Canon warns of digital printer security issue

Infosecurity ◽  
2010 ◽  
Vol 7 (4) ◽  
pp. 7
Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


Author(s):  
Xueli Wang ◽  
Yufeng Zhang ◽  
Hongxin Zhang ◽  
Xiaofeng Wei ◽  
Guangyuan Wang

Abstract For wireless transmission, radio-frequency device anti-cloning has become a major security issue. Radio-frequency distinct native attribute (RF-DNA) fingerprint is a developing technology to find the difference among RF devices and identify them. Comparing with previous research, (1) this paper proposed that mean (μ) feature should be added into RF-DNA fingerprint. Thus, totally four statistics (mean, standard deviation, skewness, and kurtosis) were calculated on instantaneous amplitude, phase, and frequency generated by Hilbert transform. (2) We first proposed using the logistic regression (LR) and support vector machine (SVM) to recognize such extracted fingerprint at different signal-to-noise ratio (SNR) environment. We compared their performance with traditional multiple discriminant analysis (MDA). (3) In addition, this paper also proposed to extract three sub-features (amplitude, phase, and frequency) separately to recognize extracted fingerprint under MDA. In order to make our results more universal, additive white Gaussian noise was adopted to simulate the real environment. The results show that (1) mean feature conducts an improvement in the classification accuracy, especially in low SNR environment. (2) MDA and SVM could successfully identify these RF devices, and the classification accuracy could reach 94%. Although the classification accuracy of LR is 89.2%, it could get the probability of each class. After adding a different noise, the recognition accuracy is more than 80% when SNR≥5 dB using MDA or SVM. (3) Frequency feature has more discriminant information. Phase and amplitude play an auxiliary but also pivotal role in classification recognition.


2021 ◽  
Vol 13 (11) ◽  
pp. 6503
Author(s):  
Yu Peng ◽  
Hubert Hirwa ◽  
Qiuying Zhang ◽  
Guoqin Wang ◽  
Fadong Li

Given the impact of COVID-19 and the desert locust plague, the Ethiopian food security issue has once again received widespread attention. Its food crisis requires comprehensive and systematic research to achieve the United Nations Sustainable Development Goal of zero hunger. This review discusses the current situation and the causes of food security in Ethiopia. We focus on the challenges in the food security assessment field. The article lists seven typical causes of food insecurity and three roots of food security in Ethiopia. Long-term food security assessment and a comprehensive understanding and manageability for food security causes are considered as the main existing research challenges. Climate-resilient management, water management, and long-term ecosystem network monitoring and data mining are suggested as potential roadmap for future research.


2013 ◽  
Vol 756-759 ◽  
pp. 3039-3042
Author(s):  
Chen Zhang ◽  
Shi Jie Jiang ◽  
Bin Huang

Online payment is apparently the key for the online transactions, so its security issue becomes the center of focus in the e-commerce development. In China, however, the information leakage, transaction fraud and other security issues have occurred so frequently that they have severely affected the customer confidence, and have become one of the major blockages in the e-commerce development. This article intends to have an in depth discussion of online payment security issues, examining current situations and problems in security technology, corporate social responsibility, and also propose appropriate strategic recommendations.


Author(s):  
Thanh-Nhan Luong ◽  
Hanh-Phuc Nguyen ◽  
Ninh-Thuan Truong

The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.


2021 ◽  
Vol 79 (2) ◽  
pp. 7-22
Author(s):  
Tudor CHERHAȚ

This paper illustrates how People’s Republic of China has applied a form of economic diplomacy to Central and Eastern Europe in order to extend its regional political influence. Using the “17+1” Initiative, the Chinese state sought to provide financial privileges to member states so that they would later become dependent on Beijing’s political and economic visions. However, despite the European Union’s concern, the results of the project were not as expected, with great doubts about the initiative’s future. These were confirmed by the position of NATO, which considered that China’s efforts do not represent a security issue for the Alliance’s eastern flank.


2019 ◽  
pp. 197-220
Author(s):  
Pavel Boček ◽  
Jan Holzer ◽  
Radomír Vlček

Sign in / Sign up

Export Citation Format

Share Document