Cyber Assist Project and Its Security Requirement

Author(s):  
Hideyuki Nakashima
Keyword(s):  
2008 ◽  
Vol 6 (3) ◽  
pp. 282-289
Author(s):  
E. Soler ◽  
V. Stefanov ◽  
J.-N. Mazon ◽  
J. Trujillo ◽  
E. Fernandez-Medina ◽  
...  

2021 ◽  
Author(s):  
Vijay Mookonil

Abstract Objective The objective of this paper is to provide a general understanding and awareness of the physical security requirement in Oil & Gas Industry, explore various Physical security solutions and how the same is different from Network Security and highlight its importance followed by explaining how same can be achieved in industrial environment by implementing different layers of security measures.


Author(s):  
Anirban Sengupta ◽  
Chandan Mazumdar

As enterprises become dependent on information systems, the need for effective Information Security Governance (ISG) assumes significance. ISG manages risks relating to the confidentiality, integrity and availability of information, and its supporting processes and systems, in an enterprise. Even a medium-sized enterprise contains a huge collection of information and other assets. Moreover, risks evolve rapidly in today’s connected digital world. Therefore, the proper implementation of ISG requires automation of the various monitoring, analysis, and control processes. This can be best achieved by representing information security requirements of an enterprise in a standard, structured format. This paper presents such a structured format in the form of Enterprise Security Requirement Markup Language (ESRML) Version 2.0. It is an XML-based language that considers the elements of ISO 27002 best practices.


Author(s):  
Abedelaziz Mohaisen ◽  
Tamer AbuHmed ◽  
DaeHun Nyang

The use of public key algorithms to sensor networks brings all merits of these algorithms to such networks: nodes do not need to encounter each other in advance in order to be able to communicate securely. However, this will not be possible unless “good” key management primitives that guarantee the functionality of these algorithms in the wireless sensor networks are provided. Among these primitives is public key authentication: before sensor nodes can use public keys of other nodes in the network to encrypt traffic to them, they need to make sure that the key provided for a particular node is authentic. In the near past, several researchers have addressed the problem and proposed solutions for it as well. In this chapter we review these solutions. We further discuss a new scheme which uses collaboration among sensor nodes for public key authentication. Unlike the existing solutions for public key authentication in sensor network, which demand a fixed, yet high amount of resources, the discussed work is dynamic; it meets a desirable security requirement at a given overhead constraints that need to be provided. It is scalable where the accuracy of the authentication and level of security are merely dependent upon the desirable level of resource consumption that the network operator wants to put into the authentication operation.


Sign in / Sign up

Export Citation Format

Share Document