• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 77
  • 29
  • 16
  • 13
  • 4
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 171
  • 68
  • 43
  • 43
  • 30
  • 24
  • 24
  • 23
  • 21
  • 20
  • 18
  • 18
  • 17
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Impact of access control and copyright in e-learning from user's perspective in the United Kingdom

Akmayeva, Galina January 2017 (has links)
The widespread adoption of E-Learning has largely been driven by the recommendations of educational technologists seeking to convey the benefits of E-Learning as a valuable accessory to teaching and possible solution for distance-based education. Research in the E-Learning domain has mainly focused on providing and delivering content andinfrastructure. Security issues are usually not taken as central concern in most implementations either because systems are usually deployed in controlled environments, or because they take the one-to-one tutoring approach, not requiring strict security measures. The scope of this research work is to investigate the impact of Access Control and Copyright in E-Learning system. An extensive literature review, theories from the field of information systems, psychology and cognitive sciences, distance and online learning, as well as existing E-Learning models show that research in E-learning is still hardly concerned with the issues of security. It is obvious that E-learning receives a new meaning as technology advances and business strategies change. The trends of learning methods have also led to the adjustment of National Curriculum and standards. However, research has also shown that any strategy or development supported by the Internet requires security and is therefore faced with challenges. This thesis is divided into six Chapters. Chapter 1 sets the scene for the research rationale and hypotheses, and identifies the aims and objectives. Chapter 2 presents the theoretical background and literature review. Chapter 3 is an in-depth review of the methods and methodology with clear justification of their adaptation and explains the underlying principles. Chapter 4 is based on the results and limitations obtained from the six case studies observations supported with literature review and ten existing models, while Chapter 5 is focused on the questionnaire survey. Chapter 6 describes the proposed Dynamic E-Learning Access Control and Copyright Framework (DEACCF) and the mapping of the threats from the Central Computing and Telecommunications Agency (CCTA) Risk Analysis and Management Method (CRAMM) to Annualised Loss Expectancy (ALE). Chapter 7 presents the conclusions and recommendations, and the contribution to knowledge with further development plans for future work.
12

Tamper-Resilient Methods for Web-Based Open Systems

Caverlee, James 05 July 2007 (has links)
The Web and Web-based open systems are characterized by their massive amount of data and services for leveraging this data. These systems are noted for their open and unregulated nature, self-supervision, and high degree of dynamism, which are key features in supporting a rich set of opportunities for information sharing, discovery, and commerce. But these open and self-managing features also carry risks and raise growing concerns over the security and privacy of these systems, including issues like spam, denial-of-service, and impersonated digital identities. Our focus in this thesis is on the design, implementation, and analysis of large-scale Web-based open systems, with an eye toward enabling new avenues of information discovery and ensuring robustness in the presence of malicious participants. We identify three classes of vulnerabilities that threaten these systems: vulnerabilities in link-based search services, vulnerabilities in reputation-based trust services over online communities, and vulnerabilities in Web categorization and integration services. This thesis introduces a suite of methods for increasing the tamper-resilience of Web-based open systems in the face of a large and growing number of threats. We make three unique contributions: First, we present a source-centric architecture and a set of techniques for providing tamper-resilient link analysis of the World Wide Web. We propose the concept of link credibility and present a credibility-based link analysis model. We show that these approaches significantly reduce the impact of malicious spammers on Web rankings. Second, we develop a social network trust aggregation framework for supporting tamper-resilient trust establishment in online social networks. These community-based social networking systems are already extremely important and growing rapidly. We show that our trust framework support high quality information discovery and is robust to the presence of malicious participants in the social network. Finally, we introduce a set of techniques for reducing the opportunities of attackers to corrupt Web-based categorization and integration services, which are especially important for organizing and making accessible the large body of Web-enabled databases on the Deep Web that are beyond the reach of traditional Web search engines. We show that these techniques reduce the impact of poor quality or intentionally misleading resources and support personalized Web resource discovery.
13

Pattern-Based Vulnerability Discovery

Yamaguchi, Fabian 30 October 2015 (has links)
No description available.
14

Polycystic Ovary Syndrome in Contemporary India: An Ethnographic Study of Globalization, Disorder, and the Body

Pathak, Gauri S. January 2015 (has links)
Polycystic ovary syndrome (PCOS), an endocrine disorder with no known cure that compromises fertility, is a lifestyle disease affecting a growing number of urban Indian women. Media accounts and medical practitioners have noted a recent rise in PCOS cases in urban India and attribute it to "Westernization," modernization, stress, and lifestyle changes following on the heels of economic liberalization in 1991, which opened up the country to processes of globalization. Discourse about PCOS has thus opened up a space for commentary indexing anxieties about larger social and political economic shifts in the country, and women with PCOS are individualized embodiments of the biosocial stresses caused by these shifts. Against the backdrop of a rapidly changing sociocultural landscape with potential for new opportunities for women, the syndrome also poses a challenge to women's traditional roles as wives and mothers, as its symptoms negatively affect reproduction and physical appearance. In this dissertation, I investigate aspects of public discourses about PCOS and lived realities of the syndrome in India as a lens into the interaction of processes of globalization with the local socioculturally embedded body.
15

Défense contre les attaques de logiciels / Defense against software exploits

Boudjema, El Habib 04 May 2018 (has links)
Dans ce début du troisième millénium, nous sommes témoins d'un nouvel âge. Ce nouvel âge est caractérisé par la transition d'une économie industrielle vers une économie basée sur la technologie de l'information. C'est l’âge de l'information. Aujourd’hui le logiciel est présent dans pratiquement tous les aspects de notre vie. Une seule vulnérabilité logicielle peut conduire à des conséquences dévastatrices. La détection de ces vulnérabilités est une tâche qui devient de plus en plus dure surtout avec les logiciels devenant plus grands et plus complexes. Dans cette thèse, nous nous sommes intéressés aux vulnérabilités de sécurité impactant les applications développées en langage C et particulièrement les vulnérabilités provenant de l'usage des fonctions de ce langage. Nous avons proposé une liste de vérifications pour la détection des portions de code causant des vulnérabilités de sécurité. Ces vérifications sont sous la forme de conditions rendant l'appel d'une fonction vulnérable. Des implémentations dans l'outil Carto-C et des expérimentations sur la base de test Juliet et les sources d'applications réelles ont été réalisées. Nous nous sommes également intéressés à la détection de vulnérabilités exploitables au niveau du code binaire. Nous avons défini en quoi consiste le motif comportemental d'une vulnérabilité. Nous avons proposé une méthode permettant de rechercher ces motifs dans les traces d'exécutions d'une application. Le calcul de ces traces d'exécution est effectué en utilisant l'exécution concolique. Cette méthode est basée sur l'annotation de zones mémoires sensibles et la détection d'accès dangereux à ces zones. L'implémentation de cette méthode a été réalisée dans l'outil Vyper et des expérimentations sur la base de test Juliet et les codes binaires d'applications réelles ont été menées avec succès / In the beginning of the third millennium we are witnessing a new age. This new age is characterized by the shift from an industrial economy to an economy based on information technology. It is the Information Age. Today, we rely on software in practically every aspect of our life. Information technology is used by all economic actors: manufactures, governments, banks, universities, hospitals, retail stores, etc. A single software vulnerability can lead to devastating consequences and irreparable damage. The situation is worsened by the software becoming larger and more complex making the task of avoiding software flaws more and more difficult task. Automated tools finding those vulnerabilities rapidly before it is late, are becoming a basic need for software industry community. This thesis is investigating security vulnerabilities occurring in C language applications. We searched the sources of these vulnerabilities with a focus on C library functions calling. We dressed a list of property checks to detect code portions leading to security vulnerabilities. Those properties give for a library function call the conditions making this call a source of a security vulnerability. When these conditions are met the corresponding call must be reported as vulnerable. These checks were implemented in Carto-C tool and experimented on the Juliet test base and on real life application sources. We also investigated the detection of exploitable vulnerability at binary code level. We started by defining what an exploitable vulnerability behavioral patterns are. The focus was on the most exploited vulnerability classes such as stack buffer overflow, heap buffer overflow and use-after-free. After, a new method on how to search for this patterns by exploring application execution paths is proposed. During the exploration, necessary information is extracted and used to find the patterns of the searched vulnerabilities. This method was implemented in our tool Vyper and experimented successfully on Juliet test base and real life application binaries.level. We started by defining what an exploitable vulnerability behavioral patterns are. The focus was on the most exploited vulnerability classes such as stack buffer overflow, heap buffer overflow and use-after-free. After, a new method on how to search for this patterns exploring application execution paths is proposed. During the exploration, necessary information is extracted and used to find the patterns of the searched vulnerabilities. This method was implemented in our Vyper tool and experimented successfully on Juliet test base and real life application binaries
16

Reasons for lacking web security : An investigation into the knowledge of web developers

Sundqvist, Jonathan January 2018 (has links)
Context: With the constantly increasing activity in the internet and its giant rise over the last 18 years, it’s become increasingly important to investigate common problems in web security Objectives: This thesis is made up of a literature study and a survey. It investigates what the common problems in web security are. It also investigates what the average web developer knows, what they think about the state of web security and what they would change. Method: A survey was developed to get information about people’s education levels, previous experience with web security and security breaches. As well as to get their opinions about web security and to find out what they would change. Results: Based on the literature study and survey the thesis finds out what the common problems in web security are as well as what the average web developer knows, think about web security and want to change. Conclusions: The state of web security in 2018 is not at the level that one might expect, there are several common problems created due to lack of knowledge and the consensus of the people is the same, that the state of web security is sub-par and not to their general satisfaction.
17

Adult attachment and psychopathology: The mediating role of emotion regulation and cognitive factors

Matyja, Anna 01 August 2014 (has links)
This study examined the relationships among adult attachment, cognitive vulnerabilities for depression and anxiety, affect regulation strategies and psychological distress symptoms. To examine these questions, a total of 259 participants (150 females, 109 males) completed measures assessing the above mentioned variables. The structural equation modeling results indicated that attachment anxiety was related to emotional reactivity and emotional cutoff, as well as cognitive vulnerabilities for anxiety and depression. Attachment avoidance was associated with emotional cutoff and cognitive vulnerabilities for anxiety and depression. In turn, cognitive vulnerabilities for depression were related to both depression and anxiety symptoms, whereas cognitive vulnerabilities for anxiety were not related to either depression or anxiety. However, neither cognitive vulnerabilities nor affect regulation strategies mediated the relationship between adult attachment and psychological distress symptoms. Conceptual and measurement issues are addressed and clinical and treatment implications of these findings are discussed.
18

Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution / Analys av hot Network Security och sårbarheter Utveckling & Genomförandet av en Security Network övervakningslösning

Ahmad, Nadeem, Habib, M. Kashif January 2010 (has links)
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security of the network. / Konfidentiella uppgifter via Internet blir vanligare varje dag. Personer och organisationer skickar sina konfidentiella uppgifter elektroniskt. Det är också vanligt att hackare mot dessa nät. I dagens tider, skydd av data, programvara och hårdvara från virus är, nu mer än någonsin ett behov och inte bara en oro. Vad du behöver veta om nätverk i dessa dagar? Hur säkerheten genomförs för att säkerställa ett nätverk? Hur säkerheten hanteras? I denna skrift kommer vi att försöka ta itu med dessa frågor och ge en uppfattning om var vi nu står med säkerheten för nätet.
19

Security Assessment and *nix Package Vulnerabilities

Sandgren, Per January 2018 (has links)
Background. Vulnerabilities in software provides attackers with the means to fulfill unlawful behavior. Since software has so much power, gaining control over vulnerabilities can mean that an attacker gains unauthorized powers. Since vulnerabilities are the keys that let attackers attack, vulnerabilities must be discovered and mitigated. Scanning vulnerable machines is not enough, and scanning data results must be parsed to prioritize vulnerability mitigation and conduct security assessment. Objectives. Creating a parser is the first objective, a tool that takes in input, filters it and gives output specified by the parser. The second objective is to have the parser connect found packages to known vulnerabilities. And the last objective is to have the parser give the output more information, sort them by severity and give information on what areas they are vulnerable. Methods. The interviews are conducted on experienced employees at Truesec AB. A parser is implemented with guidance from the supervisor at Truesec. The parser is experimented with to check practicality of parser. Results. The parser can find vulnerabilities from the Centos tests and does not find any from the Debian tests. From the interviews, we see that more information strengthens a security assessment. Expanding the scanning results will provide more information to the person(s) conducting security assessment. Conclusions. The amount of information gathered in security assessment needs to be expanded to make the assessment more reliable. Packages found can be connected with vulnerabilities by implementing a vulnerability database to match packages. The parser developed does not help in security assessment since the output is not reliable enough, this is caused by the phenomenon backporting.
20

Demographic Study on 4,038 Sexual Assault Victims: Identifying Vulnerabilities and Vulnerable Populations with Extralegal Variables

Worthington, Michael Atkerson 01 November 2018 (has links)
Sexual assault (SA) is an ongoing concern in the United States (US). With a rate above the national average, SA is especially a concern in the Western state in which this study was conducted. Identifying victim vulnerabilities related to SA is an area of research that is currently limited. In this retrospective study, data on victim vulnerabilities were collected from 4,038 standardized SA forensic medical examination forms. Descriptive statistical analyses were conducted to identify vulnerabilities and Pearson's chi-square tests of association were conducted to explore the relationships between extralegal variables. The extralegal variables represent data not contained within the scope of the law, rather data which pertain to the victim or relationship between victim and suspect. Study findings indicate young women are at highest risk for SA. White women are the largest racial group in the state and, accordingly, had the highest rate of SA. However, some racial minorities, including Native American and African American, were found to potentially be at higher risk per capita. A substantial number of SA victims reported having medical problems, and the number of SA victims who reported having a mental illness was double the per capita rate. Victims are most commonly assaulted by an acquaintance. Consumption of drugs or alcohol by the victim or suspect was found in a significant number of cases. A potential trend was noted with victims reporting being asleep and awakened to assault. These results identify various aspects of vulnerability to SA and support the argument that sexual predators attack vulnerable individuals. More research is needed to further evaluate the various associations found in this study. Increasing our understanding of SA and associated vulnerabilities will improve the effectiveness of outreach to vulnerable populations by means of education, screening, and preventative programs.

Page generated in 0.0753 seconds