Spelling suggestions: "subject:"2security issues"" "subject:"bsecurity issues""
1 |
Návrh bezpečné infrastruktury pro cloudové řešení. / Safe cloud infrastructure designHanzlová, Marie January 2013 (has links)
This diploma thesis is focused on the security of cloud computing. Theoretical part of this thesis identifies options which generally lead to higher safety and availability of applications, regardless of the solution. A package of cloud services (called Productivity Suite) was defined, based on the customers' requirements, which is built on Microsoft platform and combined of the following products: Microsoft Exchange, Microsoft SharePoint, Microsoft Lync and is intended to be used by end customers. Specification of the service package, identified opportunities for strengthening the level of security and requirements of potential customers are the primary inputs for designing safe cloud infrastructure, which is the main contribution of this thesis. First step of designing infrastructure is to choose the service provider of data center, who will operate the solution. A decision must be made to select leased solution or owned components. The result of this part is a calculation, which contains all HW components (servers, firewalls, switches, tape library backups, disk arrays) and SW components considering the licensing policy, SSL certificate, domain, backup solution and other operating costs. The solution is limited by financial resources. The priority is safety, security and quality of services.
|
2 |
La « zone grise » de la sécurité ? Approche comparée du processus "mafieux" de la police à Buenos Aires et à Rio de Janeiro / The "gray zone" of security ? compared approach to the "mafiosi" police process in Buenos Aires and Rio de JaneiroPaula, Luciana Araujo de 14 December 2018 (has links)
Cette étude se propose de répondre dans quelle mesure le processus de démocratisation des institutions de sécurité en Argentine et au Brésil a été suivi de près par un processus « mafieux » de leurs polices, en s’appuyant sur les cas de la police de la province de Buenos Aires et celle de la ville de Rio de Janeiro. Nous avons choisi de travailler à partir de ces deux corps policiers puisqu' ils sont historiquement connus pour leurs affaires de corruption et leurs pratiques arbitraires vis-à-vis des habitants des quartiers défavorisés. Le contexte post-dictatures dans ces deux pays a entraîné des reconfigurations dans le « modus operandi » des forces policières et de nouvelles dynamiques « mafieuses » se sont renforcées conjointement au renforcement d’un paradigme sécuritaire qui émerge au cœur même de ces jeunes démocraties. Buenos Aires et Rio de Janeiro, représentant chacune un « micro-univers » de leur cadre national respectif, offrent donc d’innombrables exemples pour interroger notre objet d’étude. La première partie cherchera à analyser les héritages autoritaires du passé concernant le modus operandi des deux polices. La deuxième partie cherchera à comprendre les remaniements de ce modus operandi à partir de nouvelles formes d’autoritarisme qui émergent au sein des jeunes démocraties. Enfin, la troisième partie, confrontera les deux points précédents afin de démontrer dans quelle mesure leur juxtaposition peut créer les bases d’un terroir mafieux commun. / This study aims to answer how the democratization of security institutions in Argentina and Brazil was closely followed by a process of "mafiosisation" of their policies, based on the case of the provincial police of Buenos Aires and Rio de Janeiro. We chose to work from these two police forces since they are historically known for their corruption cases and their arbitrary practices vis-à-vis the inhabitants of disadvantaged neighborhoods. The post-dictatorship context in these two countries has led to reconfigurations in the "modus operandi" of police forces and new "mafia" dynamics have been reinforced in conjunction with the reinforcement of a security paradigm that is emerging in the very heart of these young democracies. Buenos Aires and Rio de Janeiro, each representing a "micro-universe" of their respective national frameworks, therefore offer innumerable examples to question our object of study. The first part will analyze the authoritarian legacies of the past concerning the modus operandi of the two fonts. The second part will seek to understand the reworking of this modus operandi from new forms of authoritarianism emerging in young democracies. Finally, the third part, will confront the two previous points to demonstrate to what extent their juxtaposition can create the bases of a common « mafia terroir ».
|
3 |
South Africa's official external threat perceptions : 1994-2012Mabanga, Silingile Portia January 2013 (has links)
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened?
In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised
crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars.
The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential. / Dissertation (MSecurity Studies)--University of Pretoria, 2013. / gm2015 / Political Sciences / MSecurity Studies / Unrestricted
|
4 |
Challenges and Security Aspects of Blockchain Based Online Multiplayer GamesMunir, Sundas, Baig, Mirza Sanam Iqbal January 2019 (has links)
Video gaming has always been a blooming industry. With the emergence of online multi- player video games , this industry’s worth have sky rocketed. Online multiplayer video games store data of player’s credentials, in-game progress, in-game virtual assets and payment details etc. Which mean security threats to these systems are nothing new and securing these games have always meant to protect player’s data from unauthorized breach. Integration of Blockchain technology in online multiplayer video games apart from other amazing features, provides a way to prove digital ownership of virtual assets with their verifiable scarcity. Trade of these in-game virtual assets have always been a goal for online multiplayer gaming companies, but there was none enough trust-able infrastructure available which can be relied on. Blockchain just solved that problem. It provided a platform for these asset’s secure and transparent transaction between players. Topic for our research not only consider the security challenges in online games but specifi- cally blockchain based online multiplayer games. This adaptation is still new and there is need of consideration of new security challenges. In this dissertation we try to bring out some important challenges related to security of blockchain based online multiplayer video games. There are currently no studies around security concerns and challenges of the integration of the online multiplayer video games in the emerging blockchain systems. In order to fill in the gap, this dissertation discusses and identifies two main security concerning questions related to this domain. Also this dissertation provides basic steps for expanding future research and application in this joint domain.
|
5 |
Software Defined Secure Ad Hoc Wireless NetworksAlqallaf, Maha 24 May 2016 (has links)
No description available.
|
Page generated in 0.0555 seconds