• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 54
  • 16
  • 5
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 99
  • 99
  • 27
  • 21
  • 21
  • 20
  • 20
  • 16
  • 16
  • 14
  • 13
  • 12
  • 11
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Towards a framework for building security operation centers

Jacobs, Pierre Conrad January 2015 (has links)
In this thesis a framework for Security Operation Centers (SOCs) is proposed. It was developed by utilising Systems Engineering best practices, combined with industry-accepted standards and frameworks, such as the TM Forum’s eTOM framework, CoBIT, ITIL, and ISO/IEC 27002:2005. This framework encompasses the design considerations, the operational considerations and the means to measure the effectiveness and efficiency of SOCs. The intent is to provide guidance to consumers on how to compare and measure the capabilities of SOCs provided by disparate service providers, and to provide service providers (internal and external) a framework to use when building and improving their offerings. The importance of providing a consistent, measureable and guaranteed service to customers is becoming more important, as there is an increased focus on holistic management of security. This has in turn resulted in an increased number of both internal and managed service provider solutions. While some frameworks exist for designing, building and operating specific security technologies used within SOCs, we did not find any comprehensive framework for designing, building and managing SOCs. Consequently, consumers of SOCs do not enjoy a constant experience from vendors, and may experience inconsistent services from geographically dispersed offerings provided by the same vendor.
52

MOSS : a model for open system security

Van Zyl, Pieter Willem Jordaan 12 September 2012 (has links)
Ph.D / This thesis looks at current security problems within open system environments, that is security problems within heterogeneous computer system environments that are interconnected via computer networks. Thereafter two security models, Kerberos and the Path Context Model, are considered together with their respective ability to address these security problems. Using concepts of the Path Context Model, a new security model, called MOSS (Model for Open System Security), is developed and it is shown how MOSS can address all the security problems identified. Two possible implementations of MOSS are then considered: the one is based on the concept of Static Security Agents (SSAs) for contemporary open system environments, and the other is based on the concept of Roaming Security Agents (RSAs) for object orientated open system environments. The research is concluded with a summary of possible future research considerations
53

Computação autonômica aplicada ao diagnóstico e solução de anomalias de redes de computadores / Autonomic computing applied to the diagnosis and solution of network anomalies

Amaral, Alexandre de Aguiar, 1986- 27 August 2018 (has links)
Orientadores: Leonardo de Souza Mendes, Mario Lemes Proença Junior / Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-27T01:36:35Z (GMT). No. of bitstreams: 1 Amaral_AlexandredeAguiar_D.pdf: 3847801 bytes, checksum: 71773e4b12743836bc5dc38e572c1c63 (MD5) Previous issue date: 2015 / Resumo: A tarefa de gerenciamento de redes tem se tornado cada vez mais desafiadora. Dentre esses desafios está o problema de diagnosticar e solucionar as anomalias. As soluções atuais não têm sido suficiente para atender os requisitos demandados para a aplicação em ambientes de rede de grande escala. Os principais motivos decorrem da falta de autonomicidade e escalabilidade. Nesta tese, os conceitos da computação autonômica e distribuída são explorados para diagnosticar e solucionar anomalias de rede em tempo real. A proposta é constituída de entidades autonômicas hierarquicamente distribuídas, responsáveis por detectar e reparar as anomalias nas suas regiões de domínio com a mínima intervenção humana. Isto permite a escalabilidade, viabilizando a implantação do sistema em redes de grande escala. A autonomicidade das entidades autonômicas reduz intervenções manuais e a probabilidade de erros na análise e tomada de decisão, fazendo com que a complexidade percebida pela gerência no processo de detecção de anomalias seja reduzida. Experimentos foram realizados em duas diferentes redes: Universidade Tecnológica Federal do Paraná ¿ Campus Toledo e no Instituto Federal de Santa Catarina ¿ Campus GW. Os resultados demonstraram a eficácia e autonomicidade da solução para detectar e tratar diferentes anomalias em tempo real, com a mínima intervenção humana / Abstract: The challenges inherent to network administration increase daily. Among these challenges, there is the problem of diagnosing and repairing network anomalies. Current solutions have not been enough to meet the requirements of large scale networks. The main reasons stem from the lack of autonomicity and scalability. In this thesis, autonomic and distributed computing concepts are exploited presenting a solution to diagnose and treat network anomalies in real time. In this pro-posal, autonomic entities are hierarchically distributed, being responsible for detecting and repair-ing the anomalies in their domain, with minimal human intervention. This provides scalability, enabling the system to be deployed in large scale networks. The autonomic entities autonomicity reduces the manual intervention and the likelihood of errors in the analysis and decision process, minimizing the complexity perceived by the network management in the anomaly detection pro-cedure. Experiments were performed at two different networks: Federal University of Technolo-gy Paraná (UTFPR) - Toledo Campus and at the Federal Institute of Science and Technology Santa of Catarina - GW Campus. The results demonstrated the efficacy of the solution and its autonomicity to detect and repair various anomalies in real time, with minimal human interven-tion / Doutorado / Telecomunicações e Telemática / Doutor em Engenharia Elétrica
54

An assessment of the impact of the management of the social security system on access to services in Limpopo Province

Munshedzi, Thivhakoni Kingsley January 2016 (has links)
Thesis (M. Dev.) -- University of Limpopo, 2016 / In attacking poverty in post-apartheid South Africa, the country’s new government adopted a multiple approach focusing on building institutions and organisations on a macro regional and local level, levels to facilitate growth, reconstruction and social upliftment. In its effort to alleviate poverty and inequality, the Government of South Africa introduced a social security system. In an endeavour to address the deficiencies surrounding this system, the government has established a number of mechanisms. In order to distribute these grants to the right people in the right place, the government formed the South African Social Security Agency (SASSA). The research problem was, therefore, to find out how the management and administration of social security by SASSA is enhancing or retarding access to the services for which the agency was established to render. The aim of this study was to assess how the management and administration of the social security system impact on the accessibility of social services by those who require them. In order to achieve the aim of this study, the following objectives were addressed: how social security is managed in the Limpopo Province; to assess the impact of the management of the system on access to services; to identify possible strategies that could enhance access to social security services; and to provide recommendations based on the literature and research findings. The findings of this study was that the administration system of the South African grant system has been somewhat cumbersome for both the applicant and the administrator because the forms used for most grants are detailed and often quite technical. Furthermore, it was established that were service delivery challenges of severe staff shortages at critical operational levels where grant applications are processed and infrastructural challenges such as insufficient office space (too many staff members in a specific office) and insufficient or no connectivity at certain service delivery points. These are all organisational challenges that SASSA is facing. This research recommend that the Limpopo regional office must not only be responsible for giving information about newly enrolled recipients to the SASSA national office but the regional office should be able to complete the whole process within its offices without passing it on to the national office The research also recommends that a Monitoring and Evaluation unit must be established in regional offices. This unit will assist the management and administration of social grants in particular with improving services. This unit will visit different SASSA offices in the local municipalities on a regular basis in order to evaluate the performance of those particular offices. This will help to monitor the service delivery to the beneficiaries. Lastly, SASSA should do more research and development in consultation academic institutions or by structure within SASSA offices
55

Essays on the Politics of Maintaining Order

Wilke, Anna M. January 2021 (has links)
Maintaining order is a core function of the state. Yet, in many contexts, actors other than the state are involved in combating crime and violence. Such actors range from private security companies who sell protection to vigilante mobs who brutally punish criminal suspects. This dissertation explores how states maintain order when they are faced with private crime prevention efforts. Taken together, the three chapters of the dissertation provide insights into the determinants of law enforcement policy, the sources of citizens' willingness to cooperate with the state, and the social drivers of crime and violence. Chapter 1 presents a formal model that sheds light on the incentives of political parties to invest in law enforcement when citizens can purchase private protection. Private security measures like burglar alarms, camera systems, and security guards are pervasive in high income communities around the world. I model the supply of crime and the demand for private protection together with a political process that determines public spending on the police. The model provides conditions under which parties may over- and underspend on law enforcement relative to other government services. In relatively poor societies, left parties are prone to spend less and right parties are prone to spend more than the socially optimal amount on policing. The reverse is true in relatively rich societies, where the base of the right party can afford private protection. The results call into question the conventional wisdom that tough-on-crime policies are the domain of parties on the right, and provide an explanation for why such policies in various contexts have been implemented by left-wing politicians. Throughout the developing world, criminal suspects are often assaulted or even killed at the hands of their community. Chapter 2 considers the micro-dynamics of how state capacity affects citizens’ choice between the state and mob vigilantism. I present results from a field experiment in South Africa that creates variation in the capacity of police to locate households. Findings from mid- and endline surveys suggest households exposed to an increase in police capacity became more willing to rely on police and less willing to resort to vigilantism. Results from a mechanism experiment point towards increased fear of state punishment for vigilante violence rather than improved perceptions of police service quality as the link between state capacity and vigilantism. The broader implication is that citizens’ cooperation with capable state institutions may not necessarily reflect citizens’ satisfaction with state services. Instead, citizens may draw on state institutions because states limit citizens’ choices by sanctioning those who participate in informal practices that the state deems illegal. Chapter 3 draws on original surveys with more than 10,000 respondents from hundreds of communities in Uganda, Tanzania, and South Africa to show that women are more likely than men to support mob vigilantism. This result runs counter to a large literature in public opinion that finds women are less supportive of violence than men across a variety of domains throughout industrialized contexts. Drawing on qualitative evidence, a vignette experiment in Uganda, and additional survey measures from Tanzania, the chapter shows that men and women differ in their beliefs about the downsides of mob vigilantism. Men are more likely to think mob vigilantism creates risks of false accusation for those who do not commit crime. The chapter traces this divergence in beliefs to differences in the extent to which men and women are at personal risk of being accused of a crime that they did not commit. The results highlight the role that beliefs play in the link between gender and views about violence.
56

Methodology and Model to Establish Cybersecurity for National Security in Africa using South Africa as a Case Study

Van Vuuren, Johanna Christina Jansen 05 1900 (has links)
PhD (Business Management) / Department of Business Management / See the attached abstract below
57

Beveiliging in die plaaslike owerheidsektor

Van Vuuren, J. W. J., 1952- 11 1900 (has links)
Text in Afrikaans / Plaaslike owerhede sal met die devolusie van politieke mag tot op derdevlakregering 'n groter rol in die bepaling van die toekoms van dorpe en stede speel. Binne die raamwerk van nasionale sekuriteit het plaaslike owerhede as werkgewers en eienaars van geboue, 'n besondere verantwoordelikheid om na die beveiliging van mense, die handhawing en voortsetting van dienste en die beskerming van raadseiendom om te sien. Omdat plaaslike owerhede regsoutonoom is, word sekuriteitsafdelings op sy eie manier bedryf wat nie noodwendig die koste-effektiefste en doeltreffendste wyse is nie. Die uitbreiding van private en publieke sekuriteitsdienste noodsaak die ordelike ontwikkeling en koordinering van dienste aan die hand van standaard-aanvaarbare voorskrifte. In die ondersoek is 'n houdingstudie na die aard, omvang, plek, beeld, status, funksies en opleiding van blanke plaaslike owerheidsekuriteitsbeamptes geloods in 'n poging om 'n basis te vestig ten einde plaaslike owerheidsekuriteit op 'n gesonde grondslag te bedryf. / The devolution of political power to local authority level obliges local authorities to play a greater role in determining the future of cities and towns. Within the framework of national security, local authorities as employers and owners of property have a responsibility towards the safeguarding of people, the upholding and continuation of services and the protection of council property. As legal autonomous bodies, local authorities manage their security departments in their own peculiar way which is not necessarily the most cost effective and efficient. The expansion of private and public security services necessitates orderly development and coordination of services with reference to prescribed acceptable standards. This research is an attitudinal study of the nature, scope, place, image, status, functions and training of white local authority security officers in an attempt to establish a point of departure in order to facilitate the sound managing of local authority security. / Police Practice / M.A. (Polisiekunde)
58

Culturally aligned security in banking : a system for rural banking in Ghana

Kwaa-Aidoo, Ephrem Kwaku January 2010 (has links)
This thesis is an investigation into the unique rural banking system in Ghana and the role of information systems in fraud control. It presents a robust information security and internal control model to deal with fraud for the banking system. The rural banking industry has been noted for poor internal control leading to fraud. This has resulted in poor performance and even the collapse of some banks. The Focus of the study was on the processes used to deliver banking services. To design a protection system, a number of rural banks were visited. This was to understand the environment, regulatory regimes and the structure and banking processes of the industry and banks. Systemic vulnerabilities within the industry which could be exploited for fraud were found. The lack of structures like an address system and unreliable identification documents makes it difficult to use conventional identification processes. Also the lack of adequate controls, small staff numbers and the cross organisational nature of some transactions among other cultural issues reduces the ability to implement transaction controls. Twenty fraud scenarios were derived to illustrate the manifestation of these vulnerabilities. The rural banking integrity model was developed to deal with these observations. This protection model was developed using existing information security models and banking control mechanisms but incorporating the nature of the rural banking industry and culture of its environment. The fraud protection model was tested against the fraud scenarios and was shown to meet the needs of the rural banking industry in dealing with its systemic vulnerabilities. The proposed community-based identification scheme deals with identification weaknesses as an alternative to conventional identity verification mechanisms. The Transaction Authentication Code uses traditional adinkra symbols. Whilst other mechanisms like the Transaction Verification Code design v internal controls into the banking processes. This deals with various process control weaknesses and avoids human discretion in complying with controls. Object based separation of duties is also introduced as a means of controlling conflicting tasks which could lead to fraud.
59

Die veiligheidsbelewenis van bejaardes in Benoni

09 February 2015 (has links)
M.A. (Social Work) / In recent years the increasing number of assaults, murder and other forms of victimization of the elderly in South Africa have become a topic widely reported by the mass media and frequently discussed in communities. The threatening of the personal safety of an aged person is a matter of great concern with possible repercussions on the lifestyle of the individual concerned. In this regard Harris & Cole (1980:383) accurately state "The fear of crime greatly diminishes the quality of life for large number of older people and restricts their mobility. Much of this fear may came from the fact that older people are acutely aware of their vulnerability to victimization." The aims of this study are: to determine how the aged, living in Benoni, experience their personal safety; to determine how the experience of their personal safety influences the daily activities of the aged; to determine factors in personal safety of which the aged should be informed...
60

Capacities of erasure networks

Smith, Brian Matthew, 1975- 11 September 2012 (has links)
We have investigated, in various multiple senses, the “capacity” of several models of erasure networks. The defining characteristic of a memoryless erasure network is that each channel between any two nodes is an independent erasure channel. The models that we explore differ in the absence or presence of interference at either the transmitters, the receivers, or both; and in the availability of feedback at the transmitters. The crux of this work involves the investigation and analysis of several different performance measures for these networks: traditional information capacity (including multicast capacity and feeback capacity), secrecy capacity, and transport capacity. / text

Page generated in 0.0818 seconds