Spelling suggestions: "subject:"cibersecurity"" "subject:"bettersecurity""
1 |
An Exploratory Look at Thefts from Construction SitesShrestha, Joseph, Osborne, Dustin Lee 10 April 2019 (has links)
Theft of construction equipment, materials, and tools from construction sites results in approximately one billion dollars in direct annual losses to the U.S. construction industry per year. A better understanding of theft characteristics is vital to reducing this figure. This study analyzes over 15,000 incidents from the National Incident-Based Reporting System (NIBRS) to understand characteristics such as theft prevalence, average monetary losses, and recovery rates. The study finds that contractors lost an average of about $6,000 per incident. Trucks are the most expensive theft targets, with an average loss of about $42,000 per incident, and also the most likely item to be recovered (55% of the time). However, recovery rate across all targets was less than 7%. The results of this study provide the most accurate and extensive statistics to date on construction theft characteristics. The study also identifies best practices to reduce thefts such as the use of survellience systems. Further, the use of advanced marking and tracking systems to safeguard expensive equipment and vehicles and aid their recoveries are discussed. The findings are expected to aid contractors and law enforcement agencies in formulating methods for reducing thefts of construction items and improving the likelihood of their recoveries.
|
2 |
Monitorování pracovních stanic Cisco akademie / Monitoring of workstations in Cisco academy laboratoryHrabal, Zdeněk January 2009 (has links)
This thesis deals with design and implementation of a Web page that allows the manipulation with data on a server and workstation in the laboratory. It is also possible to get more information of these stations, such as installed on the virtual systems, free space on a drive or the contents of the directory. Details of the stations provide scripts written by Bc. Jiří Homolka in a Bash language. For this reason, the work also deals with the issue of scripts to run in various modes - in the background or in the pseudoterminal. Part of this work is the formation of the database structure, which allows to trace the activities on the workstations and show the history. The web is accessible form the Internet so there was given an attention to the security and protection against attempts of unauthorized intrusion. Therefore the system can login only registered users with appropriate rights or new accounts can be created or existing modified.
|
3 |
Web site security maturity of the European Union and its member states : A survey study on the compliance with best practices of DNSSEC, HSTS, HTTPS, TLS-version, and certificate validation typesRapp, Axel January 2021 (has links)
With e-governance steadily growing, citizen-to-state communication via Web sites is as well, placing enormous trust in the protocols designed to handle this communication in a secure manner. Since breaching any of the protocols enabling Web site communication could yield benefits to a malicious attacker and bring harm to end-users, the battle between hackers and information security professionals is ongoing and never-ending. This phenomenon is the main reason why it is of importance to adhere to the latest best practices established by specialized independent organizations. Best practice compliance is important for any organization, but maybe most of all for our governing authorities, which we should hold to the highest standard possible due to the nature of their societal responsibility to protect the public. This report aims to, by conducting a quantitative survey, study the Web sites of the governments and government agencies of the member states of the European Union, as well as Web sites controlled by the European Union to assess to what degree their domains comply with the current best practices of DNSSEC, HSTS, HTTPS, SSL/TLS, and certificate validation types. The findings presented in this paper show that there are significant differences in compliance level between the different parameters measured, where HTTPS best practice deployment was the highest (96%) and HSTS best practice deployment was the lowest (3%). Further, when comparing the average best practice compliance by country, Denmark and the Netherlands performed the best, while Cyprus had the lowest average.
|
Page generated in 0.0515 seconds