scholarly journals ‘DNA-proofing’ for computer systems — a new approach to computer security?

Author(s):  
C. P. Louwrens ◽  
S. H. Von Solms
Author(s):  
Cyril Onwubiko ◽  
Thomas Owens

The importance of situational awareness to air traffic control, and hence the safety and security of aircraft, is evident, demonstrable, and has been hugely significant. The main purpose of this book is to convey an understanding of the impact of situational awareness on the design of the next generation computer systems, network architectures, and platform infrastructures. The book achieves its purpose by presenting principles, methods, and applications of situational awareness for computer network defense; in doing so, it makes clear the benefits situational awareness can provide for information security, computer security and computer network defense. This book contributes to cross-multidisciplinary discussion among researchers, academia, and practitioners who are engaged objectively in sharing, contributing, and showcasing how situational awareness can be adapted to computer systems, network infrastructure designs, and architecture patterns. The goal of this chapter is to explain situational awareness for computer network defense from the point of view of its most basic foundations as a spring board to discuss how situational awareness can be relevant to computer network defense, whose operations and environment are similar to air traffic control where the application of situational awareness has been hugely successful.


2021 ◽  
pp. 1-33
Author(s):  
Thammarat Panityakul ◽  
Tahir Mahmood ◽  
Zeeshan Ali ◽  
Muhammad Aslam

Certain intellectuals have generalized the principle of the fuzzy set (FS), but the theory of complex q-rung orthopair fuzzy set (Cq-ROFS) has received massive attraction from different scholars. The goal of this study is to combine the principle of Heronian mean (HM) operator with Cq-ROFS is to initiate the complex q-rung orthopair fuzzy HM (Cq-ROFHM) operator, complex q-rung orthopair fuzzy weighted HM (Cq-ROFWHM) operator, complex q-rung orthopair fuzzy geometric HM (Cq-ROFGHM) operator, complex q-rung orthopair fuzzy weighted geometric HM (Cq-ROFWGHM) operator, and their flexible and dominant properties. These operators can help to aggregate any number of attributes to determine the reliability and consistency of the investigated operators. Moreover, there are physical and non-physical threats. Physical threats cause damage to computer systems hardware and infrastructure. Examples include theft, vandalism through to natural disasters. Non-physical threats target the software and data on the computer systems. To manage such sort of troubles, we determine the analyzing and controlling computer security threats based on presented operators under the Cq-ROFS. Finally, to show the reliability and proficiency of the presented approaches, we resolved some numerical examples by using the explored operators. The comparative analysis, advantages, and graphical interpretations of the presented works are also discovered.


2015 ◽  
Vol 2015 ◽  
pp. 1-12
Author(s):  
Sergio Mauricio Martínez Monterrubio ◽  
Juan Frausto Solis ◽  
Raúl Monroy Borja

The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.


2005 ◽  
Vol 3 (3) ◽  
pp. 8-12
Author(s):  
Edward A. Schmalz

Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.


Author(s):  
Dawn Song ◽  
David Brumley ◽  
Heng Yin ◽  
Juan Caballero ◽  
Ivan Jager ◽  
...  

2020 ◽  
Vol 5 (1) ◽  
pp. 26-34
Author(s):  
Amsar

Each online based server cannot be fully secured from various external attacks that attempt to infiltrate the system. Server security is the most important part for administrators against intruders who carry out their actions in attacking computer systems, there are several attack methods that can be done, method like brute-force are usually deployed to attack computer security systems that are connected to the internet. In this study to overcome attacks penetrating into the server system, the port knoking method can be used as a step taken to prevent attacks that enter the system or also known as the authentication method. By using this port knoking method the administrator can control the system to be more secure from brute-force attackers addressed in certain parts such as SSH server and FTP server. So that users can perform services connected with SSH server and FTP server services, knocked functions as a port knocking daemon that is ready to receive port knocking authentication from the user then rewrites the firewall, so that the connected services can be secured from attacks that try to infiltrate the server system. Furthermore, Ip tables and uncomplicated firewalls function to build firewalls that will deny connections to the SSH server and FTP server services. So when a foreign user accesses SSH and FPT without first doing the autendiction, the firewall will reject the connection, but if the user passes the port knocking autendiction stage via sending SYN packets to the port provided in the knocking daemon port, then the knocking daemon port is will rewrite the firewall so users can connect to the SSH server and FPT server services.


Author(s):  
Zippy Erlich ◽  
Moshe Zviran

With the rapid growth of networked systems and applications such as e-commerce, the demand for effective computer security is increasing. Most computer systems are protected through a process of user identification and authentication. While identification is usually non-private information provided by users to identify themselves and can be known by system administrators and other system users, authentication provides secret, private user information which can authenticate their identity. There are various authentication approaches and techniques, from passwords to public keys (Smith, 2002). This article presents the three main authentication approaches, their technology and implementation issues, and the factors to be considered when choosing an authentication method.


Sign in / Sign up

Export Citation Format

Share Document