The Unsolvable Privacy Problem and Its Implications for Security Technologies

Author(s):  
Andrew Odlyzko
1976 ◽  
Vol 15 (02) ◽  
pp. 69-74
Author(s):  
M. Goldberg ◽  
B. Doyon

This paper describes a general data base management package, devoted to medical applications. SARI is a user-oriented system, able to take into account applications very different by their nature, structure, size, operating procedures and general objectives, without any specific programming. It can be used in conversational mode by users with no previous knowledge of computers, such as physicians or medical clerks.As medical data are often personal data, the privacy problem is emphasized and a satisfactory solution implemented in SARI.The basic principles of the data base and program organization are described ; specific efforts have been made in order to increase compactness and to make maintenance easy.Several medical applications are now operational with SARI. The next steps will mainly consist in the implementation of highly sophisticated functions.


Author(s):  
O. Semenenko ◽  
Y. Dobrovolsky ◽  
V. Koverga ◽  
O. Sechenev

Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction in order to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine. The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media. Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


2021 ◽  
Vol 27 (1) ◽  
Author(s):  
Nina Klimburg-Witjes ◽  
Frederik C. Huettenrauch

AbstractCurrent European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of various stakeholder groups in the research and innovation processes, aiming to anticipate undesired consequences of and identifying socially acceptable alternatives for emerging technologies. However, RRI has also been criticized as an industry-driven attempt to gain societal legitimacy for new technologies. In this article, we argue that while RRI evokes a space where different actors enter co-creative dialogues, it lays bare the specific challenges of governing security innovation in socially responsible ways. Empirically, we draw on the case study of BODEGA, the first EU funded research project to apply the RRI framework to the field of border security. We show how stakeholders involved in the project represent their work in relation to RRI and the resulting benefits and challenges they face. The paper argues that applying the framework to the field of (border) security lays bare its limitations, namely that RRI itself embodies a political agenda, conceals alternative experiences by those on whom security is enacted upon and that its key propositions of openness and transparency are hardly met in practice due to confidentiality agreements. Our hope is to contribute to work on RRI and emerging debates about how the concept can (or cannot) be contextualized for the field of security—a field that might be more in need than any other to consider the ethical dimension of its activities.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1787
Author(s):  
Ezedin Barka ◽  
Sofiane Dahmane ◽  
Chaker Abdelaziz Kerrache ◽  
Mohamad Khayat ◽  
Farag Sallabi

Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guarantee both flexibility and efficiency of the network which is even more important in the case of healthcare monitoring. Furthermore, Blockchain has recently been proposed as a game-changing tool that can be integrated into the Internet of Things (IoT) to have the optimal level of security and privacy. However, incorporating Blockchain into IoT networks, which rely heavily on patients’ health sensors, is extremely difficult. In this paper, a secure Healthcare Monitoring System (HMS) is proposed with a focus on trust management issues. The architecture seeks to protect multiple healthcare monitoring system components and preserves patient privacy by developing a security interface where separate security modules can be integrated to run side by side to ensure reliable HMS. The security framework architecture we propose takes advantage of the blockchain technology as a secure and timely information back-end. STHM is a proposal that uses Software-Defined Networking (SDN) as the communication medium that allows users to access SDN’s different functional and security technologies and services. Simulation results show that the use of Blockchain for the SDN-based healthcare monitoring can ensure the desired flexibility and security for a very lightweight additional overhead.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Lars Gerhold ◽  
Edda Brandes

AbstractThe article examines the increasingly important role played by technology in the domain of public security in Germany, illustrating its effects on social life. In order to illuminate developments that govern the adoption of security technologies and render them in their dependencies comprehensible, we present two plausible and consistent future scenarios for Germany 2035. Following Jasanoff and Kim, these scenarios are theoretically conceived as two competing “sociotechnical imaginaries” which implies different trajectories for shaping the future. In these imaginaries, security technologies condition social change, and vice versa, in a mutually interdependent process. On the basis of current literature in tandem with a structured scenario development process, we condensed the present sociotechnical imaginaries into two tangible future scenarios for the field of public security, illustrating its effects on how we live as a society. Our overarching goal is to identify key factors that will mediate future developments, and, by extension, to facilitate discussion on the type of future we find collectively desirable. The analysis of impact factors resulted in ten key factors that play a crucial role for the use of security technologies and serve as a leverage for shaping the future. Projections of these factors lead to two narrative scenarios “To Be Ahead” and “Turn Back The Clock”.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


Sign in / Sign up

Export Citation Format

Share Document