Página 7 dos resultados de 2835 itens digitais encontrados em 0.024 segundos

Gestão de segurança da informação - uma proposta para potencializar a efetividade da segurança da informação em ambiente de pesquisa científica; Information security management a proposal to improve the effectiveness of information security in the scientific research environment

Alexandria, João Carlos Soares de
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Tese de Doutorado Formato: application/pdf
Publicado em 30/11/2009 Português
Relevância na Pesquisa
37.197874%
O aumento crescente da interconectividade no ambiente de negócio, aliado à dependência cada vez maior dos sistemas de informação nas organizações, faz da gestão da segurança da informação uma importante ferramenta de governança corporativa. A segurança da informação tem o objetivo de salvaguardar a efetividade das transações e, por conseguinte, a própria continuidade do negócio. As ameaças à informação vão desde ataques hackers, fraudes eletrônicas, espionagem e vandalismo; a incêndio, interrupção de energia elétrica e falhas humanas. Segurança da informação é obtida a partir da implementação de um conjunto de controles, incluindo-se dentre outros, políticas, processos, procedimentos, estruturas organizacionais, software e hardware, o que exige uma gestão contínua e uma estrutura administrativa bem estabelecida para fazer frente aos seus desafios. O presente trabalho procurou investigar as razões relacionadas às dificuldades que muitas organizações enfrentam para a estruturação da segurança da informação. Muitas delas se limitam a adotarem medidas pontuais e inconsistentes com a realidade em que vivem. O mercado conta com um arcabouço legal e normativo para a implementação da segurança da informação NBR ISO/IEC 27002...

Biosecurity Measures in 48 Isolation Facilities Managing Highly Infectious Diseases

Puro, Vincenzo; Fusco, Francesco M.; Schilling, Stefan; Thomson, Gail; De Iaco, Giuseppina; Brouqui, Philippe; Maltezou, Helena C.; Bannister, Barbara; Gottschalk, René; Brodt, Hans-Rheinhard; Ippolito, Giuseppe
Fonte: Mary Ann Liebert, Inc. Publicador: Mary Ann Liebert, Inc.
Tipo: Artigo de Revista Científica
Publicado em /06/2012 Português
Relevância na Pesquisa
37.19013%
Biosecurity measures are traditionally applied to laboratories, but they may also be usefully applied in highly specialized clinical settings, such as the isolation facilities for the management of patients with highly infectious diseases (eg, viral hemorrhagic fevers, SARS, smallpox, potentially severe pandemic flu, and MDR- and XDR-tuberculosis). In 2009 the European Network for Highly Infectious Diseases conducted a survey in 48 isolation facilities in 16 European countries to determine biosecurity measures for access control to the facility. Security personnel are present in 39 facilities (81%). In 35 facilities (73%), entrance to the isolation area is restricted; control methods include electronic keys, a PIN system, closed-circuit TV, and guards at the doors. In 25 facilities (52%), identification and registration of all staff entering and exiting the isolation area are required. Access control is used in most surveyed centers, but specific lacks exist in some facilities. Further data are needed to assess other biosecurity aspects, such as the security measures during the transportation of potentially contaminated materials and measures to address the risk of an “insider attack.”

The Four Horsemen of the Apocalypse: Understanding Human Security

Inglehart, Ronald F.; Norris, Pippa
Fonte: John F. Kennedy School of Government, Harvard University Publicador: John F. Kennedy School of Government, Harvard University
Tipo: Research Paper or Report
Português
Relevância na Pesquisa
37.197874%
Since the end of the Cold War, security studies have broadened to take into account a wide range of non-military threats ranging from poverty to environmental concerns rather than just national defense. Security scholars, backed by international organizations and a growing number of national governments, have developed the concept of Human Security, focusing on the welfare of ordinary people against a broad range of threats. This has aroused vigorous debate. Part I of this paper proposes an analytical model of Human Security. Part II argues that it is important to measure how ordinary people perceive risks, moving beyond state-centric notions of Human Security. We examine new evidence, drawing upon survey items specially designed to monitor perceptions of Human Security, included for the first time in the 6th wave of the World Values Survey (WVS), with fieldwork conducted in 2010-2012.Part III demonstrates that people distinguish three dimensions: national, community, and personal security and then explores some structural determinants driving these perceptions. Part IV discusses why perceptions of Human Security matter, in particular for explaining cultural values and value change around the world. The conclusion argues that the shift from a narrow focus on military security toward the broader concept of Human Security is a natural response to the changing challenges facing developed societies...

Measures of Investor and Consumer Confidence and Policy Actions in the Current Crisis

Dailami, Mansoor; Masson, Paul
Fonte: Banco Mundial Publicador: Banco Mundial
Português
Relevância na Pesquisa
37.212058%
The current financial crisis has highlighted the danger that declines in confidence can have a self-fulfilling effect on economic activity. In this paper, the authors consider ways of measuring investor and consumer confidence, and try to explain the evolution of confidence using measures of financial volatility, investment performance, macroeconomic outcomes, and policy actions. They identify a link between investor and consumer confidence. Finally, they show that liquidity provision and easing of interest rates had only a limited effect on financial market spreads during the crisis, arguing for additional measures to address the loss of confidence. The paper focuses on the need for financial regulatory reform, and shows how the incentives to cooperate in this area are stimulated by a common shock to confidence.

Use of Catastrophe Risk Models in Assessing Sovereign Food Security for Risk Transfer

Sharma, Mohan; Hohl, Roman
Fonte: World Bank, Washington, DC Publicador: World Bank, Washington, DC
Tipo: Trabalho em Andamento
Português
Relevância na Pesquisa
37.213423%
This paper discusses how catastrophe crop risk models can be used to assess food security needs at the sovereign level for the purpose of risk transfer. The rationale for a system to evaluate food security needs at the national level is discussed. The role of technology and remote sensing data availability as an enabler of catastrophe crop risk models is discussed followed by a description of the framework of catastrophe crop models for droughts, representing the peril for which catastrophe models have had the most success. The integration of the output of catastrophe crop models with a food security vulnerability assessment model is described next. Recent advances in analytical modeling of various types of shocks in assessing food security are described but the operational use of these analytical models in the development of food security assessment for risk transfer is seen to be limited for now because of the complexity of these analytical models. The food security vulnerability modeling in the African Risk Capacity...

Conceptualizing American power and security in a post -9/11 security context: Conflict, resistance, and global security, 2001--present

Astrada, Marvin
Fonte: FIU Digital Commons Publicador: FIU Digital Commons
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
37.188457%
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. ^ The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension...

Conceptualizing American power and security in a post-9/11 security context : conflict, resistance, and global security, 2001-present

Astrada, Marvin
Fonte: FIU Digital Commons Publicador: FIU Digital Commons
Tipo: Artigo de Revista Científica Formato: application/pdf
Português
Relevância na Pesquisa
37.188457%
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension...

Window of opportunity: mitigating threats from disruptive technologies before widespread adoption

Knapp, Christopher R.
Fonte: Monterey, California: Naval Postgraduate School Publicador: Monterey, California: Naval Postgraduate School
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
37.179858%
Approved for public release; distribution is unlimited; As the pace of technology increases, so does the potential development of disruptive technology-related threats. However, by enacting proactive safety and security measures during the window of opportunity, a government can cost-effectively protect an unsuspecting and ill-prepared society before an emerging disruptive technology is widely adopted without stifling its future development. The basis for the threat mitigation approach described herein is to inject the protective measures into the innovation cycle prior to a technology being adopted by the early majority in Everett Rogers’s technology adoption cycle. This period of time (the window of opportunity) occurs when the GartnerGroup’s hype cycle’s trough of disillusionment aligns with Geoffrey Moore’s chasm. This thesis explores two possible courses of action for mitigating domestic security and safety threats once a new technology’s window of opportunity is identified. First, domestic law enforcement can use this information to mitigate future security and safety concerns. Second, the state could design a flexible regulatory framework around the window in order to provide innovators and producers of an emerging disruptive technology with information highlighting its potential for illicit appropriation.

Estudio de sistemas de seguridad basado en la detección de intrusos física y tecnológica; Study of security sistems based intrudion detection physical and technological

Aranda Luengo, Ricardo
Fonte: Universidade de Cantabria Publicador: Universidade de Cantabria
Tipo: Dissertação de Mestrado
Português
Relevância na Pesquisa
37.188457%
RESUMEN: Toda persona u organización requiere de seguridad tanto física como tecnológica. A lo largo de estos últimos años han aumentado las tecnologías y los sistemas de seguridad empleados son cada vez más eficaces. El objetivo de este proyecto es el análisis y estudio de todos los sistemas de seguridad cuya finalidad es la misma: prevenir y actuar ante cualquier intrusión física y lógica. Desde hace unos meses formo parte del equipo de Ingeniería de Seguridad de la empresa ITM Sistemas: empresa con una dilatada experiencia en la seguridad integral de todo tipo de instalaciones. Este estudio es una motivación personal como ampliación a mis conocimientos de la seguridad física y aplicaciones actuales de la seguridad privada. Esta motivación deriva del interés y adquisición de conocimientos de seguridad informática dada su relación con la seguridad física pero en su aplicación lógica. Un claro ejemplo de aplicación de los dos tipos de seguridad es la integración de las grabaciones de las cámaras de tecnología IP a través de la nube. Con el avance de las tecnologías de la información y, con ello, la integridad, confidencialidad y disponibilidad de las mismas en redes internas y externas, es necesaria la implantación de medidas cada vez más complejas que garanticen la seguridad tanto física como lógica de toda información de vital importancia. Como objeto de este proyecto se analizará y estudiará la propuesta de un Sistema de Seguridad Integral como un único sistema...

Filling Hungry Bellies: The move to put food security on the agenda at the G20

Musgrove, Alison
Fonte: Universidade Nacional da Austrália Publicador: Universidade Nacional da Austrália
Tipo: Relatório
Português
Relevância na Pesquisa
37.188457%
Hunger affects approximately one billion people worldwide. The food price crisis of 2007-08 pushed food prices so high that an estimated 100 million people were pushed over the poverty line. After a brief reprieve in 2009, food prices have risen again, and in early 2011 w ere even higher than during the previous crisis. Despite the efforts of international organisations such as the World Food Programme and the Food and Agricultural Organization, the problem of global hunger has remained intractable and it is clear that a new approach needs to be formulated to solve this problem. In recent years, expectations have fallen on the G20 to step into the breach. With nineteen of the world's largest economies and the European Union, the G20 has been called the 'Goldilocks' of world organisations, being small enough to facilitate negotiation yet large enough to have the necessary economic and political clout to drive the development agenda forward. With over 65% of the world's farmland and producing 77% of the world's cereals, the G20 countries are vital to achieving world 'food security', defined as access to safe and sufficient food for everyone at all times. Given that 54% of the world's hungry live in member states China and India alone...

Orthogonal Security Defect Classification for Secure Software Development

Hunny, UMME
Fonte: Quens University Publicador: Quens University
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
37.206128%
Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than developing patches after the security threats are already in place. In line with this, a number of secure software development approaches have been proposed so far to address the security issues during the development processes. However, most of these approaches lack specific process improvement activities. The practice of taking adequate corrective measures at the earliest possible time by learning from the past mistakes is absent in case of such security-aware iterative software development processes. As one might imagine, software security defect data provide an invaluable source of information for a software development team. This thesis aims at investigating existing security defect classification schemes and providing a structured security-specific defect classification and analysis methodology. Our methodology which we build on top of the Orthogonal Defect Classification (ODC) scheme, is customized to generate in-process feedback by analyzing security defect data. More specifically, we perform a detailed analysis on the classified security defect data and obtain in-process feedback using which the next version of software can be more secure and reliable. We experiment our methodology on the Mozilla Firefox and Chrome security defect repositories using six consecutive versions and milestones...

Labor market flexibility and job security measures in a global economy: new challenges ahead

Van Adams, Arvil; Marshall, Ray
Fonte: Universidad de Chile. Facultad de Economía y Negocios Publicador: Universidad de Chile. Facultad de Economía y Negocios
Tipo: Artículo de revista
Português
Relevância na Pesquisa
37.179858%
Measures assuring job security are sought by workers and their representatives to protect themselves against economic fluctuations and the loss of jobs and incomes. In sectors of an economy that require a skilled workforce employers are often willing to provide promises of job security in exchange for lower labor turnover to protect investments in the skills of their workers, facilitate internal flexibility, and improve labor relations. This contractual exchange serves the interest of both parties and when achieved in a market setting enhances economic behavior. Governments, on the other hand, are also interested in job security as an instrument of social policy to address market failures and equity concerns. Public interventions to stabilize employment can force firms to become more efficient by focusing adjustment on productivity instead of wages or they can threaten the efficient operation of labor markets by introducing uncertainty and raising labor costs.

Mobile Agent Systems, Recent Security Threats and Counter Measures

Amro, Belal
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 06/10/2014 Português
Relevância na Pesquisa
37.242905%
Mobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host on the network, and resumes execution on the new host. It is 1960's since mobile code has been used in the form of remote job entry systems. Today's mobile agents can be characterized in a number of ways ranging from simple distributed objects to highly organized intelligent softwares. As a result of this rapid evolvement of mobile agents, plenty of critical security issues has risen and plenty of work is being done to address these problems. The aim is to provide trusted mobile agent systems that can be easily deployed and widely adopted. In this paper, we provide an overview of the most recent threats facing the designers of agent platforms and the developers of agent-based applications. The paper also identifies security objectives, and measures for countering the identified threats and fulfilling those security objectives.; Comment: international journal of computer science issues, march 2014

Modelling the costs and benefits of Honeynets

Dornseif, Maximillian; May, Sascha
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 28/06/2004 Português
Relevância na Pesquisa
37.179858%
For many IT-security measures exact costs and benefits are not known. This makes it difficult to allocate resources optimally to different security measures. We present a model for costs and benefits of so called Honeynets. This can foster informed reasoning about the deployment of honeynet technology.; Comment: was presented at the "Third Annual Workshop on Economics and Information Security" 2004 (WEIS04)

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

Zou, Yulong; Wang, Xianbin; Hanzo, Lajos
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 29/05/2015 Português
Relevância na Pesquisa
37.206128%
This paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial noise aided security, security-oriented beamforming, diversity assisted security, and physical-layer key generation approaches. Additionally...

Cryptography and its application to operating system security

Painchaud, Michelle
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
37.179858%

Characterization of cyber attacks through variable length Markov models

Fava, Daniel
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
37.179858%
The increase in bandwidth, the emergence of wireless technologies, and the spread of the Internet throughout the world have created new forms of communication with effects on areas such as business, entertainment, and education. This pervasion of computer networks into human activity has amplified the importance of cyber security. Network security relies heavily on Intrusion Detection Systems (IDS), whose objective is to detect malicious network traffic and computer usage. IDS data can be correlated into cyber attack tracks, which consist of ordered collections of alerts triggered during a single multi-stage attack. The objective of this research is to enhance the current knowledge of attack behavior by developing a model that captures the sequential properties of attack tracks. Two sequence characterization models are discussed: Variable Length Markov Models (VLMMs), which are a type of finite-context models, and Hidden Markov Models (HMMs), which are also known as finite-state models. A VLMM is implemented based on attack sequences s = {x1, x2, ...xn} where xi 2 and is a set of possible values of one or more fields in an alert message. This work shows how the proposed model can be used to predict future attack actions (xj+1) belonging to a newly observed and unfolding attack sequence s = {x1...

ExFILD: a tool for the detection of data exfiltration using entropy and encryption characteristics of network traffic

Fawcett, Tyrell
Fonte: University of Delaware Publicador: University of Delaware
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
37.179858%
Sincoskie, Walter; The twin goals of easy communication and privacy protection have always been in con ict. Everyone can agree that important information such as social secu- rity numbers, credit card numbers, proprietary information, and classi ed govern- ment information should not be shared with untrusted and unknown entities. The Internet makes it rather simple for an attacker to steal this information from even security conscious users without the victims ever discovering the theft. All it takes is one lapse in judgment and an attacker can have access to sensitive information. Currently the computer and network security industry places its focus on tools and techniques that are concerned with what is entering a system and not what is exiting a system. The industry has no reason to not inspect the outgoing tra c. Many attacks' success and e ectiveness rely heavily on tra c exiting the computer system. Outgoing tra c is just as, if not more important to inspect as incoming tra c to detect attacks involving theft of con dential information or interaction between the attacker and victim's computer systems. Frequently recurring data breaches reinforce the necessity of tools and techniques capable of alerting the users when data is being ex ltrated from their computer systems. This thesis explores the use of entropy characteristics of network tra c to ascertain whether egress tra c from computer systems is encrypted. The inspection of network tra c at the session level instead of the packet is proposed to improve the accuracy of the entropy values. It establishes that entropy can indeed be used as an accurate metric of the tra c's actual state of encryption.; University of Delaware...

Japan's security policy and the ASEAN Regional Forum: The search for multilateral security in the Asia Pacific.

Yuzawa, Takeshi
Fonte: London School of Economics and Political Science Thesis Publicador: London School of Economics and Political Science Thesis
Tipo: Thesis; NonPeerReviewed Formato: application/pdf
Publicado em //2005 Português
Relevância na Pesquisa
37.177612%
This thesis explores changes in Japan's conception of and policy toward security multilateralism in the Asia-Pacific region after the end of the Cold War with special reference to the ASEAN Regional Forum (ARF). To understand the complex processes behind the changes in and formation of these perceptions, this study develops an eclectic analysis, which draws on the insights of various theoretical models in International Relations (IR). Based on a persistent analysis of Japan's diplomacy in security institution building over the decade, this study goes on not only to illuminate the problems and the direction of Japan's post-Cold War security policy but also to provide an empirical basis for examining the validity of three theoretical perspectives on the role and efficacies of security institutions, namely realism, neoliberal institutionalism and constructivism. This thesis makes the observation that notwithstanding strong multilateral impulses arising in Japanese policy thinking in the early 1990s, Japan's enthusiasm for regional security multilateralism has dwindled since the late 1990s. It argues that this has been mainly due to Japan's disappointing experiences in the ARF, evinced by abortive efforts to promote cooperative security measures and the failings of multilateral security diplomacy in addressing Japan's security concerns. Japan's enthusiasm for regional security multilateralism has been further diluted by a number of domestic and international constraints on the ARF policy. Combined with perceived limitations of the effectiveness of the ARF...

Migration and the portability of social security benefits: The position of non-citizens in the Southern African Development Community

Millard,Daleen
Fonte: African Human Rights Law Journal Publicador: African Human Rights Law Journal
Tipo: Artigo de Revista Científica Formato: text/html
Publicado em 01/01/2008 Português
Relevância na Pesquisa
37.179858%
The Southern African Development Community (SADC) region currently experiences spontaneous migration of citizens across borders in search of job opportunities and a better standard of living. Generally, freedom of movement across borders which manifests in migration, is a distinguishing feature of globalisation and should be respected as a basic human right. However, what is of growing concern in SADC is the portability of migrants' social security benefits. Do the current SADC structures allow migrants to preserve, maintain and transfer social security benefits such as pension benefits independent of their nationality or country of origin? This article explores the social security measures in individual SADC member states and the extent to which these national measures provide protection for migrants in SADC. Comparing the situation within SADC to that in the European Union, the article concludes that, although there is no simple solution to the problem, it is imperative that SADC member states recognise international standards pertaining to migrants and, more importantly, standards pertaining to the portability of benefits. Ideally, SADC member countries should gradually extend social protection to non-citizens who contribute to their economies through their labour and thereby enhance the right to freedom of movement.