scholarly journals Identifying Security Requirements Body of Knowledge for the Security Systems Engineer

Author(s):  
Suné von Solms ◽  
Annlizé Marnewick
2009 ◽  
pp. 98-113 ◽  
Author(s):  
Nancy R. Mead ◽  
Dan Shoemaker

This chapter describes methods of incorporating security requirements engineering into software engineering courses and curricula. The chapter discusses the importance of security requirements engineering and the relationship of security knowledge to general computing knowledge by comparing a security body of knowledge to standard computing curricula. Then security requirements is related to standard computing curricula and educational initiatives in security requirements engineering are described, with their results. An expanded discussion of the SQUARE method in security requirements engineering case studies is included, as well as future plans in the area. Future plans include the development and teaching of academic course materials in security requirements engineering, which will then be made available to educators. The authors hope that more educators will be motivated to teach security requirements engineering in their software engineering courses and to incorporate it in their curricula.


2021 ◽  
Vol 13 (19) ◽  
pp. 10693
Author(s):  
Young Dae Ko ◽  
Byung Duk Song

The meaning of sustainability is very broad and has many pillars such as the economy, environment and society. In the tourism industry, another important pillar is security. Tourism security affects the satisfaction and pleasure of tourists on a trivial level, and life and injuries on a significant level. Thus, unless security is guaranteed, tourists will not be able to fully enjoy the attractions and will not even consider the travel itself. Such tourist behavior has a significant impact on short-term and long-term tourism sustainability. Therefore, to enhance tourism security, many policies and frameworks have been suggested and announced in recent years. However, without efficient guidelines for the installation and operation of security devices, it may be hard to obtain actual effectiveness. To support real implementation of security systems in the tourism industry, this study quantitatively addresses the installation and operation issue of security devices in an optimal manner. A complementary cooperation of Closed-Circuit Television (CCTV) and Unmanned Aerial Vehicles (UAV) is suggested to efficiently monitor the key locations of tourism destinations and improve the security. Two mathematical models are developed to derive the optimal location of CCTVs, and the optimal operation schedule of UAVs over multiple time periods. Security requirements, service range, and budget are considered as realistic constraints. The validity of the models is demonstrated through a realistic case study of Nice, France.


Author(s):  
Zahid Akhtar

The demand for reliable and robust person recognition systems has expanded due to intense security requirements in today's highly intertwined network society. The advantages of biometrics over traditional security systems have triggered large-scale deployment of biometrics as an authentic technique to determine the identity of an individual. The prime objective of such methods is to assure that the systems are only accessed by genuine users. Since, biometric traits are overt, leading thus to a threat of them being captured, copied, and forged. Numerous techniques have been developed over the years for biometric spoofing and anti-spoofing. The goal of this chapter is to provide a comprehensive overview on works in the field of spoofing and anti-spoofing with special attention to three mainly accepted biometric traits (i.e., fingerprint, face and iris) and multimodal biometric systems. We also present the key challenges, major issues and point out some of the salient and useful research directions.


The recent advancements in Information Technology have brought considerable changes in the way tasks are accomplished across the globe. The world has become a more connected place and a major impact as well as reason of this can be attributed to the steep rise in the usage of mobile devices. Mobile devices are being used for online payments in the form of shopping, money transfers, bill payments and what not. The majority of monetary transactions on the Internet now take place through mobile devices and therefore, mobile payment systems being wireless systems calls for an even more secure protocols and payment environment. Although the various security protocols available today boast of implementing the security requirements i.e. data confidentiality, integrity, non-repudiation, authentication and authorization, still the security of mcommerce transactions remain a major concern for mobile payment users. A number of m-commerce security techniques, models and protocols have been proposed by authors in recent past. This paper presents the recent advancements of the models and techniques authors proposed and the technologies and protocols used in these models. The paper also highlights the open areas of research in the field.


2014 ◽  
Vol 1001 ◽  
pp. 306-311
Author(s):  
Vladimír Mózer ◽  
Tomas Loveček ◽  
Andrej Vel'as ◽  
Linda Makovická

This paper deals with the topic of fire safety and security measures and their mutual interaction. A designer or stakeholder may be confronted with conflicting objectives regarding life safety and object security. Often, escape routes pass via areas that are under non-emergency conditions subject to access control, accessible only to members of staff, contractors, etc. When fire alarm is activated, it is necessary to provide fast and unhindered evacuation from the premises, which may involve using restricted-access back-of-house areas. On a case study – section of a shopping centre – the concepts of both fire safety and security are presented. Firstly, the areas are analysed in terms of their importance from life safety and property security points of view and subsequently solutions are proposed to address any issues. In certain cases a balance between safety and security requirements must be found, i.e. it is not possible to fully satisfy both objectives at the same time, whereas in other fire safety and security systems have been found mutually complementary.


2014 ◽  
Vol 631-632 ◽  
pp. 318-321
Author(s):  
Hao Zhang ◽  
Kai Zhu ◽  
Ren Jie Geng

In modern society, burglaries occur frequently, showing such crimes more high-tech, intelligent trend in recent years. People pay more and more attention to home security. Requirements for home security systems also further improve. In order to establish a sound and reliable home security system, a combination of Zigbee and STM32 terminal acquisition system, achieving low power consumption, data visualization has come true. Compared with traditional alarm systems, this home security terminal design uses new hardware, with smaller volume, easier installation and some data analysis capabilities, making the security system more secure and reliable. The terminals giving a further improve to home security systems, achieving a low cost, low power requirements, have a more broad application prospects and market.


1976 ◽  
Vol 21 (7) ◽  
pp. 465-467
Author(s):  
JOHN C. BRIGHAM

1992 ◽  
Vol 67 (01) ◽  
pp. 063-065 ◽  
Author(s):  
Sherryl A M Taylor ◽  
Jacalyn Duffin ◽  
Cherie Cameron ◽  
Jerome Teitel ◽  
Bernadette Garvey ◽  
...  

SummaryChristmas disease was first reported as a distinct clinical entity in two manuscripts published in 1952 (1, 2). The eponym associated with this disorder, is the surname of the first patient examined in detail and reported by Biggs and colleagues in a paper describing the clinical and laboratory features of seven affected individuals (3). This patient has severe factor IX coagulant deficiency (less than 0.01 units/ml) and no detectable circulating factor IX antigen (less than 0.01 units/ml). Coding sequence and splice junctions of the factor IX gene from this patient have been amplified in vitro through the polymerase chain reaction (PCR). One nucleotide substitution was identified at nucleotide 30,070 where a guanine was replaced by a cytosine. This mutation alters the amino acid encoded at position 206 in the factor IX protein from cysteine to serine. The non conservative nature of this substitution, the absence of this change in more than 200 previously sequenced factor IX genes and the fact that the remainder of the coding region of this gene was normal, all provide strong circumstantial evidence in favour of this change being the causative mutation in this patient. The molecular characterization of this novel mutation in the index case of Christmas disease, contributes to the rapidly expanding body of knowledge pertaining to Christmas disease pathogenesis.


2012 ◽  
Vol 1 (2) ◽  
pp. 13-20
Author(s):  
Yuka Asada

  ABSTRACT   Objectives: Although experiences of burnout are well documented among some health professionals, there is limited research that explores similar experiences among dietitians. This study aims (1) to describe the varied qualitative dimensions of burnout that are particular to dietitians and (2) to identify the factors that might be deemed protective against burnout. Methods: Fourteen dietitians were recruited from a larger quantitative study that assessed prevalence of burnout in Ontario, Canada using the Maslach Burnout Inventory (MBI). Those who completed the MBI were invited to participate in two phenomenological interviews. Transcribed interviews were analyzed by naïve readings and identified meaning units with a larger team for increased rigor and trustworthiness. Results: Dietitians describe burnout as having bodily and overall health consequences. Both social/professional relationships and dietitians’ passion for their work contributed to experiences of burnout and resilience. Opportunities for continued professional growth and change were contributing factors for resilience. Implications & Conclusions: This study contributes to the limited body of knowledge on dietitians’ lived experiences of burnout and resilience. The findings have implications for those involved in the education and training of student dietitians, and for those in a position to offer support to dietitians who are struggling with job stress. In the context of fostering resilience, a preventative approach to dietetic education is explored with the intention to protect future practitioners from burnout.


2020 ◽  
Vol 22 (1) ◽  
pp. 35-52
Author(s):  
Jeffrey Escoffier

After the publication of his pioneering book Sexual Excitement in 1979, Robert Stoller devoted the last 12 years of his life to the study of the pornographic film industry. To do so, he conducted an ethnographic study of people working in the industry in order to find out how it produced ‘perverse fantasies’ that successfully communicated sexual excitement to other people. In the course of his investigation he observed and interviewed those involved in the making of pornographic films. He hypothesized that the ‘scenarios’ developed and performed by people in the porn industry were based on their own perverse fantasies and their frustrations, injuries and conflicts over sexuality and gender; and that the porn industry had developed a systematic method and accumulated a sophisticated body of knowledge about the production of sexual excitement. This paper explores Stoller's theses and shows how they fared in his investigation.


Sign in / Sign up

Export Citation Format

Share Document