A Study on the Analysis and Classification of Security Threats According to the Characteristics of Public Service Computer Network

Author(s):  
MinSu Kim
2019 ◽  
Vol 3 ◽  
pp. 123-126
Author(s):  
V.O. Halai ◽  
Keyword(s):  

2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Author(s):  
Bisma Gulzar ◽  
Ankur Gupta

As IoT applications are pervasively deployed across multiple domains, the potential impact of their security vulnerabilities are also accentuated. Sensor nodes represent a critical security vulnerability in the IoT ecosystem as they are exposed to the environment and accessible to hackers. When compromised or manipulated, sensor nodes can transmit incorrect data which can have a damaging impact on the overall operation and effectiveness of the system. Researchers have addressed the security vulnerabilities in sensor nodes with several mechanisms being proposed to address them. This paper presents DAM (Detect, Avoid, Mitigate), a theoretical framework to evaluate the security threats and solutions for sensor security in IoT applications and deployments. The framework leads to the classification of sensor security threats and categorization of available solutions which can be used to either detect vulnerabilities and attacks, recover from them or completely avoid them. The proposed framework will be useful for evaluating sensor security in real-world IoT deployments in terms of potential threats and designing possible solution


2021 ◽  
Vol 2083 (4) ◽  
pp. 042084
Author(s):  
Xi Wang ◽  
Lei Shi

Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.


Author(s):  
Hengki Derek Wandosa ◽  
Arius Kambu ◽  
Agustinus Numberi

This study aims to determine: (1) The potential revenue (PAD) in Mimika Regency Year 2002-2013; (2) Identify the factors that encourage the growth source revenue (PAD) in Mimika. The method used in analyzing the use of quantitative techniques the 4 quadrant approach to tax (shift and share), elasticity component of revenue (PAD). The results showed that, by classification using the shift and share analysis of the potential components of taxes and levies in Mimika, shows the classification Prima namely Public service levies, and levies Licensing Certain, whereas in the classification Potentially the service levies Enterprises, for the classification of Developing the components Restaurant tax, entertainment tax, advertisement tax, street lighting tax and the classification Retarded Hotel Tax Non Metallic Minerals & Rocks. Based on the calculation of tax elasticity against the regional revenue, obtained information that the sources of growth by component Local Revenue (PAD) that is the average of the component Local Tax gain an Elastic (2.91> 1), Retribution gain an Inelastic (0.22 1). So that through this information, the source of regional revenue growth in Mimika courtesy Realization component Local Tax, Income and Asset enterprises. Keywords : Local Revenue


Financial law ◽  
2021 ◽  
Vol 1 ◽  
pp. 37-39
Author(s):  
Nadezhda G. Dolmatova ◽  

Currently, Russia has begun to form a legal framework for the development of the digital economy. The introduction of digital technologies affects all areas of public relations, including budgetary legal relations. In connection with digitalization, issues of budget security are becoming more relevant. The article substantiates the need to improve the legal regulation of budget relations in terms of ensuring budget security and the use of digital technologies. The author’s classification of budget security threats is given. Legal contradictions in the field of digital currency regulation are revealed. Measures are proposed to eliminate conflicts and gaps in the current legislation regulating budgetary legal relations and relations arising in connection with the use of digital currency.


2011 ◽  
pp. 1364-1378
Author(s):  
Aikaterini Mitrokotsa ◽  
Christos Douligeris

The use of electronic technologies in government services has played a significant role in making citizens’ lives more convenient. Even though the transition to digital governance has great advantages for the quality of government services it may be accompanied with many security threats. One of the major threats and hardest security problems e-Government faces are the Denial of Service (DoS) attacks. DoS attacks have already taken some of the most popular e-government sites off-line for several hours causing enormous losses and repair costs. In this chapter, important incidents of DoS attacks and results from surveys that indicate the seriousness of the problem are presented. In order to limit the problem of DoS attacks in government organisations we also present a list of best practices that can be used to combat the problem together with a classification of attacks and defense mechanisms.


Sign in / Sign up

Export Citation Format

Share Document