To see the other types of publications on this topic, follow the link: Security risk countermeasure.

Journal articles on the topic 'Security risk countermeasure'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security risk countermeasure.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fenz, Stefan, and Thomas Neubauer. "Ontology-based information security compliance determination and control selection on the example of ISO 27002." Information & Computer Security 26, no. 5 (November 12, 2018): 551–67. http://dx.doi.org/10.1108/ics-02-2018-0020.

Full text
Abstract:
PurposeThe purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and, therefore, the cost efficiency of the information security compliance checking process. The authors advanced the state-of-the-art by developing and applying the method to ISO 27002 information security controls and by developing a semantic decision support system.Design/methodology/approachThe research has been conducted under design science principles. The formalized information security controls were used in a compliance/risk management decision support system which has been evaluated with experts and end-users in real-world environments.FindingsThere are different ways of obtaining compliance to information security standards. For example, by implementing countermeasures of different quality depending on the protection needs of the organization. The authors developed decision support mechanisms which use the formal control descriptions as input to support the decision-maker at identifying the most appropriate countermeasure strategy based on cost and risk reduction potential.Originality/valueFormalizing and mapping the ISO 27002 controls to the security ontology enabled the authors to automatically determine the compliance status and organization-wide risk-level based on the formal control descriptions and the modelled environment, including organizational structures, IT infrastructure, available countermeasures, etc. Furthermore, it allowed them to automatically determine which countermeasures are missing to ensure compliance and to decrease the risk to an acceptable level.
APA, Harvard, Vancouver, ISO, and other styles
2

Baca, Dejan, and Kai Petersen. "Countermeasure graphs for software security risk assessment: An action research." Journal of Systems and Software 86, no. 9 (September 2013): 2411–28. http://dx.doi.org/10.1016/j.jss.2013.04.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sato, Naoshi. "Proposal on Measure Against Cyberattack on the Basis of Recent Trend." Journal of Disaster Research 12, no. 5 (September 27, 2017): 1050–59. http://dx.doi.org/10.20965/jdr.2017.p1050.

Full text
Abstract:
In this paper, we discuss the current situation and problems of cyberattacks from multiple viewpoints, and propose a guideline for future countermeasures. First, we provide an overview of some trends in cyberattacks using various survey data and reports. Next, we examine a new cyberattack countermeasure to control Internet use and propose a specific guideline. Specifically, we propose an Internet user qualification system as a policy to maintain cyber security and discuss ways to realize the system, the expected effects, and problems to be solved.
APA, Harvard, Vancouver, ISO, and other styles
4

Rowshan, Shahed, William C. Sauntry, Thomas M. Wood, Bruce Churchill, and Steve R. Levine. "Reducing Security Risk for Transportation Management Centers." Transportation Research Record: Journal of the Transportation Research Board 1938, no. 1 (January 2005): 17–24. http://dx.doi.org/10.1177/0361198105193800103.

Full text
Abstract:
Transportation management centers (TMCs) make an important difference in the lives of commuters around the country every day. Various types of threats could damage or destroy a TMC's ability to operate. These threats range from rare but devastating terrorist attacks to the more frequent and troublesome utility failures and severe weather conditions. The TMC risk assessment methodology (RAM) introduced in this paper is based on the best practices of several proven RAMs. Its components include asset identification, threat assessment, consequence assessment, vulnerability assessment, and countermeasure development. The research team selected 10 TMCs as a basis for gathering best practices and common challenges. As initial data were developed for the 10 centers, three sites were chosen to participate in more comprehensive on-site vulnerability assessments. This paper provides general recommendations that can be readily applied to all TMCs. These recommendations include taking the time to conduct a comprehensive risk assessment; reviewing, updating, and revising the risk assessment on a regular basis; correcting simple physical vulnerabilities; and training employees in security awareness.
APA, Harvard, Vancouver, ISO, and other styles
5

Yazdinejad, Abbas, Behrouz Zolfaghari, Amin Azmoodeh, Ali Dehghantanha, Hadis Karimipour, Evan Fraser, Arthur G. Green, Conor Russell, and Emily Duncan. "A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures." Applied Sciences 11, no. 16 (August 16, 2021): 7518. http://dx.doi.org/10.3390/app11167518.

Full text
Abstract:
In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention from both the agriculture industry as well as the research community. Altogether, SF and PA aim to help farmers use inputs (such as fertilizers and pesticides) more efficiently through using Internet of Things (IoT) devices, but in doing so, they create new security threats that can defeat this purpose in the absence of adequate awareness and proper countermeasures. A survey on different security-related challenges is required to raise awareness and pave they way for further research in this area. In this paper, we first itemize the security aspects of SF and PA. Next, we review the types of cyber attacks that can violate each of these aspects. Accordingly, we present a taxonomy on cyber-threats to SF and PA on the basis of their relations to different stages of Cyber-Kill Chain (CKC). Among cyber-threats, we choose Advanced Persistent Threats (APTs) for further study. Finally, we studied related risk mitigation strategies and countermeasure, and developed a future road map for further study in this area. This paper’s main contribution is a categorization of security threats within the SF/PA areas and provide a taxonomy of security threats for SF environments so that we may detect the behavior of APT attacks and any other security threat in SF and PA environments.
APA, Harvard, Vancouver, ISO, and other styles
6

Shang, Jin Rui. "Lanshan Port Environmental Protection Countermeasure Research - Based on the Sustainable Development." Advanced Materials Research 726-731 (August 2013): 3961–67. http://dx.doi.org/10.4028/www.scientific.net/amr.726-731.3961.

Full text
Abstract:
This essay established port environmental strategy evaluation system, and formulated an actual and practical environmental strategy implementation security system in the light of the present environmental protection situation: to implement green enterprise culture, to constantly improve green management system, and to establish environmental risk emergency and protection system and sustainable development of ecological supporting system.
APA, Harvard, Vancouver, ISO, and other styles
7

Fenz, Stefan, Johannes Heurix, Thomas Neubauer, and Fabian Pechstein. "Current challenges in information security risk management." Information Management & Computer Security 22, no. 5 (November 10, 2014): 410–30. http://dx.doi.org/10.1108/imcs-07-2013-0053.

Full text
Abstract:
Purpose – The purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches regarding their capability of supporting cost-efficient decisions without unnecessary security trade-offs, outline current fundamental problems in risk management based on industrial feedback and academic literature and provide potential solutions and research directions to address the identified problems. Despite decades of research, the information security risk management domain still faces numerous challenges which hinder risk managers to come up with sound risk management results. Design/methodology/approach – To identify the challenges in information security risk management, existing approaches are compared against each other, and as a result, an abstracted methodology is derived to align the problem and solution identification to its generic phases. The challenges have been identified based on literature surveys and industry feedback. Findings – As common problems at implementing information security risk management approaches, we identified the fields of asset and countermeasure inventory, asset value assignment, risk prediction, the overconfidence effect, knowledge sharing and risk vs. cost trade-offs. The reviewed risk management approaches do not explicitly provide mechanisms to support decision makers in making an appropriate risk versus cost trade-offs, but we identified academic approaches which fulfill this need. Originality/value – The paper provides a reference point for professionals and researchers by summing up the current challenges in the field of information security risk management. Therefore, the findings enable researchers to focus their work on the identified real-world challenges and thereby contribute to advance the information security risk management domain in a structured way. Practitioners can use the research results to identify common weaknesses and potential solutions in information security risk management programs.
APA, Harvard, Vancouver, ISO, and other styles
8

Abimbola, Oni Omoyemi, Akinyemi Bodunde Odunola, Aladesanmi Adegboye Temitope, Ganiyu Adesola Aderounmu, and Kamagaté Beman Hamidja. "An Improved Stochastic Model for Cybersecurity Risk Assessment." Computer and Information Science 12, no. 4 (November 22, 2019): 96. http://dx.doi.org/10.5539/cis.v12n4p96.

Full text
Abstract:
Most of the existing solutions in cybersecurity analysis has been centered on identifying threats and vulnerabilities, and also providing suitable defense mechanisms to improve the robustness of the cyberspace network. These solutions lack effective capabilities to countermeasure the effect of risks and perform long-term prediction. In this paper, an improved risk assessment model for cyberspace security that will effectively predict and mitigate the consequences of risk was developed. Real-time vulnerabilities of a selected network were scanned and analysed and the ease of vulnerability exploitability was assessed. A Risk Assessment Model was formulated using the synergy of Absorbing Markov Chain and Markov Reward Model. The model was utilized to analyse cybersecurity state of the selected network. The proposed model was simulated using R- Statistical Package, and its performance was evaluated by benchmarking with an existing model, using Reliability and Availability as metrics. The result showed that the proposed model has higher reliability and availability over the existing model. This implied that there is a significant improvement in the assessment of security situations in a cyberspace network.
APA, Harvard, Vancouver, ISO, and other styles
9

Viduto, Valentina, Carsten Maple, Wei Huang, and David López-Peréz. "A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem." Decision Support Systems 53, no. 3 (June 2012): 599–610. http://dx.doi.org/10.1016/j.dss.2012.04.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shao, Weiwei, Jiahong Liu, Haixing Zhang, Dianyi Yan, and Weijia Li. "Countermeasure Analysis on Promoting Drinking Water Safety in Shanshan County, Xinjiang Autonomous Region, China." Water 10, no. 8 (August 2, 2018): 1022. http://dx.doi.org/10.3390/w10081022.

Full text
Abstract:
In recent years, China has paid an increasing amount of attention to improving urban and rural drinking water safety, an important aspect of building a healthy and stable society. This study analyzed countermeasures to promote drinking water safety in Turpan City of Shanshan County, in the Xinjiang Autonomous Region. First, we considered the current state of drinking water safety in Shanshan, including issues such as pollution, outdated water treatment technologies, leakage in the water supply pipe network, insufficient emergency management capability in urban areas, and low water supply guarantee rates in rural areas due to poor construction standards. Second, the quantity of guaranteed water resources was estimated; on this basis, an ideal distribution of regional water plants and water supply network needs for the optimal allocation of water resources is suggested. Third, a water purification program was developed to solve untreated water quality problems, including centralized and decentralized water quality treatments alongside intelligent water flow control processes. Water resource conservation and risk control measures are also proposed in order to promote the security of drinking water; equipment updates, and the establishment of an intelligent water management platform are also suggested.
APA, Harvard, Vancouver, ISO, and other styles
11

Shimizu, Kazuki, and Masashi Negita. "Lessons Learned from Japan’s Response to the First Wave of COVID-19: A Content Analysis." Healthcare 8, no. 4 (October 23, 2020): 426. http://dx.doi.org/10.3390/healthcare8040426.

Full text
Abstract:
While the epidemiological impact of the coronavirus disease 2019 (COVID-19) pandemic has been relatively moderate in East-Asian countries, the pandemic has significantly impacted on citizens’ lives and livelihoods, and Japan is no exception. In the early phase of the COVID-19 pandemic, Japan managed unprecedented quarantines and realized the difficulty of controlling COVID-19, finally recording a relatively high number of deaths per million in the Western Pacific region. However, scant research has highlighted the distinctive features of Japan’s reaction and the challenges encountered. To clarify these points and examine Japan’s first response to COVID-19, we performed a content analysis. Minutes of expert meetings were analyzed from multiple viewpoints, including epidemiology, health systems, border control, and health communication. The obscure evolution of the testing strategy, the usefulness of retrospective contact tracing, the rapid scientific risk assessment, a sluggish expansion of health system capacity and response in border control, and misunderstanding between risk communication and crisis communication are made evident by our analysis. Examining previous responses and gathering lessons learned in each country will improve global responses to COVID-19 and strengthen regional health security. Therefore, while investing in public health and ensuring transparency, Japan needs to clarify the previous decision-making process of each countermeasure towards COVID-19.
APA, Harvard, Vancouver, ISO, and other styles
12

Nifakos, Sokratis, Krishna Chandramouli, Charoula Konstantina Nikolaou, Panagiotis Papachristou, Sabine Koch, Emmanouil Panaousis, and Stefano Bonacina. "Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review." Sensors 21, no. 15 (July 28, 2021): 5119. http://dx.doi.org/10.3390/s21155119.

Full text
Abstract:
Background: Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and WannaCry, have brought to life the destructive nature of such attacks upon healthcare. In complement to cyberattacks, which have been targeted against the vulnerabilities of information technology (IT) infrastructures, a new form of cyber attack aims to exploit human vulnerabilities; such attacks are categorised as social engineering attacks. Following an increase in the frequency and ingenuity of attacks launched against hospitals and clinical environments with the intention of causing service disruption, there is a strong need to study the level of awareness programmes and training activities offered to the staff by healthcare organisations. Objective: The objective of this systematic review is to identify commonly encountered factors that cybersecurity postures of a healthcare organisation, resulting from the ignorance of cyber threat to healthcare. The systematic review aims to consolidate the current literature being reported upon human behaviour resulting in security gaps that mitigate the cyber defence strategy adopted by healthcare organisations. Additionally, the paper also reviews the organisational risk assessment methodology implemented and the policies being adopted to strengthen cybersecurity. Methods: The topic of cybersecurity within healthcare and the clinical environment has attracted the interest of several researchers, resulting in a broad range of literature. The inclusion criteria for the articles in the review stem from the scope of the five research questions identified. To this end, we conducted seven search queries across three repositories, namely (i) PubMed®/MED-LINE; (ii) Cumulative Index to Nursing and Allied Health Literature (CINAHL); and (iii) Web of Science (WoS), using key words related to cybersecurity awareness, training, organisation risk assessment methodologies, policies and recommendations adopted as counter measures within health care. These were restricted to around the last 12 years. Results: A total of 70 articles were selected to be included in the review, which addresses the complexity of cybersecurity measures adopted within the healthcare and clinical environments. The articles included in the review highlight the evolving nature of cybersecurity threats stemming from exploiting IT infrastructures to more advanced attacks launched with the intent of exploiting human vulnerability. A steady increase in the literature on the threat of phishing attacks evidences the growing threat of social engineering attacks. As a countermeasure, through the review, we identified articles that provide methodologies resulting from case studies to promote cybersecurity awareness among stakeholders. The articles included highlight the need to adopt cyber hygiene practices among healthcare professionals while accessing social media platforms, which forms an ideal test bed for the attackers to gain insight into the life of healthcare professionals. Additionally, the review also includes articles that present strategies adopted by healthcare organisations in countering the impact of social engineering attacks. The evaluation of the cybersecurity risk assessment of an organisation is another key area of study reported in the literature that recommends the organisation of European and international standards in countering social engineering attacks. Lastly, the review includes articles reporting on national case studies with an overview of the economic and societal impact of service disruptions encountered due to cyberattacks. Discussion: One of the limitations of the review is the subjective ranking of the authors associated to the relevance of literature to each of the research questions identified. We also acknowledge the limited amount of literature that focuses on human factors of cybersecurity in health care in general; therefore, the search queries were formulated using well-established cybersecurity related topics categorised according to the threats, risk assessment and organisational strategies reported in the literature.
APA, Harvard, Vancouver, ISO, and other styles
13

Ele, Bassey, Odey John Adinya, and Obono, I. O. "The Impact of Emerging Wireless Network System and Cybersecurity in A Global Community." Transactions on Networks and Communications 8, no. 5 (October 31, 2020): 26–42. http://dx.doi.org/10.14738/tnc.85.9628.

Full text
Abstract:
Wireless network systems and cybersecurity threats are growing faster than their mitigation measures. World Economic Forum has identified wireless network security and cybersecurity threats as its top global risks for the past eight years. This paper aims to critically examine the impact of emerging wireless network systems and cybersecurity in a global community and suggest some best countermeasures against wireless and cybersecurity threats that have been of global concern. To achieve this, the study conducted an in-depth review of wireless network security and cybersecurity. This study has presented a robust wireless security mechanism and suggests appropriate countermeasure against wireless network and cybersecurity threats that is more cost-effective in mounting attacks in the service area, and simultaneously providing higher security than basic security mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
14

Hausken, Kjell, and Fei He. "On the Effectiveness of Security Countermeasures for Critical Infrastructures." Risk Analysis 36, no. 4 (December 9, 2014): 711–26. http://dx.doi.org/10.1111/risa.12318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yousuf, Omerah, and Roohie Naaz Mir. "A survey on the Internet of Things security." Information & Computer Security 27, no. 2 (June 12, 2019): 292–323. http://dx.doi.org/10.1108/ics-07-2018-0084.

Full text
Abstract:
Purpose Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an extremely critical issue for IoT that needs to be addressed efficiently. Heterogeneity being an inherent characteristic of IoT gives rise to many security issues that need to be addressed from the perspective of new architectures such as software defined networking, cryptographic algorithms, federated cloud and edge computing. Design/methodology/approach The paper analyzes the IoT security from three perspectives: three-layer security architecture, security issues at each layer and security countermeasures. The paper reviews the current state of the art, protocols and technologies used at each layer of security architecture. The paper focuses on various types of attacks that occur at each layer and provides the various approaches used to countermeasure such type of attacks. Findings The data exchanged between the different devices or applications in the IoT environment are quite sensitive; thus, the security aspect plays a key role and needs to be addressed efficiently. This indicates the urgent needs of developing general security policy and standards for IoT products. The efficient security architecture needs to be imposed but not at the cost of efficiency and scalability. The paper provides empirical insights about how the different security threats at each layer can be mitigated. Originality/value The paper fulfills the need of having an extensive and elaborated survey in the field of IoT security, along with suggesting the countermeasures to mitigate the threats occurring at each level of IoT protocol stack.
APA, Harvard, Vancouver, ISO, and other styles
16

Su, Zhan Gang. "The Management of High-Rise Building Construction Safety Risks." Advanced Materials Research 1055 (November 2014): 297–300. http://dx.doi.org/10.4028/www.scientific.net/amr.1055.297.

Full text
Abstract:
With the continuous development of economic level and the construction technology and progress, safety accident frequency is becoming more and higher, but now does not specifically for high-rise housing construction project the life cycle of the comprehensive security risk management research. From the high-rise building construction engineering safety construction and the basic theory and method of risk management, for high-rise building construction in the process of project construction safety risk identification, analysis and evaluation, explores the solution to the corresponding security risk effective management countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
17

Huu Phuoc Dai, Nguyen, András Kerti, and Zoltán Rajnai. "E-Learning Security Risks and its Countermeasures." Journal of Emerging research and solutions in ICT 1, no. 1 (April 28, 2016): 17–25. http://dx.doi.org/10.20544/ersict.01.16.p02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, Tai-hua, Jing Qin, and Zhi-xiang Li. "Public Safety Risk Assessment of Power Investment Project Based on Fuzzy Set and DS Evidence Theory." E3S Web of Conferences 143 (2020): 02009. http://dx.doi.org/10.1051/e3sconf/202014302009.

Full text
Abstract:
In recent years, the international situation has become more and more complex, and the regional conflicts have been escalating, and the risks of overseas public security have been increasing. Based on the four types of public security events, a public safety risk assessment index system of "one belt and one road" electric power investment project is established. Combining the Bayesian network model, and using fuzzy set and DS evidence theory, the public security risk level of the “Belt and Road” countries can be this method has been effectively verified and put forward countermeasures by an example.
APA, Harvard, Vancouver, ISO, and other styles
19

Fang, Binxing, Jinqiao Shi, Zhongru Wang, and Weiqiang Yu. "AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures." Chinese Journal of Engineering Science 23, no. 3 (2021): 60. http://dx.doi.org/10.15302/j-sscae-2021.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hamdi, Mohamed, and Noureddine Boudriga. "Computer and network security risk management: theory, challenges, and countermeasures." International Journal of Communication Systems 18, no. 8 (2005): 763–93. http://dx.doi.org/10.1002/dac.729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Fei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3456631.

Full text
Abstract:
Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.
APA, Harvard, Vancouver, ISO, and other styles
22

Kaewunruen, Sakdirat, Hamad Alawad, and Silviu Cotruta. "A Decision Framework for Managing the Risk of Terrorist Threats at Rail Stations Interconnected with Airports." Safety 4, no. 3 (September 1, 2018): 36. http://dx.doi.org/10.3390/safety4030036.

Full text
Abstract:
This paper highlights a risk-based decision-making framework on a basis of probabilistic risk assessment (PRA). Its aim is to enable stakeholders of transport infrastructures to systematically and effectively allocate their limited resources and consequently improve resilience when facing the potential risk of a terrorist attack. The potential risk of a terrorist attack affects the inter-operation of transportation infrastructures including airports and rail stations, the regional economy, and imposes additional costs of security or any countermeasures. This novel framework is thus established in order to model the security system, to consider a multitude of threat scenarios, and to assess the decisions and choices taken by the aggressors during various stages of their attack. The framework has capability to identify the state of partial neutralization, which reveals the losses incurred when the terrorist could not reach the primary target. In this study, an underground railway station interconnected to an international airport has been used as a case study to demonstrate the effectiveness of this novel framework. By the rigorous assessment of potential losses during a variety of threat scenarios, four countermeasures that could minimise losses are proposed: screening of passengers by observation techniques (SPOT), a surveillance system, increase of the cargo screening rate, and blast-resistant cargo containers. The cost and efficiency assessment is employed to determine the most suitable countermeasures when the value of the security measures equal their cost. Note that ongoing research is still needed to establish better countermeasures since there is no end to the creativity of terrorists. The new technology, such as wireless sensors, will play an important role in the security system in the future. In particular, this study will help insurance and rail industries to model and manage risk profiles at critical infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Cheng. "Research on Enterprise Information Security of the ERP System." Applied Mechanics and Materials 380-384 (August 2013): 2539–43. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2539.

Full text
Abstract:
With the wide application of ERP system in manufacturing enterprises in China, Issues of enterprise information security are becoming increasingly influential. On the basis of elaborating information security and information risk, this article analysis systematically the enterprise information security management system, and explore the key information security problems in ERP environment, and proposed the corresponding countermeasures and suggestions.
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Yuqing, Yuhuai Zhang, Peiqi Duan, Boxin Shi, Zhaofei Yu, Tiejun Huang, and Wen Gao. "Technical Countermeasures for Security Risks of Artificial General Intelligence." Chinese Journal of Engineering Science 23, no. 3 (2021): 75. http://dx.doi.org/10.15302/j-sscae-2021.03.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Parra, Ramón, Victor Morales Rocha, and Samuel Martínez Magdaleno. "A review of security risks and countermeasures in containers." International Journal of Security and Networks 16, no. 3 (2021): 183. http://dx.doi.org/10.1504/ijsn.2021.10041303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Jiang, Cheng, Bin Yang, Liangliang Zhu, Wenjun Ruan, and Zhenyu Wang. "Research on Risk Early Warning of Integrated Energy Trading Market." E3S Web of Conferences 213 (2020): 02035. http://dx.doi.org/10.1051/e3sconf/202021302035.

Full text
Abstract:
The advent of the energy Internet era has deepened the coupling between different energy sources. Energy conversion and storage components such as micro gas turbines, electricity-to-gas, and air source/ground source heat pumps have gradually become the mainstay of the integrated energy market. During the construction of China’s integrated energy trading market, various risks will be faced inevitably. In order to promote the sustainable and healthy development of the market, risk early warning research is particularly important. The normal operation of the integrated energy trading market can be guaranteed by early warning of the risk state of the market and timely adoption of corresponding countermeasures to control risks. This article first combed the concepts of integrated energy services and integrated trading market, and pointed out the important position of the integrated energy trading market in the energy and national economic system. Secondly, it identifies the risk factors that affect the security of China’s integrated energy trading market. Then, an effective method for predicting the risk of China’s integrated energy trading market is constructed through the fuzzy risk early warning method. Finally, corresponding countermeasures and suggestions are put forward for risk management of China’s integrated energy trading market.
APA, Harvard, Vancouver, ISO, and other styles
27

Chung Yong In. "Security Status and Risk Management Countermeasures of the Republic of Korea." Police Science Journal 11, no. 4 (November 2016): 191–215. http://dx.doi.org/10.16961/polips.2016.11.4.191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lei, Wang. "Study on Security Countermeasures of Cross-border E-Commerce Payment Risk." Journal of Physics: Conference Series 1616 (August 2020): 012042. http://dx.doi.org/10.1088/1742-6596/1616/1/012042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Shi, An Na, and Su Juan Ge. "The Characteristics of China's Hydropower Projects Overseas Investment Risk and Possible Countermeasures." Applied Mechanics and Materials 672-674 (October 2014): 2132–39. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.2132.

Full text
Abstract:
In the sustained rapid growth of the international economy, foreign investment and international business is becoming the next mainstream context, China vigorously implement the "going out" strategy, encouraging foreign investment. With economic growth, the rapid growth of the world's water and electricity consumption are also in the growing strength of China's hydropower companies powerful premise, accelerate the development of hydropower projects overseas investment is an inevitable trend. This is not only of significance for the development of major hydropower companies, while the international operations of Chinese enterprises to China’s energy security, energy policy have far-reaching implications. But the ever-changing international situation and uncertainty investment host country's investment environment for foreign investment in hydropower projects risk assessment and prevention challenges. Hydropower projects overseas investment risks should not be underestimated, risk assessment and prevention of improper investment will bring huge losses. This paper studies the characteristics of China's hydropower projects overseas investment risks and prevention.
APA, Harvard, Vancouver, ISO, and other styles
30

Et. al., Tarun Dhar Diwan,. "AN INVESTIGATION AND ANALYSIS OF CYBER SECURITY INFORMATION SYSTEMS: LATEST TRENDS AND FUTURE SUGGESTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 25, 2021): 477–92. http://dx.doi.org/10.17762/itii.v9i2.372.

Full text
Abstract:
Network protection includes of the strategies and procedures implemented in this paper to avoid and monitor intrusion attempts, infringement, manipulation or violation of a computer system and services accessed by the network. Network protection applies to the different countermeasures put in place to secure or flow through the network and data collected on or through it. Protection for web applications is the method of securing websites and internet resources from multiple security attacks that target weaknesses in an application. Security for web apps is a data management division that primarily deals with the security of websites, web applications and web services. Risks to cyber security include a broad range of allegedly criminal practices on the web. For years, computer security risks against utility assets were identified, cyber-attacks arising from the exploitation of data device weaknesses by unauthorized access users This study is a cyber infrastructure assault, vulnerability and vulnerabilities, including hardware and software devices, networks, business networks, intranets, and cyber intrusion usage. Only big organisations are at risk of cyber-attacks, a widespread misunderstanding. Even then, the targeting of small and medium sized enterprises has seen a large improvement. This is since less-sophisticated cyber defence mechanisms appear to be used by these smaller organisations. As many as 50% of all cyber-attacks hit small companies, wasting $200,000 on average, sufficient to get out of business for less-established entities. an enterprise-grade protection device and awareness of the various forms of cyber threats facing corporations in 2025 to safeguard company from hacking attacks. fight cyber threats successfully and decrease the exposure of enterprise.
APA, Harvard, Vancouver, ISO, and other styles
31

Abdullah, Zubaile, and Madihah Mohd Saudi. "RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.15.21370.

Full text
Abstract:
Android applications may pose risks to smartphone users. Most of the current security countermeasures for detecting dangerous apps show some weaknesses. In this paper, a risk assessment method is proposed to evaluate the risk level of Android apps in terms of confidentiality (privacy), integrity (financial) and availability (system). The proposed research performs mathematical analysis of an app and returns a single easy to understand evaluation of the app’s risk level (i.e., Very Low, Low, Moderate, High, and Very High). These schemes have been tested on 2488 samples coming from Google Play and Android botnet dataset. The results show a good accuracy in both identifying the botnet apps and in terms of risk level.
APA, Harvard, Vancouver, ISO, and other styles
32

Yao, Dong Liang, and Xiao Qin Liu. "Research on the Cyber Terrorist Attacks and its Impacts on Information Infrastructure Security." Advanced Materials Research 268-270 (July 2011): 2108–15. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2108.

Full text
Abstract:
With technology advances, the interdependence of various infrastructures has increased, which enhances their vulnerabilities. The national information infrastructure security concerns the nation's stability and economic security. Risk assessment methodology was introduced into the safeguard of the information infrastructure, which is prone to terrorist attack. Through the analysis of terrorists’ behaviors and its characteristics, the four steps of risk management were studied in detail using many factual examples. The macroscopic and microscopic countermeasures were developed lately, which attribute to adopting counteractions to reduce the vulnerability and relieve the risk in the modern society caused by terrorist attack.
APA, Harvard, Vancouver, ISO, and other styles
33

Díaz de León Guillén, Miguel Ángel, Víctor Morales-Rocha, and Luis Felipe Fernández Martínez. "A systematic review of security threats and countermeasures in SaaS." Journal of Computer Security 28, no. 6 (November 27, 2020): 635–53. http://dx.doi.org/10.3233/jcs-200002.

Full text
Abstract:
Among the service models provided by the cloud, the software as a service (SaaS) model has had the greatest growth. This service model is an attractive option for organizations, as they can transfer part or all of their IT functions to a cloud service provider. However, there is still some uncertainty about deciding to carry out a migration of all data to the cloud, mainly due to security concerns. The SaaS model not only inherits the security problems of a traditional application, but there are unique attacks and vulnerabilities for a SaaS architecture. Additionally, some of the attacks in this environment are more devastating due to nature of shared resources in the SaaS model. Some of these attacks and vulnerabilities are not yet well known to software designers and developers. This lack of knowledge has negative consequences as it can expose sensitive data of users and organizations. This paper presents a rigorous systematic review using the SALSA framework to know the threats, attacks and countermeasures to mitigate the security problems that occur in a SaaS environment. As part of the results of this review, a classification of threats, attacks and countermeasures in the SaaS environment is presented.
APA, Harvard, Vancouver, ISO, and other styles
34

Aliwa, Emad, Omer Rana, Charith Perera, and Peter Burnap. "Cyberattacks and Countermeasures for In-Vehicle Networks." ACM Computing Surveys 54, no. 1 (April 2021): 1–37. http://dx.doi.org/10.1145/3431233.

Full text
Abstract:
As connectivity between and within vehicles increases, so does concern about safety and security. Various automotive serial protocols are used inside vehicles such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay. CAN Bus is the most used in-vehicle network protocol to support exchange of vehicle parameters between Electronic Control Units (ECUs). This protocol lacks security mechanisms by design and is therefore vulnerable to various attacks. Furthermore, connectivity of vehicles has made the CAN Bus vulnerable not only from within the vehicle but also from outside. With the rise of connected cars, more entry points and interfaces have been introduced on board vehicles, thereby also leading to a wider potential attack surface. Existing security mechanisms focus on the use of encryption, authentication, and vehicle Intrusion Detection Systems (IDS), which operate under various constraints such as low bandwidth, small frame size (e.g., in the CAN protocol), limited availability of computational resources, and real-time sensitivity. We survey and classify current cryptographic and IDS approaches and compare these approaches based on criteria such as real-time constraints, types of hardware used, changes in CAN Bus behaviour, types of attack mitigation, and software/ hardware used to validate these approaches. We conclude with mitigation strategies limitations and research challenges for the future.
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Biao, Huan Guo Zhang, and Yun Liang Fang. "Research on the Key Technologies of SaaS Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1860–63. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1860.

Full text
Abstract:
Saas is an abbreviation for Software-as-a-service, it is a completely innovative software application mode provided via Internet. As a new IT service model, SaaS has two sides. This article focuses on analysis the existent security risks of SaaS and put forward a series of countermeasures and suggestions to address these issues from the technical aspects.
APA, Harvard, Vancouver, ISO, and other styles
36

Gupta, Deena Nath, and Rajendra Kumar. "Networking in IoT: Technologies Usage, Security Threats, and Possible Countermeasures." International Journal of Sensors, Wireless Communications and Control 11, no. 6 (August 25, 2021): 619–26. http://dx.doi.org/10.2174/2210327910666210106090826.

Full text
Abstract:
IoT is the networking of daily use objects. These objects are commonly known as constrained devices. Constrained devices work with low memory, low storage, and low computation power. Implementing security algorithms in these devices is challenging. The researchers take these challenges as an opportunity. The diverse and heterogeneous structure of the IoT phenomenon introduces a variety of new security risks and challenges. Many threats such as botnets, home intrusion, remote control of the IoT devices, and man-in-the-middle attacks are threatening the IoT environment. Hence, it needs stronger security implementation to protect IoT devices from being compromised. The authors survey different kinds of networking technologies under an IoT environment, security challenges on them, and possible countermeasures for these challenges to form a more secure IoT environment for trustful adaptation of services through industrial or personal use. In this paper, the authors presented the study of numerous networking technologies, along with possible threats and their countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
37

Vishwakarma, Pinki Prakash, Amiya Kumar Tripathy, and Srikanth Vemuru. "The Fact-Finding Security Examination in NFC-enabled Mobile Payment System." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (June 1, 2018): 1774. http://dx.doi.org/10.11591/ijece.v8i3.pp1774-1780.

Full text
Abstract:
Contactless payments devised for NFC technology are gaining popularity. Howbeit, with NFC technology permeating concerns about arising security threats and risks to lessen mobile payments is vital. The security analysis of NFC-enabled mobile payment system is precariously imperative due to its widespread ratification. In mobile payments security is a prevalent concern by virtue of the financial value at stave. This paper assays the security of NFC based mobile payment system. It discusses the security requirements, threats and attacks that could occur in mobile payment system and the countermeasures to be taken to secure pursuance suitability.
APA, Harvard, Vancouver, ISO, and other styles
38

Argyropoulos, Nikolaos, Konstantinos Angelopoulos, Haralambos Mouratidis, and Andrew Fish. "Risk-aware decision support with constrained goal models." Information & Computer Security 26, no. 4 (October 8, 2018): 472–90. http://dx.doi.org/10.1108/ics-01-2018-0010.

Full text
Abstract:
Purpose The selection of security configurations for complex information systems is a cumbersome process. Decision-making regarding the choice of security countermeasures has to take into consideration a multitude of, often conflicting, functional and non-functional system goals. Therefore, a structured method to support crucial security decisions during a system’s design that can take account of risk whilst providing feedback on the optimal decisions within specific scenarios would be valuable. Design/methodology/approach Secure Tropos is a well-established security requirements engineering methodology, but it has no concepts of Risk, whilst Constrained Goal Models are an existing method to support relevant automated reasoning tasks. Hence we bridge these methods, by extending Secure Tropos to incorporate the concept of Risk, so that the elicitation and analysis of security requirements can be complimented by a systematic risk assessment process during a system’s design time and supporting the reasoning regarding the selection of optimal security configurations with respect to multiple system objectives and constraints, via constrained goal models. Findings As a means of conceptual evaluation, to give an idea of the applicability of the approach and to check if alterations may be desirable, a case study of its application to an e-government information system is presented. The proposed approach is able to generate security mechanism configurations for multiple optimisation scenarios that are provided, whilst there are limitations in terms of a natural trade-off of information levels of risk assessment that are required to be elicited. Originality/value The proposed approach adds additional value via its flexibility in permitting the consideration of different optimisation scenarios by prioritising different system goals and the automated reasoning support.
APA, Harvard, Vancouver, ISO, and other styles
39

Samios, Michael, Christos P. Evangelidis, and Emmanouil Serrelis. "Assessment of Information Security Vulnerabilities in Common Seismological Equipment." Seismological Research Letters 92, no. 2A (February 10, 2021): 933–40. http://dx.doi.org/10.1785/0220200151.

Full text
Abstract:
Abstract Modern seismic and Global Navigation Satellite Systems stations are nowadays equipped with Internet of Things devices that acquire, process, and transmit various geophysical parameters in near-real time. This technological advance has introduced a new threat paradigm for common seismological devices. Such threats can be assessed with standard information security methods and practices. This article aims to identify security weaknesses, describe weak security points and potential attacks on such environments, and anticipate the countermeasures needed. Real tests and attacks have been applied to demonstrate the lack of data encryption and user authentication processes, the risks posed by unencrypted communication protocols, unsafe practices regarding settings and passwords, and poor design implementations. All these factors may impact and possibly disrupt the daily operation of seismic observatories because they can lead to falsifying data, altering configurations, or producing malicious false alarms. These in turn may cause unnecessary public concern or distrust, financial losses, or even national security issues. For all these reasons, several countermeasures and solutions are also proposed and evaluated to address each of the identified vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
40

Simoncini, Marta. "Regulating Catastrophic Risks by Standards." European Journal of Risk Regulation 2, no. 1 (March 2011): 37–50. http://dx.doi.org/10.1017/s1867299x0000060x.

Full text
Abstract:
This article analyses the role played by standards of protection in the regulation of catastrophic risks. It examines how to protect people against the occurrence of catastrophic events, considering that the related risk is highly uncertain and difficult to predict using rational methodologies. In this perspective, the article focuses on environmental risks and terrorist threats affecting common goods – namely environment and security – areas where any damage is susceptible to producing ruinous effects and huge casualties. Both natural and man-made disasters are capable of altering the normal legal relations that States are institutionally to ensure to their citizens. Therefore, the severity of the consequences of catastrophic events cannot be ignored, despite the low probability of their occurrence. However, in the absence of emergencies, exceptional measures may be adopted as a means of altering the legal framework, and thus the enjoyment, of fundamental freedoms and priorities in the allocation of public resources. No precautionary approach can escape from rational reflections about the opportunity-cost of any action, the cost-benefit analysis of countermeasures and the proportionality of every regulatory decision. In order to understand how to face those “low probability – high cost” risks, the article considers a specific method of regulating risks by resorting to standards of protection. By using thresholds of alarm, public administrations can decide upon best-fit countermeasures that will correspond to specific risk characterisations. To this end, the article analyses the administrative process of formulating standards and how they enable uncertain risks to be managed, thus promoting the development of a sound and accountable administration.
APA, Harvard, Vancouver, ISO, and other styles
41

Jouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Framework for Secure Cloud Computing Environments." International Journal of Cloud Applications and Computing 6, no. 3 (July 2016): 32–44. http://dx.doi.org/10.4018/ijcac.2016070103.

Full text
Abstract:
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.
APA, Harvard, Vancouver, ISO, and other styles
42

Dong, Pu, and Si You Wang. "Risks and Countermeasures of the Shale Gas Development in China." Advanced Materials Research 734-737 (August 2013): 1253–56. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.1253.

Full text
Abstract:
Recently,accelerating shale gas development and utilization is of great significance to safeguard the security of energy supply. As a new energy resource, shale gas has great development prospects, but to develop and to make use of this resource is quite difficult and has high risks due to the exploitation technology, environmental protection, the market, and so forth. It can help the shale gas companies get better development by focusing on the prospective risks that they may face and looking for the solutions. This paper analyzes the various risks that the shale gas development companies may face and puts forward the measurements to deal with these risks.
APA, Harvard, Vancouver, ISO, and other styles
43

Song, Meng Hua. "Analysis of Risks for Virtualization Technology." Applied Mechanics and Materials 539 (July 2014): 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.

Full text
Abstract:
In IT field, the application of the virtualization technology has expanded the capacity of computer hardware, simplified the software configuration process, and simulated the parallel operation of multiple CPUs. Such technology can achieve multiple operating systems running one platform at the same time, and improve the work efficiency of the computer. In the application of the virtualization technology, there are various conditions to cause risks, such as security, high resource utilization, disunited virtualization technology standards, expectation for cost reduction, changes in management mode and application migration, etc. For the risk existing in the application of the technology, the author puts forward the specific countermeasures, benefiting the abatement or elimination of risk of virtualization technology application, thus to ensure the purpose of applying such technology. This paper mainly analyzes the target the risk of virtualization technology application and puts forward the specific measures for reducing the risk of the virtualization technology application, in order to facilitate the practical application and development of the virtualization technology.
APA, Harvard, Vancouver, ISO, and other styles
44

Abosata, Nasr, Saba Al-Rubaye, Gokhan Inalhan, and Christos Emmanouilidis. "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications." Sensors 21, no. 11 (May 24, 2021): 3654. http://dx.doi.org/10.3390/s21113654.

Full text
Abstract:
The growth of the Internet of Things (IoT) offers numerous opportunities for developing industrial applications such as smart grids, smart cities, smart manufacturers, etc. By utilising these opportunities, businesses engage in creating the Industrial Internet of Things (IIoT). IoT is vulnerable to hacks and, therefore, requires various techniques to achieve the level of security required. Furthermore, the wider implementation of IIoT causes an even greater security risk than its benefits. To provide a roadmap for researchers, this survey discusses the integrity of industrial IoT systems and highlights the existing security approaches for the most significant industrial applications. This paper mainly classifies the attacks and possible security solutions regarding IoT layers architecture. Consequently, each attack is connected to one or more layers of the architecture accompanied by a literature analysis on the various IoT security countermeasures. It further provides a critical analysis of the existing IoT/IIoT solutions based on different security mechanisms, including communications protocols, networking, cryptography and intrusion detection systems. Additionally, there is a discussion of the emerging tools and simulations used for testing and evaluating security mechanisms in IoT applications. Last, this survey outlines several other relevant research issues and challenges for IoT/IIoT security.
APA, Harvard, Vancouver, ISO, and other styles
45

Jing, Xue Lei. "Application of Network Security Technology in the Internet Finance." Applied Mechanics and Materials 738-739 (March 2015): 1133–36. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1133.

Full text
Abstract:
With the popularity of the Internet and the rise of mobile Internet application, the Internet finance is growing rapidly. The Internet finance includes online shopping, mobile payment, online financial management etc. However, there exists security problems in third-party payment, online shopping, online banking, mobile payment, etc. In order to solve the security problems with Internet finance, on the one hand, government should establish and perfect law and regulation systems, standardize network security technology, strengthen the network supervision, and make more effort to crack down Internet crimes; on the other hand, Internet users need to enhance network security awareness, and network security researchers should provide methods and countermeasures to prevent the online frauds.
APA, Harvard, Vancouver, ISO, and other styles
46

Yoo, Jincheol, Sangwoo Moon, and Jong-hwa Kim. "Ransomware Threat Countermeasures for the Defense Information System : In terms of Information Security Risk Management." Jouranl of Information and Security 20, no. 5 (December 31, 2020): 75–80. http://dx.doi.org/10.33778/kcsa.2020.20.5.075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cai, Liang Jun, Lei Huang, and Liu Gen Lv. "Human Factors Reconcile Mechanism and Risk Management Research for Natural Gas and Liquefied Petroleum Gas Distribution Station." Advanced Materials Research 524-527 (May 2012): 2982–86. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.2982.

Full text
Abstract:
Human factors are an important link of natural gas and liquefied petroleum gas distribution station security. In this paper, for the man-machine harmonious as a starting point, to focus attention on the value of life as the keynote, studied human factors risk management processes, methods and risk management strategies of distribution station. The article put forward "two ways, three countermeasures, four habits, five party thinking" risk reconcile mechanism of human factors, which reconcile the hidden trouble of human factors, and improve management efficiency and expand prevention barrier, to achieve sustainable development of oil and gas system.
APA, Harvard, Vancouver, ISO, and other styles
48

Xu, Xinpeng, Youjing Wang, and Linshu Li. "Risks and Countermeasures of Flexible Employment in Enterprises under the Sharing Economy." Journal of Asian Research 4, no. 2 (June 3, 2020): p62. http://dx.doi.org/10.22158/jar.v4n2p62.

Full text
Abstract:
The sharing economy has brought great challenges to the traditional employment mode of enterprises, and also provided important opportunities for their innovation. In this context, how to combine their own production and operation conditions to find a suitable employment model is an inevitable choice to optimize the labor cost. External conditions such as the optimization of the legal system, the support and guidance of the state in social security policies are also essential.
APA, Harvard, Vancouver, ISO, and other styles
49

Vennam, Preethi, Pramod T. C., Thippeswamy B. M., Yong-Guk Kim, and Pavan Kumar B. N. "Attacks and Preventive Measures on Video Surveillance Systems: A Review." Applied Sciences 11, no. 12 (June 16, 2021): 5571. http://dx.doi.org/10.3390/app11125571.

Full text
Abstract:
Video surveillance systems are widely deployed with large systems for use in strategic places such as home security, public transportation, banks, ATM centers, city centers, airports, and public roads, and play a vital role in protecting critical infrastructures. As various attacks are possible in these systems, identifying attacks and considering suitable security measures are essential. In this paper, we present a detailed review of existing and possible threats in video surveillance, CCTV, and IP-camera systems. This provides insight for the better identification of the security risks associated with the design and deployment of these systems and promotes further research in this emerging field. We also present countermeasures to prevent and protect the surveillance systems from various security attacks.
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Ying Chun, and Sha Chen. "Analysis of Informatization Construction for SMEs with SaaS Model." Advanced Materials Research 187 (February 2011): 652–57. http://dx.doi.org/10.4028/www.scientific.net/amr.187.652.

Full text
Abstract:
This paper analyzes the problems SMEs faced in the informatization construction. Combined with the advantages of SaaS model, we proposed a new model of information management for SMEs based on SaaS software services. But the SaaS model is not without any shortcoming, so this paper also analyzes security risks of SaaS models and put forward the corresponding countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography