1 |
A Memory-Array Centric Reconfigurable Hardware Accelerator for Security ApplicationsBabecki, Christopher 03 June 2015 (has links)
No description available.
|
2 |
Network Authentication to the Physical WorldSandberg, Joakim January 2018 (has links)
Quick Response (QR) codes have been used for both non-authentication purposes and authentication & authorization of a user. The visual representation of a QR code requires a reader/decoder to convert the code to a readable resource for an application. This raises some concerns, such as: What kind of information and how much information can be stored in this representation? What kind of vulnerabilities are there when using this technology in some type of authentication? The concrete problem addressed in this thesis is whether a mobile device displaying a QR code can be used as an authenticator for an Axis Communications A8105-E Network Video Door Station. To solve this problem the thesis investigates the use of QR codes in authentication & authorization based upon displaying a QR code on a mobile device, scanning this code via a camera, and then verifying the code using a validation server. Two important issues were what information to put into the QR code (given that the QR code is to be read by a camera) and where the decoding process should be carried out. This thesis also considers multiple types of authentication. Moreover, the system contains multiple components which themselves rely on secure communication and well-designed protocols to ensure security (against popular methods of attack) and stability. A prototype of the proposed authentication process was evaluated using a testbed consisting of three door stations, an Android app, and a backend service for analysing QR codes and making an authentication & authorization decision. QR codes proved to be as secure as the current solutions, such as magnetic stripe or RFID access cards. Using QR codes together with the user’s mobile device also offered additional functionality, such as easy management of the device registration/deregistration and compatibility with multifactor authentication. The conclusion is with the current door station products and the finalized design of the software; it is possible to have a secure and scalable system which is also cost-effective by eliminating the need of human verification as well as equipment required for access card systems. / Quick-Response (QR) koder har använts både för icke autentiseringssyften men även för just autentisering av en användare. Den visuella representationen av en QR-kod behöver en läsare för att kunna omvandla koden till en läsbar resurs för en applikation. Detta leder till frågeställningarna: Vad för information och hur mycket kan man lagra i en QR-kod? Vilka sårbarheter finns det med användningen av denna teknologi inom autentisering? Det konkreta problemet i detta examensarbete är huruvida en mobil enhet som visar en QR-kod kan användas med en Axis Communications A8105-E Network Video Door Station. För att lösa detta problem så undersöker detta arbete användningen av QR-koder inom autentisering baserat på att visa QR koden på den mobila enheten, skanna denna kod med en kamera och validera denna kod med en valideringsserver. Två viktiga frågor var vilken information som skulle lagras i QR-koden samt vart avläsningen av en QR-kod tog plats. Detta arbete undersöker också olika typer av multifaktor autentisering. Systemet består vidare av flera komponenter som förlitar sig på säker kommunikation och väldesignade protokoll sam ger säkerhet (mot de mest populära nätverksattackerna) och stabilitet. Den tänkta autentiseringsprocessens prototyp evaluerades i en testmiljö bestående av tre Door Station, en Android applikation och en backend service för att analysera QR-koder samt hantera autentiserings och behörighetslogik. QR-koder bevisades vara lika säkert som befintliga lösningar som till exempel kort accesskort med magnetremsa och RFID chip. Användning av QR-koder med de mobila enheterna gör dessutom att hantering av registrering/avregistrering av enheterna kan ske på ett enkelt sätt samt även integreras med multifaktor autentisering. Slutsatsen är att med de befintliga Door Station enheterna och den slutgiltiga designen av mjukvaran ger det säkert och skalbart system som dessutom är kostnadseffektivt genom att behovet av en mänsklig verifiering samt de fysiska komponenterna av befintliga accesskortsystem, inte längre finns.
|
3 |
Instrumental Development and Implementation of Portable Membrane Inlet Mass Spectrometry for Homeland Security and Environmental ApplicationsAnguiano Virgen, Camila 12 1900 (has links)
A rapidly growing topic of great interest is the adaptation of benchtop analytical instrumentation for use in outdoor harsh environments. Some of the areas that stand to benefit from field instrumentation development include government agencies involved with the preservation of the environment and institutions responsible for the safety of the general public. Detection systems are at the forefront of the miniaturization movement as the interest in analyte identification and quantitation appears to only be accessible through the use of analytical instrumentation. Mass spectrometry is a distinguished analytical technique known for its ability to detect the mass-to-charge (m/z) ratios of gas-phase ions of interest. Although these systems have been routinely limited to research lab-based analysis, there has been considerable development of miniaturized and portable mass spectrometry systems. Membrane Inlet Mass Spectrometry (MIMS) is becoming a common method of sample introduction that is subject to significant development. MIMS allows for minimal sample preparation, continuous sampling, and excludes complicated analyte introduction techniques. Sampling is accomplished using a semipermeable membrane that allows selective analyte passage into the vacuum of the mass spectrometer. MIMS is becoming the preeminent choice of homeland security and environmental monitoring applications with increasing opportunities for the future development of specialized systems. The steadfast development of miniaturized mass spectrometry systems with efficient operation capabilities for a variety of applications gives promise to the further development of MIMS technology as well as other analytical instrumentation.
|
4 |
Using Ontologies and Intelligent Systems for Traffic Accident Assistance in Vehicular EnvironmentsBarrachina Villalba, Javier 25 July 2014 (has links)
A pesar de que las medidas de seguridad en los sistemas de transporte cada vez son mayores, el aumento progresivo del número de vehículos que circulan por las ciudades y carreteras en todo el mundo aumenta, sin duda, la probabilidad de que ocurra un accidente. En este tipo de situaciones, el tiempo de respuesta de los servicios de emergencia es crucial, ya que está demostrado que cuanto menor sea el tiempo transcurrido entre el accidente y la atención hospitalaria de los heridos, mayores son sus probabilidades de supervivencia.
Las redes vehiculares permiten la comunicación entre los vehículos, así como la comunicación entre los vehículos y la infraestructura [4], lo que da lugar a una plétora de nuevas aplicaciones y servicios en el entorno vehicular. Centrándonos en las aplicaciones relacionadas con la seguridad vial, mediante este tipo de comunicaciones, los vehículos podrían informar en caso de accidente al resto de vehículos (evitando así colisiones en cadena) y a los servicios de emergencia (dando información precisa y rápida, lo que sin duda facilitaría las tareas de rescate).
Uno de los aspectos importantes a determinar sería saber qué información se debe enviar, quién será capaz de recibirla, y cómo actuar una vez recibida. Actualmente los vehículos disponen de una serie de sensores que les permiten obtener información sobre ellos mismos (velocidad, posición, estado de los sistemas de seguridad, número de ocupantes del vehículo, etc.), y sobre su entorno (información meteorológica, estado de la calzada, luminosidad, etc.). En caso de accidente, toda esa información puede ser estructurada y enviada a los servicios de emergencia para que éstos adecúen el rescate a las características específicas y la gravedad del accidente, actuando en consecuencia.
Por otro lado, para que la información enviada por los vehículos accidentados pueda llegar correctamente a los servicios de emergencias, es necesario disponer de una infraestructura capaz de dar cobertura a todos los vehículos que circulan por una determinada área. Puesto que la instalación y el mantenimiento de dicha infraestructura conllevan un elevado coste, sería conveniente proponer, implementar y evaluar técnicas consistentes en dar cobertura a todos los vehículos, reduciendo el coste total de la infraestructura.
Finalmente, una vez que la información ha sido recibida por las autoridades, es necesario elaborar un plan de actuación eficaz, que permita el rápido rescate de los heridos. Hay que tener en cuenta que, cuando ocurre un accidente de tráfico, el tiempo de personación de los servicios de emergencia en el lugar del accidente puede suponer la diferencia entre que los heridos sobrevivan o fallezcan. Además, es importante conocer si la calle o carretera por la que circulaban los vehículos accidentados ha dejado de ser transitable para el resto de vehículos, y en ese caso, activar los mecanismos necesarios que permitan evitar los atascos asociados.
En esta Tesis, se pretende gestionar adecuadamente estas situaciones adversas, distribuyendo el tráfico de manera inteligente para reducir el tiempo de llegada de los servicios de emergencia al lugar del accidente, evitando además posibles atascos. / Barrachina Villalba, J. (2014). Using Ontologies and Intelligent Systems for Traffic Accident Assistance in Vehicular Environments [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/39004
|
5 |
The development of a criminological intervention model for the Rosslyn industrial environment in Tshwane, Gauteng, South AfricaPretorius, William Lyon 02 1900 (has links)
The problem investigated in this research is the ongoing crime threat and the extreme risks which impact negatively on the sustainability of the Rosslyn Industry - the industrial hub of Tshwane in the Gauteng Provence of South Africa. Businesses in Rosslyn are desperate for a solution that will mitigate these crime threats and risks, and ensure the future sustainability of this important industrial community. An intervention model is urgently required to prevent this type of crime, not only as a short term solution but as a sustainable long term intervention.
This research study initiated the collaboration required for the successful implementation of a Crime Prevention Intervention Model (CPIM) in the Rosslyn industrial environment. The intended crime prevention model has been designed in such a way that it addresses the entire environment of crime that prevails in the Rosslyn area involving both the offender and the victim. This design is rooted in the ontology of Environmental Criminology and more specific on the applied epistemology of Crime Prevention Through Environmental Design (CPTED).
Participants in this project are representatives who are responsible for all security functions in both big businesses and small enterprises. And with their dedicated assistance the research findings disclosed the current crime status of the Rosslyn environment regarding the threat, risk, security vulnerabilities, controls and needs:
• Crime and its causal factors, in Rosslyn, are rife and no noteworthy action has been implemented to mitigate these threats.
• Collaboration between Rosslyn role players (neighbours, local government and law enforcement) is for all purposes non-existent.
• And to complicate matters even more, knowledge of how to effectively mitigate crime is limited and handicapped by the re-active physical security methods currently being used.
• The implication of these findings is that the status quo will eventually render business in Rosslyn unsustainable. Thus a CPIM in Rosslyn is inevitable.
What was crucial to this research and to the CTPED design is the detailed sourcing of accurate data addressing the experiences and the needs the respondents identified in the current Rosslyn crime situation concerning; status, the threat, risk, security, vulnerabilities and controls.
In order to achieve this level of data sourcing and assimilation, the essential features of the research method were based on a mixed approach where quantitative and qualitative methods were implemented in parallel. The diverse fields, sources and respondent mix required for a Rosslyn Industry CPIM also necessitated a MIT (Multi,-Inter,-Trans,-Disciplinary) approach. This MIT requirement is successfully facilitated through the applied criminological CPTED approach.
The CPIM is based on the combined outcomes of the following three research fields:
• Field-one: Environmental criminology theories are researched through an in-depth literature review to demonstrate the criminological grounding of crime prevention and to guide its application through the development of an applied CPTED SUITE.
• Field-two: Supply Chain Security (SCS) are researched through an in-depth literature review to establish its criminological relevance and applications. SCS requirements are identified and built into the Field-Three research process and tested for relevance and for incorporation in the CPTED SUITE.
• Field-three: Based on a mixed research process, using a custom designed Criminological Risk Analyses tool incorporating scheduled interviews and questionnaires, the crime and needs profile of the Rosslyn Industry are uncovered and analysed. The results are filtered through the CPTED SUITE to indicate the correct criminological approach for mitigating the identified problems and needs.
Even though this study takes an applied crime preventative approach, the criminological-philosophical mould of crime prevention is imperative for the effective application of the CPTED. Security and crime prevention training, planning and application, without this approach will remain underdeveloped and outdated.
Finally the underlying intention of this research is for this Crime Prevention Intervention Model (CPIM) to be adapted and implemented and to serve as a guide or a benchmark for security practitioners in any industrial environment that has the same crime threats and crime risk challenges. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
|
6 |
The development of a criminological intervention model for the Rosslyn industrial environment in Tshwane, Gauteng, South AfricaPretorius, William Lyon 02 1900 (has links)
The problem investigated in this research is the ongoing crime threat and the extreme risks which impact negatively on the sustainability of the Rosslyn Industry - the industrial hub of Tshwane in the Gauteng Provence of South Africa. Businesses in Rosslyn are desperate for a solution that will mitigate these crime threats and risks, and ensure the future sustainability of this important industrial community. An intervention model is urgently required to prevent this type of crime, not only as a short term solution but as a sustainable long term intervention.
This research study initiated the collaboration required for the successful implementation of a Crime Prevention Intervention Model (CPIM) in the Rosslyn industrial environment. The intended crime prevention model has been designed in such a way that it addresses the entire environment of crime that prevails in the Rosslyn area involving both the offender and the victim. This design is rooted in the ontology of Environmental Criminology and more specific on the applied epistemology of Crime Prevention Through Environmental Design (CPTED).
Participants in this project are representatives who are responsible for all security functions in both big businesses and small enterprises. And with their dedicated assistance the research findings disclosed the current crime status of the Rosslyn environment regarding the threat, risk, security vulnerabilities, controls and needs:
• Crime and its causal factors, in Rosslyn, are rife and no noteworthy action has been implemented to mitigate these threats.
• Collaboration between Rosslyn role players (neighbours, local government and law enforcement) is for all purposes non-existent.
• And to complicate matters even more, knowledge of how to effectively mitigate crime is limited and handicapped by the re-active physical security methods currently being used.
• The implication of these findings is that the status quo will eventually render business in Rosslyn unsustainable. Thus a CPIM in Rosslyn is inevitable.
What was crucial to this research and to the CTPED design is the detailed sourcing of accurate data addressing the experiences and the needs the respondents identified in the current Rosslyn crime situation concerning; status, the threat, risk, security, vulnerabilities and controls.
In order to achieve this level of data sourcing and assimilation, the essential features of the research method were based on a mixed approach where quantitative and qualitative methods were implemented in parallel. The diverse fields, sources and respondent mix required for a Rosslyn Industry CPIM also necessitated a MIT (Multi,-Inter,-Trans,-Disciplinary) approach. This MIT requirement is successfully facilitated through the applied criminological CPTED approach.
The CPIM is based on the combined outcomes of the following three research fields:
• Field-one: Environmental criminology theories are researched through an in-depth literature review to demonstrate the criminological grounding of crime prevention and to guide its application through the development of an applied CPTED SUITE.
• Field-two: Supply Chain Security (SCS) are researched through an in-depth literature review to establish its criminological relevance and applications. SCS requirements are identified and built into the Field-Three research process and tested for relevance and for incorporation in the CPTED SUITE.
• Field-three: Based on a mixed research process, using a custom designed Criminological Risk Analyses tool incorporating scheduled interviews and questionnaires, the crime and needs profile of the Rosslyn Industry are uncovered and analysed. The results are filtered through the CPTED SUITE to indicate the correct criminological approach for mitigating the identified problems and needs.
Even though this study takes an applied crime preventative approach, the criminological-philosophical mould of crime prevention is imperative for the effective application of the CPTED. Security and crime prevention training, planning and application, without this approach will remain underdeveloped and outdated.
Finally the underlying intention of this research is for this Crime Prevention Intervention Model (CPIM) to be adapted and implemented and to serve as a guide or a benchmark for security practitioners in any industrial environment that has the same crime threats and crime risk challenges. / Criminology and Security Science / D. Litt. et Phil. (Criminology)
|
Page generated in 0.1428 seconds