• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • Tagged with
  • 4
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A systematic methodology for privacy impact assessments: a design science approach

Spiekermann-Hoff, Sarah, Oetzel, Marie Caroline January 2014 (has links) (PDF)
For companies that develop and operate IT applications that process the personal data of customers and employees, a major problem is protecting these data and preventing privacy breaches. Failure to adequately address this problem can result in considerable damage to the company's reputation and finances, as well as negative effects for customers or employees (data subjects). To address this problem, we propose a methodology that systematically considers privacy issues by using a step-by-step privacy impact assessment (PIA). Existing PIA approaches cannot be applied easily because they are improperly structured or imprecise and lengthy. We argue that companies that employ our PIA can achieve "privacy-by-design", which is widely heralded by data protection authorities. In fact, the German Federal Office for Information Security (BSI) ratified the approach we present in this article for the technical field of RFID and published it as a guideline in November 2011. The contribution of the artefacts we created is twofold: First, we provide a formal problem representation structure for the analysis of privacy requirements. Second, we reduce the complexity of the privacy regulation landscape for practitioners who need to make privacy management decisions for their IT applications.
2

Ochrana bezdrátových sítí poskytovatelů internetu / Security protection techniques of wireless networks of internet providers

Žiško, Róbert January 2009 (has links)
This master’s thesis can be used as the guidebook for Wi-Fi networks provider in non-licensed zones 2,4GHz and 5GHz. It is good tool to understand wireless technology area and its protection. Reader can follow network design and avoid mistakes that are mentioned in work. This text shouldn’t be a tool or a guide for possible attackers, but an impulse for small providers who provide their networks in unsecured form. In the opening chapter of my work, matters of Wi-Fi networks are thoroughly analyzed. As they are able to get internet connection in a lot of inaccessible places, they are considered to be crucial for the present times. The basic procedure describing Wi-Fi planning is written in thesis and also its legislative that has to be strictly observed. The big disadvantage is riskiness of the wireless connection that allows attackers to attack network in many ways. For mentioned reason it is very important to take utmost account of Wi-Fi network’s security and attack resistance. Unfortunately a lot of networks are either secured partially or unsecured at all. These types of networks are frequently attacked in order to get “free” Internet access or because of competitors fight. In the text below we can find possible Wi-Fi attack forms using by attackers to get Internet access or destroy network hardware what can cause big financial loss to providers. I described design and realization of little-town network using safety tools implementation based on my experience. For that purpose I implemented benchmark tests in graphics as well as practical format.
3

Optimizing Programmable Logic Design Security Strategies

Graf, Jonathan Peter 10 June 2019 (has links)
A wide variety of design security strategies have been developed for programmable logic devices, but less work has been done to determine which are optimal for any given design and any given security goal. To address this, we consider not only metrics related to the performance of the design security practice, but also the likely action of an adversary given their goals. We concern ourselves principally with adversaries attempting to make use of hardware Trojans, although we also show that our work can be generalized to adversaries and defenders using any of a variety of microelectronics exploitation and defense strategies. Trojans are inserted by an adversary in order to accomplish an end. This goal must be considered and quantified in order to predict the adversary's likely action. Our work here builds upon a security economic approach that models the adversary and defender motives and goals in the context of empirically derived countermeasure efficacy metrics. The approach supports formation of a two-player strategic game to determine optimal strategy selection for both adversary and defender. A game may be played in a variety of contexts, including consideration of the entire design lifecycle or only a step in product development. As a demonstration of the practicality of this approach, we present an experiment that derives efficacy metrics from a set of countermeasures (defender strategies) when tested against a taxonomy of Trojans (adversary strategies). We further present a software framework, GameRunner, that automates not only the solution to the game but also enables mathematical and graphical exploration of "what if" scenarios in the context of the game. GameRunner can also issue "prescriptions," sets of commands that allow the defender to automate the application of the optimal defender strategy to their circuit of concern. We also present how this work can be extended to adjacent security domains. Finally, we include a discussion of future work to include additional software, a more advanced experimental framework, and the application of irrationality models to account for players who make subrational decisions. / Doctor of Philosophy / We present a security economic model that informs the optimal selection of programmable logic design security strategies. Our model accurately represents the economics and effectiveness of available design security strategies and accounts for the varieties of available exploits. Paired with game theoretic analysis, this model informs microelectronics designers and associated policy makers of optimal defensive strategies. Treating the adversary and defender as opponents in a two-player game, our security economic model tells us how either player will play if it is known in advance how their opponent plays. The additional use of game theory allows us to determine the optimal play of both players simultaneously without prior knowledge other than models of players beliefs.
4

Metody návrhu bezpečnostních protokolů / Methods of the Security Protocols Design

Hranáč, Jakub January 2010 (has links)
This project describes several methods suggested for security protocol design. The method named ' A Simple Logic for Authentication Protocol Design' is described in more detail and implemented including custom made addition defining the ownership of messages and rights to re-send those messages.

Page generated in 0.0712 seconds