Academic literature on the topic 'Security technician'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security technician.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security technician"

1

MURILLO, DE OLIVEIRA DIAS. "TEACHING MATERIALS ON SECURITY TECHNICIAN BUSINESS NEGOTIATION." GPH-International Journal of Educational Research 06, no. 08 (2023): 12–27. https://doi.org/10.5281/zenodo.8367744.

Full text
Abstract:
<strong>The current study focuses on a case analysis of a security business negotiation in Brazil. The primary aim of this program is to enhance the negotiating skills of business negotiators, academics, and practitioners. This finding is achieved via a role-play simulation that involves two sides and several topics. The current legal issue concerns a government-owned firm and a privately-owned software manufacturer, arising within a month before their two-year contractual arrangement is terminated. The primary findings emphasized the need to improve integrative strategies, which include understanding the opposing party&#39;s underlying interests and creating value to achieve mutually advantageous agreements. The research suggests that the results have the potential to be replicated in other business environments, especially ones that exhibit power imbalances. The present research article culminates in a comprehensive discussion and offers suggestions for further investigations.</strong>
APA, Harvard, Vancouver, ISO, and other styles
2

Castillo Escalante, Irma Cecilia, and Adán Guillermo Ramírez García. "Curricular Innovation for Food Security." Education Sciences 13, no. 4 (2023): 374. http://dx.doi.org/10.3390/educsci13040374.

Full text
Abstract:
The curriculum is a dynamic and continuous process that must be adapted to the requirements and needs of specific contexts to respond to current problems. Currently, it is estimated that more than 828 million people in the world suffer from hunger, so food security must be based on the production and availability of food and physical and economic access to food, as well as its safety. For the above, this research aims to propose a curricular innovation to the professional competences of the study program of the Agricultural Technician (TAP) that is offered in the Agricultural Technological Baccalaureate Centers to train technicians who contribute to food security in the region. A methodology with a mixed perspective with a qualitative approach and descriptive exploratory character was used. Based on the primary information and data collection, it was possible to specify and substantiate a curricular proposal according to the training needs of specialized technicians, who develop professional skills to promote food security, the establishment of agricultural production system, management of livestock production systems, operation of agro-industrial production system, and the design and execution of projects to promote the cultivation of food from small-scale families.
APA, Harvard, Vancouver, ISO, and other styles
3

Angelia Merdiyanti, Nabila Dwi Lestari, and Yulius Jatmiko Nuryatno. "ANALISIS BEBAN KERJA KARYAWAN PADA DEPARTEMEN AFTERSALES KIA HARAPAN INDAH." Journal of Social and Economics Research 5, no. 2 (2023): 318–33. http://dx.doi.org/10.54783/jser.v5i2.135.

Full text
Abstract:
Penelitian ini bertujuan mengukur beban kerja dan jumlah tenaga kerja optimal untuk menyelesaikan pekerjaan pada Departemen Aftersales KIA Harapan Indah. Metode penelitian yang digunakan adalah Full Time Equivalent (FTE) pada 6 jabatan, yaitu part admin, service advisor, technician, foreman, cashier dan security. Pengukuran nilai FTE dilakukan dengan menghitung beban kerja seluruh karyawan dalam satu jabatan selama periode waktu tertentu. Untuk itu diperlukan data frekuensi setiap unit pekerjaan, waktu untuk menyelesaikan suatu pekerjaan, dan jumlah orang yang melakukan suatu pekerjaan. Hasil pengukuran menunjukkan total beban kerja untuk jabatan part admin, service advisor, technician, foreman, cashier dan security masing-masing sebesar 70202 menit, 262766 menit, 640965 menit, 296685 menit, 105512 menit, dan 114672 menit. Adapun nilai FTE untuk jabatan part admin, cashier dan security berturut-turut sebesar 0,75, 1,02, dan 1,08 yang menunjukkan beban kerja berada pada kriteria normal. Sedangkan indeks FTE untuk jabatan service advisor, technician, dan foreman menunjukkan beban kerja pada kriteria overload dengan nilai masing-masing sebesar 2,21, 5,07, dan 2,46. Berdasarkan perhitungan kebutuhan tenaga kerja diperoleh jumlah karyawan optimal untuk jabatan Part Admin dan cashier masing-masing 1 orang, untuk jabatan Service Advisor dan Foreman masing-masing sebanyak 3 orang, untuk jabatan Technician sebanyak 7 orang, dan untuk jabatan Security sebanyak 2 orang.
APA, Harvard, Vancouver, ISO, and other styles
4

Rushikesh, Patil. "A Review: Artificial Intelligence and Expert Systems for Cyber Security Authors." BOHR International Journal of Engineering 1, no. 1 (2022): 53–57. http://dx.doi.org/10.54646/bije.010.

Full text
Abstract:
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The system uses various datasets like a machine and deep learning as well as reinforced learning in order to make intelligent decisions. The Internet of things (IoT) is one of the major concerns for cyber security because it is potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest and potentially the weakest link in the cyber security environment. This review intends to present AI and expert systems for cyber security.
APA, Harvard, Vancouver, ISO, and other styles
5

Rushikesh, Patil. "A review: Artificial intelligence and expert systems for cyber security." BOHR International Journal of Engineering 1, no. 1 (2022): 52–56. http://dx.doi.org/10.54646/bije.2022.10.

Full text
Abstract:
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The system uses various datasets like a machine and deep learning as well as reinforced learning in order to make intelligent decisions. The Internet of Things (IoT) is one of the major concerns for cyber security because it is potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest and potentially the weakest link in the cyber security environment. This review intends to present AI and expert systems for cyber security.
APA, Harvard, Vancouver, ISO, and other styles
6

Kazarinoff, Peter. "Letter From Editor JATE." Journal of Advanced Technological Education 1, no. 1 (2022): 1–2. https://doi.org/10.5281/zenodo.6366329.

Full text
Abstract:
Welcome to the Journal of Advanced Technological Education! Or, as we like to call it, J ATE. On behalf of our Editors, we are pleased to launch the inaugural issue of J ATE. J ATE is a peer-reviewed technical journal focused on community college faculty and staff who work primarily with technician education. J ATE is a platform for dissemination of peerreviewed work that furthers the development of technician education. J ATE is cross-discipline. J ATE covers all technologies under the National Science Foundation (NSF) Advanced Technological Education (ATE) Program. An incomplete list of disciplines covered by J ATE is below: &bull; Micro Nano &bull; Biotechnology &bull; Autonomous Technology &bull; Cyber Security &bull; Advanced Manufacturing &bull; Earth Sciences &bull; Agriculture Technology &bull; Energy &bull; Welding
APA, Harvard, Vancouver, ISO, and other styles
7

Dr., Vinod Varma Vegesna. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 5, no. 1 (2023): 85–102. https://doi.org/10.38177/AJBSR.2023.5110.

Full text
Abstract:
Instead of depending on a technology&#39;s apparently positive qualities, we always have made it a priority to first examine its flaws. In addition to individuals and robots, now there are things that connect with the online platform without our input. These Things are continuously engaging with the Web, whether it&#39;s a refrigerator delivering an alarm about the foodstuff inside it or our vehicles sending signals to the technician about their fuel conditions. In many respects, the Internet of Things is brilliant. Unfortunately, the software has not yet been developed fully and is not totally safe. This paper summarizes the security risks and challenges associated with the internet of things, as well as offers suggestions for a few solutions for safeguarding the internet of things.
APA, Harvard, Vancouver, ISO, and other styles
8

CARTER, CELESTE. "Invited Letter: Welcome to the Journal of Advanced Technological Education." Journal of Advanced Technological Education 1, no. 1 (2022): 3. https://doi.org/10.5281/zenodo.6363578.

Full text
Abstract:
Welcome to the Journal of Advanced Technological Education! As the Lead Program Director of the National Science Foundation&rsquo;s Advanced Technological Education Program (ATE), I am pleased to introduce the Journal of Advanced Technological Education (J ATE) to the technician education community. Technician Education programs at two-year Community and Technical Colleges across the United States now have a peerreviewed journal to learn about the newest advancements in technician education produced and reviewed by their peers. J ATE covers two-year community and technical colleges with technician education programs in advanced technology industries. These industries include: Micro- and Nanotechnologies, Biotechnologies, Autonomous Technologies, Advanced Manufacturing, Cyber Security, Environmental Technologies, Energy, Engineering and the shared technician education space such as mentoring and evaluation. J ATE is a peer-reviewed journal for all Advanced Technological Education (ATE) faculty. The Micro Nano Technology Education Center (MNT-EC), the national Center for Micro and Nano Technician Education MNT-EC proposed a peer-reviewed Journal as one of their activities Center activities. Since then, the Journal has grown to encompass all sub-disciplines under the ATE umbrella. In addition to community college faculty and staff, the Journal welcomes submission from students doing undergraduate research and industry members involved with community colleges and K-12 teachers and administrators. My publishing journey started when I was a technician and was given the opportunity to lead and carry out a research project characterizing viral mutations. I continued publishing as a graduate student, post-doctoral fellow, and published during my tenure as a community college faculty. Publishing provides a way for the greater STEM community to be aware of advances made both in research and teaching. The advances made at two-year community and technical colleges often remain either at the institution or, at best, within the region where the institution is located. I highly recommend two-year faculty, staff, and students publish in J ATE for multiple reasons. These includes knowledge sharing, professional advancement, collaboration opportunities, and dissemination of results that can impact faculty and students at community and technical colleges across the United States. I am proud to support technician education, the ATE grant program and J ATE. You can support J ATE by submitting articles, serving as a peer reviewer and reading and sharing articles with your colleagues
APA, Harvard, Vancouver, ISO, and other styles
9

Vegesna, Dr Vinod Varma. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 05, no. 01 (2023): 85–102. http://dx.doi.org/10.38177/ajbsr.2023.5110.

Full text
Abstract:
Instead of depending on a technology's apparently positive qualities, we always have made it a priority to first examine its flaws. In addition to individuals and robots, now there are things that connect with the online platform without our input. These Things are continuously engaging with the Web, whether it's a refrigerator delivering an alarm about the foodstuff inside it or our vehicles sending signals to the technician about their fuel conditions. In many respects, the Internet of Things is brilliant. Unfortunately, the software has not yet been developed fully and is not totally safe. This paper summarizes the security risks and challenges associated with the internet of things, as well as offers suggestions for a few solutions for safeguarding the internet of things
APA, Harvard, Vancouver, ISO, and other styles
10

Choirunisa, Ristyna. "Hearing Loss And Health Complaints In Technicians Air Skadron 3 Iswahjudi Airport And Its Association With Aircraft Noise." JURNAL KESEHATAN LINGKUNGAN 11, no. 1 (2019): 61. http://dx.doi.org/10.20473/jkl.v11i1.2019.61-68.

Full text
Abstract:
Aviation is the most significant part of Indonesian Air Force duty. Air Force’s aircraft takes a role not only as Indonesian army agency transportation vehicle but also crucial for Indonesian air territory security protection. However the level of noises resulted from Air Force aviation operation activity such as take off of aircraft reached 130 dBA, so the operation can causes auditory and non auditory adverse effects such as communication, physiological disorder, and psycological disorder. The aim of this study is to analyze factors induced to the hearing loss and analyze the effects of aircraft noises to technician health complaints. This research using case control approach and it was conducted by recruiting subject respondents group randomly of 20 officers includes of 10 technician as study group and 10 non technician as control group. The measurement of aircraft noise level was performed 4 times during 8 hours used Sound Level Meter. The results of aircraft noise measurement in flightline area was exceeding the threshold value of 95,56 dBA. The results of the study shows that aircraft noise significantly associated with to technician hearing loss p-value=0,026 (Spearman correlation test, p&lt;0,05). Other factors that are associated significantly with technician hearing loss include aged p-value=0,023 (Pearson correlation test, p&lt;0,05). Insignificant association is showed for work period with p-value=0,038 (spearman correlation test, p&lt;0,05). In addition, the aircraft noise is associated to health complaint as psychological disorder p-value=0,033 (simple logistic regression test, p-value &lt;0,05). The conclusion of research is that aircraft activities affected hearing loss and technician psychological disorder.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security technician"

1

Alqatawna, Ja'Far S. "Multi-stakeholder enquiry for securing e-Business environments : a socio-technical security framework." Thesis, Sheffield Hallam University, 2010. http://shura.shu.ac.uk/19255/.

Full text
Abstract:
Increasing the security of e-Business is best achieved by considering the environment in which e-Business applications need to be implemented and used; this implies that e-Business should be viewed as a complex socio-technical system with three interconnected and interacting elements: stakeholders, enabling technology, and business processes. This multiple perspective has rarely been captured by previous studies of e-Business security which perceive security from a narrow, single-sided technical view. This thesis argues that the predominant technical security approaches consider neither the multifaceted nature of e-Business security nor the requirements and influences of the various stakeholders involved in its context. In Jordan e-Business adoption is still in its early stages and is gaining the attention of several parties. Therefore, the primary approach in this research is an interpretive stakeholder analysis in which notions of a socio-technical perspective are employed as required in order to develop a conceptual framework for better understanding of e-Business security in the context of Jordan. In other words, an interpretive approach has been adopted as a mean of inquiry aiming at developing a holistic understanding of e-Business security in relation to its context as well as considering all the stakeholders in the problem area. This methodological choice was influenced by three factors: the nature of the research problem, the researcher's theoretical lens, and the degree of uncertainty in the study environment. Consequently, four major stakeholders were identified and their security implications were explored. The study's findings provide rich insights into the security of e-Business by identifying and interpreting the roles, the perceptions, and the interactions of several groups of security stakeholders. The theoretical contributions include: an explanatory framework of organisational, legal, human and technical factors affecting security in e-Business environments which was developed by employing an inductive stakeholder analysis as well as the identification of several organisational aspects, such as governance, communication, power conflict, awareness, and resistance to change, and their relationships to security as well as their practical implications at individual, organisational, and national levels. Additionally, the findings provide insights into the customers' side of the security problem and explain its relationships with other stakeholders, including government, business and technology providers. This is a sound practical contribution which can help these stakeholders to design better security approaches based on a deeper understanding of customers' security requirements.
APA, Harvard, Vancouver, ISO, and other styles
2

Ho, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.

Full text
Abstract:
Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution for this confidential data request and transfer problem cannot be found from related research, our goal is to offer a means that can help keeping the investigation secret and protecting irrelevant data at the same time. We present a technical solution for preserving two-way confidentiality between the investigator (legitimate data requester) and the database owner (legitimate data holder), which can accommodate the concerns of both sides during the specific information request and transfer. Two schemes, Sender-Based Scheme and Receiver-Based Scheme, have been proposed to solve the problem under different conditions, and illustration of executing our schemes is given through an example situation “Investigator and Private hospital” which is an ordinary scenario during investigation. Furthermore, a practical cost reduction methodology on the schemes and sensible proposals for extensions are suggested and discussed. The direction of future work is also considered.<br>published_or_final_version<br>Computer Science<br>Master<br>Master of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Tong. "Holistic Security Requirements Engineering for Socio-Technical Systems." Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368938.

Full text
Abstract:
Security has been a growing concern for large organizations, especially financial and gov- ernmental institutions, as security breaches in the systems they depend have repeatedly resulted in losses of billions per year, and this cost is on the rise. A primary reason for these breaches is the “socio-technical†nature of today’s systems that consist of an amal- gam of social and human actors, processes, technology and infrastructure. We refer to such systems as Socio-Technical Systems (STSs). Finding secure solutions for STSs is a difficult and error-prone task because of their heterogeneity and complexity. The thesis proposes a holistic security requirements analysis framework which catego- rizes system security concerns into three layers, including a social layer (social actors and business processes), a software layer (software applications that support the social layer) and an infrastructure layer (physical infrastructure, hardware, and devices). Within each layer, security requirements are elicited, and security mechanisms are designed to satisfy the security requirements. In particular, a cross-layer support link is defined to capture how security mechanisms deployed at one layer influence security requirements of the next layer down, allowing us to systematically and iteratively analyze security for all three layers and eventually produce holistic security solutions for the systems. To ensure the quality of the analysis of our approach and to promote practical adoption of the three-layer approach, the thesis includes two additional components. Firstly, we propose a holistic attack analysis, which takes an attacker’s perspective to explore realistic attacks that can happen to a system and thus contributes to the identification of critical security requirements. This approach consists of an attack strategy identification method which analyzes attacker’s alternative malicious intentions, and an attack strategy operationalization method which analyzes realistic attack actions that can be performed by attackers. Secondly, the thesis proposes a systematic approach for selecting and applying security patterns, which describe proven security solutions to known security problems. As such, analysts with little security knowledge can efficiently leverage reusable security knowledge to operationalize security requirements in terms of security mechanisms. This approach also allows us to systematically analyze and enforce the impact of deployed security mechanisms on system functional specifications. We have developed a prototype tool, which implements the formalized analysis methods of our three-layer framework and enables the semi-automatic application of our proposal. With the help of the tool, we apply our framework to two large-scale case studies so as to validate the efficacy of our approach.
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Tong. "Holistic Security Requirements Engineering for Socio-Technical Systems." Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1751/1/phd_thesis_tong.pdf.

Full text
Abstract:
Security has been a growing concern for large organizations, especially financial and gov- ernmental institutions, as security breaches in the systems they depend have repeatedly resulted in losses of billions per year, and this cost is on the rise. A primary reason for these breaches is the “socio-technical” nature of today’s systems that consist of an amal- gam of social and human actors, processes, technology and infrastructure. We refer to such systems as Socio-Technical Systems (STSs). Finding secure solutions for STSs is a difficult and error-prone task because of their heterogeneity and complexity. The thesis proposes a holistic security requirements analysis framework which catego- rizes system security concerns into three layers, including a social layer (social actors and business processes), a software layer (software applications that support the social layer) and an infrastructure layer (physical infrastructure, hardware, and devices). Within each layer, security requirements are elicited, and security mechanisms are designed to satisfy the security requirements. In particular, a cross-layer support link is defined to capture how security mechanisms deployed at one layer influence security requirements of the next layer down, allowing us to systematically and iteratively analyze security for all three layers and eventually produce holistic security solutions for the systems. To ensure the quality of the analysis of our approach and to promote practical adoption of the three-layer approach, the thesis includes two additional components. Firstly, we propose a holistic attack analysis, which takes an attacker’s perspective to explore realistic attacks that can happen to a system and thus contributes to the identification of critical security requirements. This approach consists of an attack strategy identification method which analyzes attacker’s alternative malicious intentions, and an attack strategy operationalization method which analyzes realistic attack actions that can be performed by attackers. Secondly, the thesis proposes a systematic approach for selecting and applying security patterns, which describe proven security solutions to known security problems. As such, analysts with little security knowledge can efficiently leverage reusable security knowledge to operationalize security requirements in terms of security mechanisms. This approach also allows us to systematically analyze and enforce the impact of deployed security mechanisms on system functional specifications. We have developed a prototype tool, which implements the formalized analysis methods of our three-layer framework and enables the semi-automatic application of our proposal. With the help of the tool, we apply our framework to two large-scale case studies so as to validate the efficacy of our approach.
APA, Harvard, Vancouver, ISO, and other styles
5

Van, Der Merwe Melani. "Energy transitions: the case of South African electric security." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/27906.

Full text
Abstract:
Modern civilizations have evolved to be highly dependent on electrical energy. The exponentially growing renewables market has signaled transitions in electricity sectors that have traditionally been dominated by fossil fuel electricity. Various theoretical debates have recently emerged surrounding the processes of socio-technical transition, focusing on the pathways of transition, the levers for radical change and path-dependencies within these systems. The Multi-Level Perspective on Socio-technical Transitions is one such theory. This perspective views socio-technical change as a factor of interdependent shifts between three analytical levels observed within the system: the socio-technical regime, the socio-technical niche and the landscape. In accordance with this theory, radical change is generally observed as originating at niche level. Irregularities within the dominant regime and landscape pressures allow for niche innovations to break through into the dominant regime in processes of socio-technical transition. Toward understanding actor influences on energy transitions, considerable attention has been paid to actor's impact on governance processes through: patterns of consumption, the shaping of legislation and technical innovations, by socio-technical transitions theories. However less attention has been paid to the ways in which actors in renewable electricity markets are: forming networks toward the establishment of new regimes and governing processes at niche level, and consequently how actor governance has impacted the established perceptions and available pathways for realizing electric security. This thesis, builds on the Multi-Level Perspective, through an exploration of how actors govern socio-technical systems at niche level, paying careful attention to the modalities of power giving and power taking that allow for the development of networks of people and things toward the stabilization of novel socio-technical practices, innovations and developmental trajectories. It does this through a networked analysis of how different actors with different interests cooperate to open up innovative social and technological pathways.
APA, Harvard, Vancouver, ISO, and other styles
6

Menzel, Michael. "Model-driven security in service-oriented architectures : leveraging security patterns to transform high-level security requirements to technical policies." Phd thesis, Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2012/5905/.

Full text
Abstract:
Service-oriented Architectures (SOA) facilitate the provision and orchestration of business services to enable a faster adoption to changing business demands. Web Services provide a technical foundation to implement this paradigm on the basis of XML-messaging. However, the enhanced flexibility of message-based systems comes along with new threats and risks. To face these issues, a variety of security mechanisms and approaches is supported by the Web Service specifications. The usage of these security mechanisms and protocols is configured by stating security requirements in security policies. However, security policy languages for SOA are complex and difficult to create due to the expressiveness of these languages. To facilitate and simplify the creation of security policies, this thesis presents a model-driven approach that enables the generation of complex security policies on the basis of simple security intentions. SOA architects can specify these intentions in system design models and are not required to deal with complex technical security concepts. The approach introduced in this thesis enables the enhancement of any system design modelling languages – for example FMC or BPMN – with security modelling elements. The syntax, semantics, and notion of these elements is defined by our security modelling language SecureSOA. The metamodel of this language provides extension points to enable the integration into system design modelling languages. In particular, this thesis demonstrates the enhancement of FMC block diagrams with SecureSOA. To enable the model-driven generation of security policies, a domain-independent policy model is introduced in this thesis. This model provides an abstraction layer for security policies. Mappings are used to perform the transformation from our model to security policy languages. However, expert knowledge is required to generate instances of this model on the basis of simple security intentions. Appropriate security mechanisms, protocols and options must be chosen and combined to fulfil these security intentions. In this thesis, a formalised system of security patterns is used to represent this knowledge and to enable an automated transformation process. Moreover, a domain-specific language is introduced to state security patterns in an accessible way. On the basis of this language, a system of security configuration patterns is provided to transform security intentions related to data protection and identity management. The formal semantics of the security pattern language enable the verification of the transformation process introduced in this thesis and prove the correctness of the pattern application. Finally, our SOA Security LAB is presented that demonstrates the application of our model-driven approach to facilitate a dynamic creation, configuration, and execution of secure Web Service-based composed applications.<br>Im Bereich der Enterprisearchitekturen hat das Paradigma der Service-orientierten Architektur (SOA) in den vergangenen Jahren eine große Bedeutung erlangt. Dieser Ansatz ermöglicht die Strukturierung und Umsetzung verteilter, IT-basierter Geschäftsfunktionen, um einen effizienten und flexiblen Einsatz von IT-Ressourcen zu ermöglichen. Während in der Vergangenheit fachliche Anforderungen in monolithischen Applikationen umgesetzt wurden, setzt dieser Architekturansatz auf wiederverwendbare Dienste, die spezifische Geschäftsfunktionen implementieren. Diese Dienste können dann dynamisch zur Umsetzung von Geschäftsprozessen herangezogen werden und ermöglichen eine schnelle Reaktion auf verändernde geschäftliche Rahmenbedingungen durch Anpassung der Prozesse. Die einzelnen Dienste existieren unabhängig voneinander und sind lose über einen Nachrichtenaustausch gekoppelt. Diese Unabhängigkeit unterscheidet den SOA-Ansatz von der bisherigen Entwicklung klassischer verteilter Anwendungen. Die Verwendung unabhängiger Dienste geht aber auch mit einem größeren Gefährdungspotential einher, da eine Vielzahl von Schnittstellen bereitgestellt wird, die mittels komplexer Protokolle angesprochen werden können. Somit ist die korrekte Umsetzung von Sicherheitsmechanismen in allen Diensten und SOA-Infrastrukturkomponeten essentiell. Kommunikationspartner müssen an jedem Kommunikationsendpunkt authentifiziert und autorisiert werden und ausgetauschte Nachrichten müssen immer geschützt werden. Solche Sicherheitsanforderungen werden in technischen Sicherheitskonfigurationen (Policydokumenten) mittels einer Policysprache kodiert und werden an die Dienste verteilt, die diese Anforderungen durchsetzen. Da Policysprachen für SOA aber durch die Vielzahl und Vielfalt an Sicherheitsmechanismen, -protokollen und -standards eine hohe Komplexität aufweisen, sind Sicherheitskonfigurationen höchst fehleranfällig und mit viel Fachwissen zu erstellen. Um die Generierung von Sicherheitskonfigurationen in komplexen Systemen zu vereinfachen, wird in dieser Arbeit ein modellgetriebener Ansatz vorgestellt, der eine visuelle Modellierung von Sicherheitsanforderungen in Architekturmodellen ermöglicht und eine automatisierte Generierung von Sicherheitskonfigurationen auf Basis dieser Anforderungen unterstützt. Die Modellierungsebene ermöglicht eine einfache und abstrakte Darstellung von Sicherheitsanforderungen, die sich auch für Systemarchitekten erschließen, welche keine Sicherheits-experten sind. Beispielsweise können modellierte Daten einfach mit einem Schloss annotiert werden, um den Schutz dieser Daten zu fordern. Die Syntax, die Semantik und die Darstellung dieser Anforderungen werden durch die in dieser Arbeit vorgestellte Sicherheitsmodellierungssprache SecureSOA spezifiziert. Der vorgestellte modellgetriebene Ansatz transformiert die modellierten Anforderungen auf ein domänen-unabhängiges Policymodell, das eine Abstraktionsschicht zu konkreten Policysprachen bildet. Diese Abstrak-tionsschicht vereinfacht die Generierung von Sicherheitspolicies in verschiedenen Policysprachen. Allerdings kann diese Transformation nur erfolgen, wenn im System Expertenwissen hinterlegt ist, das die Auswahl von konkreten Sicherheitsmechanismen und -optionen bestimmt. Im Rahmen dieser Arbeit werden Entwurfsmuster für SOA-Sicherheit zur Transformation herangezogen, die dieses Wissen repräsentieren. Dazu wird ein Katalog von Entwurfsmustern eingeführt, der die Abbildung von abstrakten Sicherheitsanforderungen auf konkrete Konfigurationen ermöglicht. Diese Muster sind mittels einer Entwurfsmustersprache definiert, die in dieser Arbeit eingeführt wird. Die formale Semantik dieser Sprache ermöglicht die formale Verifikation des Transformationsprozesses, um die Korrektheit der Entwurfsmusteranwendung nachzuweisen. Die Definition dieses Entwurfsmusterkatalogs und der darauf basierende Transformationsprozess ermöglichen die Abbildung von abstrakten Sicherheitsanforderungen auf konkrete technische Sicherheitskonfigurationen und stellen den Beitrag dieser Arbeit dar. Abschließend wird in dieser Arbeit das SOA-Security-Lab vorgestellt, das die Umsetzung dieses Ansatzes demonstriert.
APA, Harvard, Vancouver, ISO, and other styles
7

Karokola, Geoffrey Rwezaura. "A Framework for Securing e-Government Services : The Case of Tanzania." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-80722.

Full text
Abstract:
e-Government services are becoming one of the most important and efficient means by which governments (G) interact with businesses (B) and citizens (C). This has brought not only tremendous opportunities but also serious security challenges. Critical information assets are exposed to current and emerging security risks and threats. In the course of this study, it was learnt that e-government services are heavily guided and benchmarked by e-Government maturity models (eGMMs). However, the models lack built-in security services, technical as well as non-technical; leading to lack of strategic objectives alignment between e-government services and security services. Information security has an important role in mitigating security risks and threats posed to e-government services. Security improves quality of the services offered. In light of the above, the goal of this research work is to propose a framework that would facilitate government organisations to effectively offer appropriate secure e-government services. To achieve this goal, an empirical investigation was conducted in Tanzania involving six government organizations. The investigations were inter-foiled by a sequence of structural compositions resulting in a proposition of a framework for securing e-government services which integrates IT security services into eGMMs. The research work was mainly guided by a design science research approach complemented in parts by systemic-holistic and socio-technical approaches. The thesis contributes to the empirical and theoretical body of knowledge within the computer and systems sciences on securing e-government structures. It encompasses a new approach to secure e-government services incorporating security services into eGMMs. Also, it enhances the awareness, need and importance of security services to be an integral part of eGMMs to different groups such as researched organizations, academia, practitioners, policy and decision makers, stakeholders, and the community.<br><p>At the time of the doctoral defence the following paper was unpublished and had a status as follows: Paper nr. 6: In press</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Full text
Abstract:
To be able to protect an organisation&apos;s resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation&apos;s resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard.<br>För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.<br>Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
APA, Harvard, Vancouver, ISO, and other styles
9

Maninjwa, Prosecutor Mvikeli. "Managing an information security policy architecture : a technical documentation perspective." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1020757.

Full text
Abstract:
Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However, the organization’s information assets are faced with a number of internal and external threats, aimed at compromising the confidentiality, integrity and/or availability (CIA) of information assets. These threats can be of physical, technical, or operational nature. For an organization to successfully conduct its business operations, information assets should always be protected from these threats. The process of protecting information and its related assets, ensuring the CIA thereof, is referred to as information security. To be effective, information security should be viewed as critical to the overall success of the organization, and therefore be included as one of the organization’s Corporate Governance sub-functions, referred to as Information Security Governance. Information Security Governance is the strategic system for directing and controlling the organization’s information security initiatives. Directing is the process whereby management issues directives, giving a strategic direction for information security within an organization. Controlling is the process of ensuring that management directives are being adhered to within an organization. To be effective, Information Security Governance directing and controlling depend on the organization’s Information Security Policy Architecture. An Information Security Policy Architecture is a hierarchical representation of the various information security policies and related documentation that an organization has used. When directing, management directives should be issued in the form of an Information Security Policy Architecture, and controlling should ensure adherence to the Information Security Policy Architecture. However, this study noted that in both literature and organizational practices, Information Security Policy Architectures are not comprehensively addressed and adequately managed. Therefore, this study argues towards a more comprehensive Information Security Policy Architecture, and the proper management thereof.
APA, Harvard, Vancouver, ISO, and other styles
10

Stamm, Sidney L. "Anticipating and hardening the Web against socio-technical security attacks." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3344603.

Full text
Abstract:
Thesis (Ph.D.)--Indiana University, School of Informatics, Dept. of Computer Science, 2009.<br>Title from PDF t.p. (viewed on Oct. 7, 2009). Source: Dissertation Abstracts International, Volume: 70-02, Section: B, page: 1137. Adviser: Markus Jakobsson.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security technician"

1

Gruber, Robert. Physical and technical security. Thomson Delmar Learning, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parkin, Simon, and Luca Viganò, eds. Socio-Technical Aspects in Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10183-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mehrnezhad, Maryam, and Simon Parkin, eds. Socio-Technical Aspects in Security. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83072-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kirk, Hausman Kalani, and Weiss Martin, eds. CompTIA security+. 2nd ed. Pearson, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, Internet Security Systems, ed. Microsoft Windows 2000 security technical reference. Microsoft Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Police, Royal Canadian Mounted. Technical security standard for information technology. Treasury Board, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Great Britain. Department of Health and Social Security. Reform of Social Security: Technical annex. HMSO, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Great Britain. Department for Work and Pensions., ed. Simplicity, security and choice: Technical paper. Department for Work and Pensions, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Association, Computing Technology Industry, ed. CompTIA security + certification. CompTIA Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Groß, Thomas, and Theo Tryfonas, eds. Socio-Technical Aspects in Security and Trust. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55958-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security technician"

1

Xue, Bowen, Huifen Zhong, Junrui Lu, Tianwei Zhou, and Ben Niu. "Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Becker, George, and Kathy Slattery. "Security." In Sun Technical Reference Library. Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4419-8716-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Russo, Michael. "System Security." In Sun Technical Reference Library. Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4612-3000-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kou, Weidong. "Technical Fundamentals of Security." In Networking Security and Standards. Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6153-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Viegas, Virgilio, and Oben Kuyucu. "IT Security Technical Controls." In IT Security Controls. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7799-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lenhard, Thomas H. "Hazards in the Technical Environment." In Data Security. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Shveta, and Surendra S. Yadav. "Technical Analysis." In Security Analysis and Portfolio Management. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2520-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Houghton, Amie B. "Forensic Technicians." In The Distributed Functions of Emergency Management and Homeland Security. CRC Press, 2023. http://dx.doi.org/10.4324/9781003350729-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Bradley. "A Framework for Network Security." In Sun Technical Reference Library. Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4612-3334-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mathew, Ashwin J. "Can Security Be Decentralised?" In Socio-Technical Aspects in Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10183-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security technician"

1

Canotilho de Almeida, Rita, and Miguel Corticeiro Neves. "Risk Assessment in a Nuclear Medicine Department." In Applied Human Factors and Ergonomics Conference. AHFE International, 2019. http://dx.doi.org/10.54941/ahfe100172.

Full text
Abstract:
Conducting a Risk Assessment is a key to continuous improvement of quality and safety standards of any organization procedure. It allows a diagnosis of the work conditions, identification and/or quantification of risk and the determination of the corrections to be made, as well as preventive measures and more appropriate protection. For this study, was used the MARAT (Risk Assessment of Accident Method). In Nuclear Medicine department, despite the high degree of specificity, because it is an area where ionizing radiation assume leadership, is necessary and possible to conduct a Risk Assessment at appropriate intervals by a Senior Technician or Work Safety Technician (TST or TSST), so that real security conditions are verified on-site improvements to be made in order to not only minimize the harmful effects of radiation in the body, as well as all other physical, chemical, biological hazards and ergonomic featured in any healthcare department. The existence of a physicist is mandatory, but the results showed that there were some situations that should be corrected and/or improved, also demonstrating the degree of importance that a risk assessment carried out by a TSST or TST has even a service with these characteristics, and in parallel with the actuation of Physicist responsible.
APA, Harvard, Vancouver, ISO, and other styles
2

Daily, Jeremy S., and Prakash Kulkarni. "SECURE HEAVY VEHICLE DIAGNOSTICS." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3868.

Full text
Abstract:
&lt;title&gt;ABSTRACT&lt;/title&gt; &lt;p&gt;A cybersecurity exploit can be crafted to affect the vehicle diagnostic adapter system, which consists of the technician, vehicle diagnostic adapter, device drivers, and maintenance software all working together in a trusting relationship.&lt;/p&gt; &lt;p&gt;In this paper, application layer encryption of the SAE J1939 diagnostic traffic between the vehicle diagnostic application and the in-vehicle secure gateway is developed to mitigate the vulnerabilities in potential attack paths. The proposed encryption strategy uses AES-128, which uses 16-byte cipher blocks. The secure connection is established by adjusting the bit rate to over twice the normal speed and packing a single J1939 message into two encrypted sequential CAN frames,&lt;/p&gt; &lt;p&gt;The in-vehicle diagnostic gateway employs a hardware security module. A provisioning process is employed wherein the diagnostic application and the hardware security module both generate public-private key pairs. An elliptic curve Diffie-Hellman (ECDH) key exchange then takes place. Thus, each diagnostic session uses ephemeral symmetric session keys that are securely exchanged between the hardware security module and the diagnostics application.&lt;/p&gt; &lt;p&gt;This approach is effective in mitigating attacks originating at the driver (DLL) level, such as an attacker that would exfiltrate and modify data using the system and vehicle diagnostic subsystems in a Windows environment. Also, as the secure key system can be centrally administered, the ability for user attribution through key management is possible.&lt;/p&gt; &lt;p&gt;While the approach requires the addition of a hardware security module on the vehicle, the hardware strategy presented could be implemented in an arbitrary electronic control module on the vehicle. Vulnerabilities and mitigations are explained in detail to provide a solution to secure diagnostic sessions for heavy vehicles.&lt;/p&gt; &lt;p&gt;&lt;bold&gt;Citation:&lt;/bold&gt; J. Daily, P. Kulkarni, “Secure Heavy Vehicle Diagnostics”, In &lt;italic&gt;Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium&lt;/italic&gt; (GVSETS), NDIA, Novi, MI, Aug. 13-15, 2020.&lt;/p&gt;
APA, Harvard, Vancouver, ISO, and other styles
3

Gibbons, Duncan W., Joshua Lubell, and Paul Witherell. "Implementing the Risk Management Framework for Additive Manufacturing Security: A Model-Based Approach." In ASME 2024 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2024. http://dx.doi.org/10.1115/detc2024-143713.

Full text
Abstract:
Abstract Metal additive manufacturing machines are complex and inherently digital and often cyber-physical systems. As the adoption of this manufacturing technology increases and it becomes increasingly industrialized, concerns about security are evermore prevalent. Both cyber and non-cyber related attacks on critical infrastructure such as additive manufacturing production systems are causes for concern for industry and government. Both the public and private sectors need to focus on securing their information systems to reduce the risk of security attacks and their adverse effects. This research aims to apply the National Institute of Standards and Technology’s Risk Management Framework to the metal additive manufacturing production scenario. The Risk Management Framework defines a rigorous, yet flexible and repeatable, process for managing security risk. A model-based assessment approach is proposed to leverage the digital nature of this manufacturing technology. A case study is performed to demonstrate this approach for a commercial laser powder bed fusion machine in its operating environment. This case study focuses on the technological security risks. This study demonstrates how a model-based approach maximizes the benefits of the Risk Management Framework by improving information and decision traceability for addressing metal additive manufacturing security risks.
APA, Harvard, Vancouver, ISO, and other styles
4

Holeček, Jiří, and Tomáš Zeman. "Cyber security in technical education." In 2023 32nd Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE). IEEE, 2023. http://dx.doi.org/10.23919/eaeeie55804.2023.10181373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vaarandi, Risto, and Mauno Pihelgas. "Using Security Logs for Collecting and Reporting Technical Security Metrics." In 2014 IEEE Military Communications Conference (MILCOM). IEEE, 2014. http://dx.doi.org/10.1109/milcom.2014.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tian, Zhaofu, Ningning Xu, and Wuliang Peng. "E-Commerce Security: A Technical Survey." In 2008 Second International Symposium on Intelligent Information Technology Application (IITA). IEEE, 2008. http://dx.doi.org/10.1109/iita.2008.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Technical session NS1: Network security I." In 2008 International Conference on Computer Engineering & Systems. IEEE, 2008. http://dx.doi.org/10.1109/icces.2008.4773004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Technical session NS2: Network security II." In 2008 International Conference on Computer Engineering & Systems. IEEE, 2008. http://dx.doi.org/10.1109/icces.2008.4773008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ahmadjee, Sabreen, Carlos Mera-Gomez, and Rami Bahsoon. "Assessing Smart Contracts Security Technical Debts." In 2021 IEEE/ACM International Conference on Technical Debt (TechDebt). IEEE, 2021. http://dx.doi.org/10.1109/techdebt52882.2021.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alexan, Wassim, Eyad Mamdouh, Mohamed ElBeltagy, Ahmed Ashraf, Mohamed Moustafa, and Hashem Al-Qurashi. "Social Engineering and Technical Security Fusion." In 2022 International Telecommunications Conference (ITC-Egypt). IEEE, 2022. http://dx.doi.org/10.1109/itc-egypt55520.2022.9855761.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security technician"

1

Bachner, Katherine. Advanced Nuclear Security Culture Technical Exchange: Overview of Nuclear Security Culture [PowerPoint]. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1574910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O'Connor, Sharon L., Donnie Wayne Whitehead, and Claude S. ,. III Potter. Nuclear power plant security assessment technical manual. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/921722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stoneburner, Gary. Underlying technical models for information technology security :. National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dadu, Saurabh. Intel DOE Grid Security Enhancement Security in Power System Edge Final Technical Report. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1864773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scarfone, K. A., M. P. Souppaya, A. Cody, and A. D. Orebaugh. Technical guide to information security testing and assessment. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peirce, Jennifer, and Alexandre Veyrat-Pontet. Citizen Security in Belize. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009140.

Full text
Abstract:
In the face of rising crime rates and increasingly complex transnational and local criminal dynamics, Belize's limited institutional resources are overstretched. Youth violence and gangs are of particular concern in urban areas, where lack of education and employment options converge with the prevalence of guns and trafficking networks. Despite some promising smaller-scale crime prevention initiatives, a comprehensive crime prevention strategy requires more significant institutional reforms. This Technical Note reviews the current trends in crime and violence in Belize and the government's existing policies and programs in the sector. It then proposes several short and medium-term actions to strengthen the government's ability to prevent and reduce crime and violence, such as consolidating strategic planning and information management efforts, designing prevention programs more tailored to specific at-risk groups, bolstering criminal investigation and community policing resources, and adapting the corrections system to the specific needs of juveniles and gang-involved youth.
APA, Harvard, Vancouver, ISO, and other styles
7

McLarnon, Mark, and Marianne Swanson. Automated security self-evaluation tool technical documentation, version 1.03. National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.6951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/935471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sandoval, Betty Ann, Charlie Brannon, Leticia Pibida, Gordon Gillerman, and Michael Unterweger. National Voluntary Laboratory Accreditation Program (NVLAP) homeland security applications :. National Institute of Standards and Technology (U.S.), 2010. http://dx.doi.org/10.6028/nist.hb.150-23e2010.

Full text
Abstract:
NIST Handbook 150-23, NVLAP Homeland Security Applications: Radiation Detection Instruments, presents the technical requirements and guidance for the accreditation of laboratories that test radiation detection instruments used in homeland security applications. The 2010 edition of NIST Handbook 150-23 is the result of an extended development period as the program standards and testing and evaluation protocols were being developed and finalized.
APA, Harvard, Vancouver, ISO, and other styles
10

Shishlyannikov, Oleg. SECURITY CODING OF OPTICAL DISCS AND DIGITAL EXTERNAL MEDIA. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3111.

Full text
Abstract:
All projects in this group of technical solutions are based on one method of encoding and subsequent identification of the encoding element record. The essence of the principle is to apply a coding coating or its technological equivalent to the protected object and then measure the thickness of this coating, which determines whether or not the measurement results coincide with the code.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography