241 |
Telecommunication Network SecurityAdeka, Muhammad I., Shepherd, Simon J., Abd-Alhameed, Raed January 2015 (has links)
Yes / Our global age is practically defined by the ubiquity of the Internet; the worldwide interconnection of
cyber networks that facilitates accessibility to virtually all ICT and other elements of critical
infrastructural facilities, with a click of a button. This is regardless of the user’s location and state of
equilibrium; whether static or mobile. However, such interconnectivity is not without security
consequences.
A telecommunication system is indeed a communication system with the distinguishing key
word, the Greek tele-, which means "at a distance," to imply that the source and sink of the system
are at some distance apart. Its purpose is to transfer information from some source to a distant user;
the key concepts being information, transmission and distance. These would require a means, each,
to send, convey and receive the information with safety and some degree of fidelity that is
acceptable to both the source and the sink.
Chapter K begins with an effort to conceptualise the telecommunication network security
environment, using relevant ITU-T2* recommendations and terminologies for secure telecommunications.
The chapter is primarily concerned with the security aspect of computer-mediated
telecommunications. Telecommunications should not be seen as an isolated phenomenon; it is a critical
resource for the functioning of cross-industrial businesses in connection with IT. Hence, just as
information, data or a computer/local computer-based network must have appropriate level of security,
so also a telecommunication network must have equivalent security measures; these may often be the
same as or similar to those for other ICT resources, e.g., password management.
In view of the forgoing, the chapter provides a brief coverage of the subject matter by first assessing
the context of security and the threat-scape. This is followed by an assessment of telecommunication
network security requirements; identification of threats to the systems, the conceivable counter or
mitigating measures and their implementation techniques. These bring into focus various
cryptographic/crypt analytical concepts, vis a vis social engineering/socio-crypt analytical techniques and
password management.
The chapter noted that the human factor is the most critical factor in the security system for at least
three possible reasons; it is the weakest link, the only factor that exercises initiatives, as well as the factor
that transcends all the other elements of the entire system. This underscores the significance of social
2*International Telecommunications Union - Telecommunication Standardisation Sector
12
engineering in every facet of security arrangement. It is also noted that password security could be
enhanced, if a balance is struck between having enough rules to maintain good security and not having
too many rules that would compel users to take evasive actions which would, in turn, compromise
security. The chapter is of the view that network security is inversely proportional to its complexity. In
addition to the traditional authentication techniques, the chapter gives a reasonable attention to locationbased
authentication. The chapter concludes that security solutions have a technological component, but
security is fundamentally a people problem. This is because a security system is only as strong as its
weakest link, while the weakest link of any security system is the human infrastructure.
A projection for the future of telecommunication network security postulates that, network security
would continue to get worse unless there is a change in the prevailing practice of externality or vicarious
liability in the computer/security industry; where consumers of security products, as opposed to
producers, bear the cost of security ineffectiveness. It is suggested that all transmission devices be made
GPS-compliant, with inherent capabilities for location-based mutual authentication. This could enhance
the future of telecommunication security. / Petroleum Technology Development Fund
|
242 |
Hardware Control Unit For Trusted Program Verification SystemAlt, Jake Owen 01 October 2024 (has links) (PDF)
Trust in the underlying hardware is the foundational step towards trusting the correctness and integrity of a software application. However, verifying that today's extremely complex processors work exactly as intended has not been feasible, as evidenced by several recent hardware bugs. Trustworthy, formally verified processors currently forego intricate performance enhancements such as out-of-order execution, hampering them substantially versus their less secure counterparts.
The Containment Architecture with Verified Output (CAVO) system solves this problem by isolating the host system and requiring the result of each instruction to be validated by a small, trusted hardware module called the Sentry. Any transmissions to the outside world must be performed through the Sentry, which ensures all prior instructions have been computed correctly. The first version of CAVO was centered around a customized host CPU with hardware modifications to manage the Sentry with minimal overhead, while the second used compiler tooling and a software version of the Sentry controller, incurring a significant performance penalty on checked programs. This paper proposes a novel hardware-based Sentry control system that serves as a first step toward fast checking of native programs while greatly reducing modifications to the host, all without expanding the root of trust. We implement a proof-of-concept hardware design and verify its correctness using two SPECINT2006 benchmarks, demonstrating steady-state performance of 1 instruction per clock and an average overhead of 45 clocks per cache miss.
|
243 |
Modeling and simulation of silicon interposers for 3-d integrated systemsXie, Biancun 21 September 2015 (has links)
Three-dimensional (3-D) system integration is believed to be a promising technology and has gained tremendous momentum in the semiconductor industry recently. The Silicon interposer is the key enabler for the 3-D systems, and is expected to have high input/output counts, fine wiring lines and many TSVs. Modeling and design of the silicon interposer can be challenging and is becoming a critical task. This dissertation mainly focuses on developing an efficient modeling approach for silicon interposers in 3-D systems. The developed numerical methods can be classified as several categories. 1. The investigation of the coupling effects in large TSV arrays in silicon interposers. The importance of coupling between TSVs for low resistivity silicon substrates is quantified both in frequency and time domains. This has been compared with high resistivity silicon substrates. 2. The development of an electromagnetic modeling approach for non-uniform TSVs. To model the complex TSV structures, an approach for modeling conical TSVs is proposed first. Later a hybrid modeling method which combines the conical TSV modeling method and cylindrical modeling method is proposed to model the non-uniform TSV structures. 3. The development of a hybrid modeling approach for power delivery networks (PDN) with through-silicon vias (TSVs). The proposed approach extends multi-layer finite difference method (M-FDM) to include TSVs by extracting their parasitic behavior using an integral equation based solver. 4. The development of an efficient approach for modeling signal paths with TSVs in silicon interposers. The proposed method utilizes the 3-D finite-difference frequency-domain (FDFD) method to model the redistribution layer (RDL) transmission lines. A new formulation on incorporating multiport networks into the 3-D FDFD formulation is presented to include the parasitic effects of TSV arrays in the system matrix. 5. The development of a 3-D FDFD non-conformal domain decomposition method. The proposed method allows modeling individual domains independently using the FDFD method with non-matching meshing grids at interfaces. This non-conformal domain decomposition method is applied to model interconnections in silicon interposer.
|
244 |
Long-Term Effects of Land Cover Change on Fish Assemblage Structure in the Piedmont and Coastal Plain Regions of VirginiaStickley, Samuel F 01 January 2015 (has links)
Changes in land cover and fish assemblage structure were assessed across two spatial and temporal scales in the Piedmont and Coastal Plain regions of the Chesapeake Bay watershed in Virginia. A long-term, local study (1953 to 2014) on the Tuckahoe Creek watershed used digitized aerial photography and satellite images (Landsat 5 TM and Landsat 8 OLI/TIRS) to quantify land cover change for five nested catchments in 1953, 1990, and 2014. Instream fish collections from 1958, 1990, and 2014 were utilized to assess a variety of fish assemblage metrics for each of the five catchments, and analyses were performed to assess associations between changes in land cover and changes in fish assemblage structure across all three time periods. A short-term, regional study assessed 21 catchments in the region using 1997 Landsat 5 TM satellite images and 2014 Landsat 8 OLI/TIRS satellite images to quantify land cover change. Fish collections from 1995-1999 and 2014 were utilized to assess a variety of fish assemblage metrics from samples taken at instream sites for each of the 21 catchments. Analyses were performed to discover any associations between changes in land cover and changes in fish assemblage structure from a regional perspective. This study found that there were significant changes in land cover over all study periods in the Tuckahoe Creek watershed and that land cover changes were correlated to changes in fish assemblage structure over the long-term study. Regionally, there were significant changes in land cover, with no correlation to changes in fish assemblage structure found. The data suggests that anthropogenic alterations to the landscape have had long-term effects on fish assemblage structure in Tuckahoe Creek, but the results from the short-term assessments did not detect a relationship between land cover changes and changes in fish assemblage structure. It is possible that the fish communities were already established in moderately degraded catchments by the 1990s due to previous anthropogenic stressors.
|
245 |
Fitnessindustrins hantering av personuppgifter i samband med införandet av gdpr : En kvalitativ fallstudie av utvalda gym inom fitnessbranchen i Skaraborg / The fitness industries handling of personal data in connection with the implementation of gdpr : A qualitative case study of selected gyms in the fitness industry in SkaraborgDamberg Molin, Malin January 2018 (has links)
Den 25e maj i år 2018 träder den nya dataskyddsförordningen, även kallad ”General Data Protection Regulation” från EU i kraft. Det just nu rådande EU-direktivet som behandlar dataskydd är från år 1995, och mycket har förändrats sedan dess. Därför är det av hög grad aktuellt med en ny moderniserad förordning som passar bättre in i en växande digital värld. I dagsläget är det Sveriges personuppgiftslag, PuL som styr över hur personuppgifter skall behandlas. PuL kommer att ersättas av GDPR och detta kommer att medföra strängare lagar kring informationshantering av personliga uppgifter och även fler rättigheter till varje enskild individ. Ett exempel på det är att personer kommer att kunna ifrågasätta syftet med varför deras data hanteras och hur den skyddas. Det blir samtidigt en utmaning för företag att se över sina IT-system, så att informationen hanteras korrekt och lever upp till de nya regler som GDPR innefattar. I denna studie kommer detta problemområde att behandlas och då främst en djupdykning inom fitnessbranschen. För att kunna genomföra detta har fyra olika gym valts ut och undersökningen kommer att fokusera på hur de hanterar förändringar och utmaningar i sitt förberedande arbete för att uppnå kraven i GDPR. Det kommer även att vara inriktat på vilken typ av hälsodata som samlas in samt den tekniska hanteringen ur ett integritets- och säkerhetsperspektiv. / On 25 May in 2018, the new data protection regulation, also known as the "General Data Protection Regulation" of the EU, comes into force. The current EU directive dealing with data protection is from 1995, and much has changed since then. Therefore, it is highly relevant to a new modernized regulation that fits better into a growing digital world. At present, Sweden's Personal Data Act, PuL, governs how personal data are to be processed. PuL will be replaced by GDPR and this will impose stricter laws on information management of sensitive data and also more rights to each individual. An example of it is that people will be able to say that they want their data deleted and not have it stored. At the same time, it is a challenge for companies to review their IT systems, so that information is handled properly and meets the new requirements that GDPR includes. In this study this problem area will be addressed and then mainly a deep diving in the fitness industry. In order to accomplish this, four different gyms have been selected and the survey will focus on how they handle changes and challenges in their preparatory work to achieve the requirements of the GDPR. It will also focus on the type of health data collected and the technical management.
|
246 |
Integrita a sociální desirabilita u hospitalizovaných psychiatrických pacientů / Integrity and social desirability in psychiatric in-patientsMinarčíková, Nikola January 2018 (has links)
This thesis deals with two constructs - social desirability and integrity. The main aim of this thesis is to create an interview which will allow to distinguish people by their level of integrity and their tendency to respond in a socially desirable manner. The interview can serve as a face-to-face variant of questionnaire methods. Theoretical foundations of both social desirability as well as integrity are presented in the theoretical part of the thesis. Complexity of both constructs is considered. Therefore, approaches of various authors are presented. Methods for assessing socially desirable responding in self- reports as well as integrity are also presented as part of the theoretical section of this thesis. The effects of social desirability on integrity assessment is discussed, as well. In the empirical part of the thesis the development of the semi-structured interview is described. The interview was developed based on original Czech test battery focusing on personal integrity at the workplace. Specifically, questionnaire Integrita v pracovním a běžném životě alongside with questionnaire assessing social desirability was used. The semi-structured interview contains a total of eight questions. Each question includes short story, and the respondent is asked to judge his / her behavior in this...
|
247 |
Predicting Counter-Productive Workplace Behavior: Item Level Analysis of an Integrity TestImpelman, Kevin 08 1900 (has links)
Counter-productive workplace behavior (CWB) is defined as any intentional behavior on the part of an organization member viewed by the organization as contrary to its legitimate interests. A growing body of literature reveals that individual variables and pre-employment integrity tests can play a strong role in the prediction of CWB. The empirical literature has failed to clarify which type of individual level antecedents, or types of integrity test items, are more predictive of CWB. The current study evaluated data collected from restaurant employees (N=464) that measured items relating to personality tendencies, attitudes toward acceptance of counter-productive behaviors, work and high school background, and admissions of counter-productive behavior. A confirmatory factor analysis revealed a mediocre fit to a typology of CWB (interpersonal CWB vs. organizational CWB). Correlation analysis revealed that only specific attitudinal items and empirically keyed biodata items were significantly related to CWB. Hierarchical regression analysis found that attitudinal items paralleling admissions of CWB contributed variance beyond that of other personality and work and high school background antecedents.
|
248 |
Digitala kakor och skräddare : En kvalitativ intervjustudie om digital natives åsikter gällande övervakning på internet. / Digital cookies and tailors : A qualitative interview study on digital natives' views regarding internet surveillance.Nordén, Arvid, Andegras, Rasmus January 2022 (has links)
In a time when internet connection is a central part of our everyday lives and wherewe constantly communicate through digital aids, a possible threat has arisen. Surveillance by commercial companies tracks most of what we do on their websites and then stores that data so that, for example, in the future companies can market specific goods that the user has previously looked at. The data collected by a specific supplier is not always saved for that specific company’s use only. The data is also used as a commodity between different online suppliers, the trade itself turns over billions of Swedish kronor every year. The purpose of this study is to examine young adults aged 20-30 (also called digital natives) knowledge, opinions, and thoughts regarding surveillance on the internet for commercial purposes. The study wants to find out what knowledge they say they have, what opinions they have and whether they adapt to the phenomenon by, for example, using VPN services or the like. Previous research in the field has shown that young people do not possess a deep knowledge of the subject and that they rarely adapt to any great extent to the phenomenon. The theoretical framework addresses both the user's and the supplier's perspective. The framework introduces surveillance and integrity from a theoretical perspective, but also addresses the power the supplier has and the financial conditions for the supplier. The results of the study show that, like previous studies in the same field, digital natives do not possess a deep knowledge of the subject and that they rarely adapt. Opinions differ however, where some say they do not care, and some believe that the surveillance has gone too far. In the ensuing discussion, we turn back and forth on the participants' reasoning and try to create a comprehensive picture of why the participants think the way they do.
|
249 |
CRM-system och utmaningar för dataskydd inom detaljhandelRadvärn, Johan January 2021 (has links)
The purpose of this study is to investigate what new challenges CRM systems, Customer Relationship Management, have for the protection of personal data and security in retail. Today's IT development offers companies effective solutions for acquiring new customers and for retaining current customers. IT solutions such as data collection, data storage and analysis of data in real time are just a few examples of what a successfully implemented IT system can offer. CRM systems are the overall IT system solution that companies use, or show interest in using, to be competitive and ultimately achieve higher profits. The method chosen for this study is the research philosophy of pragmatism because it enables the use of different research methods which give a more accurate result. The study is mainly based on surveys and interviews and therefore both qualitative and quantitative methods are used. This study has examined four important variables, ie Privacy, Confidentiality, Integrity and Data Protection, to interpret and explain how these significantly affect the protection of personal data in the retail trade. Another result that emerged from the study is that the overall goal of CRM systems is to develop a strong and long-term customer relationship that minimizes costs and improves efficiency to meet and meet customer needs. Finally, the results of the study show that there is a great deal of awareness about the protection of personal data among consumers and in doing so it is concluded that the lack of protection of personal data among companies will lead to consumers choosing to leave companies. / Syftet med denna studie är att undersöka vilka nya utmaningar CRM-system, Customer Relationship Management, har för skyddet av personliga data och säkerhet inom detaljhandeln. Dagens IT-utveckling erbjuder företagen effektiva lösningar för att skaffa nya kunder samt för att behålla aktuella kunder. IT-lösningar såsom datainsamling, datalagring och analys av data i realtid är bara några exempel på vad ett lyckat implementerat IT-system kan erbjuda. CRM-system är den övergripande IT-systemlösningen som företagen använder, eller visar intresse för att använda, för att vara konkurrenskraftiga och slutligen uppnå högre vinster. Metoden som valts för denna studie är pragmatismens forskningsfilosofi eftersom den möjliggör användningen av olika forskningsmetoder vilka ger ett mer rättvisande resultat. Studien bygger huvudsakligen på undersökningar och intervjuer och därför används både kvalitativa och kvantitativa metoder. Denna studie har undersökt fyra viktiga variabler, det vill säga Privacy, Confidentiality, Integrity och Data Protection för att tyda och förklara hur dessa på ett väsentligt sätt påverkar skyddet av personliga data inom detaljhandeln. Ett till resultat som framkommit av studien är att det övergripande målet med CRM-system är att utveckla en stark och långsiktig kundrelation som minimerar kostnaderna och förbättrar effektiviteten för att möta och tillgodose kundens behov. Slutligen visar resultaten från studien att det finns stor medvetenhet kring skyddet av personliga data hos konsumenterna och därvid dras slutsatsen att det bristande skydd av personliga data hos företagen kommer att leda till att konsumenterna väljer att lämna företagen
|
250 |
Technique et Méthodologie de Conception du Réseau de Distribution d'Alimentation d'une Carte Electronique Rapide à Haute Densité d'Interconnexion / Design Techniques and Methodology for Power Delivery Network of a High Speed High Sensity Electronic BoardGoral, Benoit 12 October 2017 (has links)
Les contraintes économiques actuelles amènent les entreprises d'électronique non seulement à innover à un rythme très soutenu mais aussi à réduire le cycle de conception des nouveaux produits. Afin de rester compétitives, ces entreprises doivent proposer régulièrement de nouveaux produits comportant de nouvelles fonctionnalités, ou améliorant les performances des produits de la génération précédente. Les progrès réalisés peuvent être quantifiés par exemple en terme de vitesse de fonctionnement, encombrement, autonomie et consommation d'énergie. La conception des cartes électroniques incluant ces contraintes est alors délicate. En effet, l'intégration de nouvelles fonctions tout comme la miniaturisation des produits entraînent une densification du circuit imprimé. Le nombre de couches utilisé augmente, l'isolement entre les signaux diminue, l'utilisation de circuits intégrés comportant différentes fonctions comme les SOC ou les SIP entraîne une multiplication du nombre de potentiels d'alimentation. L'augmentation des performances des systèmes impliquent une élévation du taux de débits de données circulant au sein du circuit imprimé et par conséquent l'augmentation des fréquences d'horloge et des signaux. Ces contraintes entraînent l'apparition de problèmes de compatibilité électromagnétique, d'intégrité du signal et d'intégrité de puissance. Il est alors nécessaire de limiter les risques de dysfonctionnement de la carte par une maîtrise des phénomènes qui se produisent d'une part par une analyse de dimensionnement précise afin d'éliminer ou de réduire les problèmes au plus tôt dans la phase de conception et d'autre part en effectuant des simulations de validation une fois la carte terminée. Cette thèse proposée par la société Thales Communications and Security en collaboration avec le laboratoire des Systèmes et Applications des Technologies de l'Information et de l’Énergie (SATIE) de l’École Normale Supérieure de Cachan dans le cadre d'une Convention Industrielle de Formation par la REcherche (CIFRE) a pour but le développement d'une méthodologie d'analyse et de conception du réseau du distribution d'énergie de cartes numériques complexes dans le but de garantir leur fonctionnement sans, ou en réduisant le nombre d'itérations de prototypage. L'introduction au contexte, une description du système étudié et des phénomènes physiques régissant son fonctionnement ainsi qu'un état de l'art des techniques d'analyse d'intégrité de puissance constituent le premier chapitre de ce mémoire. La présentation du véhicule de test, support de tous les résultats de mesure, conçu durant la deuxième année de thèse est l'objet du second chapitre. Ce chapitre dénombre et décrit l'ensemble des scenarii et des réalisations créés pour la mesure des phénomènes propres à l'intégrité de puissance et la corrélation de résultats de simulation avec ceux obtenus en mesure. Dans une troisième partie, les techniques de modélisations de chaque élément constituant le réseau de distribution d'énergie sont décrites. Afin de démontrer la validité des modèles utilisés, les résultats de simulation obtenus pour chaque élément ont été confrontés à des résultats de mesure. Le quatrième chapitre présente la méthodologie de conception et d'analyse de la stabilité des alimentations développée suite aux résultats obtenus des différentes techniques de modélisation. Les outils utilisés sont précisément décrits et les résultats de simulation confrontés à ceux de mesure du système complet du véhicule de test. Dans le chapitre 5, l'intérêt de la modélisation des réseaux de distribution d'énergie sera étendu aux études d'intégrité du signal en démontrant comment son inclusion aux simulations permet d'obtenir, lors de la mise en œuvre de co-simulations, des résultats de simulation plus proches de la réalité. Enfin, la dernière partie de ce document synthétise les travaux de la thèse, porte un regard critique et propose quelques perspectives de travaux futurs. / Today's economical context leads electronics and high-tech corporations not only to innovate with a sustained rhythm but also to reduce the design cycle of new products. In order to remain competitive, these corporations must release regularly new products with new functionalities or enhancing performances of the last generation of this product. The enhancement from one generation of the product to the other can be quantified by the speed of execution of a task, the package size or form factor, the battery life and power consumption.The design methodology following these constraints is thus very tough. Indeed, integration of new functionalities as miniaturization of products imply a densification of the printed circuit board. The number of layer in the stack up is increased, isolation between nets is reduced, the use of integrated circuits embedding different functions as SOC or SIP implies a multiplication of the number of voltages. Moreover the increase of circuit performances implies a increasing data rate exchanged between component of the same printed circuit board and occasioning a widening of the reference clock and signal frequency spectrum. These design constraints are the root cause of the apparition of electromagnetic compatibility, signal integrity and power integrity issues. Failure risks must then be limited by fully understanding phenomenon occurring on the board by, on one side, realizing a precise dimensioning pre layout analysis aiming the elimination or reduction of the issues at the beginning of the design cycle, and on the other side, validating the layout by post layout simulation once the printed circuit board routed.This study proposed by Thales Communication and Security in collaboration with public research laboratory SATIE (System and Application of Energy and Information Technologies) of Ecole Normale Supérieure de Cachan within a industrial convention for development through research aims to develop a design methodology for power delivery network of digital printed circuit board with the goal of ensuring good behavior without or by reducing the number of prototypes.The first chapter of this manuscript include an introduction to the context of the study, a precise description of the studied system and the physical phenomenon ruling its behavior, and finally a state of the art of the power integrity technique analysis. A presentation of the test vehicle, designed during the work and support of all measurement results will constitute the focus of second chapter. This chapter presents and describes all the scenarios and implementations created for the observation and measurement of Power Integrity phenomenon and realise measurement-simulation results correlation. In a third part, modeling techniques of each element of the Power Delivery Network are described. The validity of the models is proven by correlating simulation results of each element with measurement results. The fourth chapter presents the analysis and design methodology developed from the results of the different modeling techniques presented in the previous chapter. Simulation tools and their configuration are precisely described and simulation results are compared with measurement results obtained on the test vehicle for the whole system. In the fifth chapter, the interest of power delivery network model will be extended to signal integrity analysis demonstrating how including this model allows to obtain simulation results closer from measurement results by running Signal Integrity Power aware simulation. Finally, the last part of this document synthetizes the work realized and presented in this document, takes a critical look on it and proposes future works and orientations to extend knowledges and understanding of Power Integrity Phenomenon.
|
Page generated in 0.0472 seconds