioning, the data regarding the network behaviours or the data on ID numbers for the devices used. Hence, there exists a more and more intensified and permanent risk of the right for privacy , one of the most fundamental human right, being infringed on. Data controllers attempt to enter any personal data which are easily accessible due to the operational peculiarities applicable to various technological solutions. Such actions may infringe on the rights included into the charter of fundamental rights, namely the right for privacy and the right for personal data protection. Consequently, the data controllers remain under obligation to carry out a series of duties within the area of personal data protection that are related to appropriate technical and organisational means being applied in order to achieve full legal compliance on the matter. Privacy protection remains a complicated process involving the interactions from various areas including the law, software engineering, cycle management or ethics. One of the legal solutions to be introduced by the general data protection regulation is , the so called, “privacy by design” model. The following publication is intended to present the privacy by design model on the ground of the general data protection regulation.
Źródło:
World Scientific News; 2017, 85; 38-43
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies