scholarly journals Increasing Windows security by hardening PC configurations

2019 ◽  
Vol 214 ◽  
pp. 08019
Author(s):  
Pablo Martín Zamora ◽  
Michal Kwiatek ◽  
Vincent Nicolas Bippus ◽  
Eneko Cruz Elejalde

Over 8000 Windows PCs are actively used on the CERN site for tasks ranging from controlling the accelerator facilities to processing invoices. PCs are managed through CERN's Computer Management Framework and Group Policies, with configurations deployed based on machine sets and a lot of autonomy left to the end-users. While the generic central configuration works well for the majority of the users, a specific hardened PC configuration is now provided for users who require stronger resilience against external attacks. This paper describes the technical choices and configurations involved and discusses the effectiveness of the hardened PC approach.

2015 ◽  
Vol 21 (2) ◽  
pp. 218-230 ◽  
Author(s):  
Nuno Marques Almeida ◽  
Vitor Sousa ◽  
Luís Alves Dias ◽  
Fernando Branco

Nowadays, a wide range of stakeholders seek explicit performance and risk information on construction projects. These stakeholders include end-users, authorities, insurance companies and financial institutions, among others. They look for proof that engineering risks are being properly managed and that specified performance-based requirements are fulfilled throughout all stages of the project (e.g. technical requirements related to the building such as structural safety, structural serviceability, structural durability, fire safety, energy efficiency, or others). Such demonstration can be conveyed through statements of technical conformity, such as technical risk reports or engineering performance certificates. Statements of conformity are particularly valuable to make informed decisions associated with contractual or other legal warranties against building nonconformities. This paper describes the conceptual background and the methodologies undertaken to design and develop a management framework that enables recognition of the conformity assessment results of building projects. It also presents the outreach of this management framework throughout the planning, programming, design, construction and use phases of building projects. This paper also summarizes the wide range of practical implications and benefits of this management framework for authorities and official bodies, owners and their representatives, banks and insurance companies, conformity assessment bodies, designers, builders, suppliers and end-users.


2020 ◽  
Vol 54 (6) ◽  
pp. 97-107
Author(s):  
Fleurdeliza A. de Peralta

AbstractTechnology innovation, market demand, and the potential impacts of a changing climate are driving the marine renewable energy (MRE) industry to develop market-ready systems to provide low-carbon electricity for emerging, off-grid markets. The advanced operational and information technology devices used in MRE systems create a pathway for a cyber threat actor to gain unauthorized access to data or disrupt operation. To improve the resiliency of MRE systems as a predictable, affordable, and reliable source of energy from oceans and rivers, guidance was developed for an end users' organization that describes a framework for identifying and managing cybersecurity risk. The development of the cybersecurity guidance is based on standards described in the Risk Management Framework and Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST). This paper is the first of a two-part series that describes an approach to determine the cybersecurity risk for MRE systems based on assessing potential cyber threats, identifying vulnerabilities (people, processes, and technology, including physical and operational environment), and evaluating the consequences a cyberattack would have on operation of the MRE system and impact on end users' mission and business objectives. MRE developers and stakeholders can use this approach to assess their current cybersecurity risk posture to incorporate appropriate cybersecurity controls to reduce the consequences and impacts from a cyberattack on MRE systems. This approach can be refined further as MRE systems are deployed and operational configurations are available.


2019 ◽  
pp. 90-111 ◽  
Author(s):  
Natalia S. Pavlova ◽  
Andrey Е. Shastitko

The article deals with the problem of determining market boundaries for antitrust law enforcement in the field of telecommunications. An empirical approach has been proposed for determining the product boundaries of the market in the area of mass distribution of messages, taking into account the comparative characteristics of the types and methods of notification (informing) of end users; the possibilities of switching from one way of informing to another, including the evolution of such opportunities under the influence of technological changes; switching between different notification methods. Based on the use of surveys of customers of sending SMS messages, it is shown that the product boundaries should include not only sending messages via SMS, but also e-mail, instant messengers, Push notifications and voice information. The paper illustrates the possibilities of applying the method of critical loss analysis to determining the boundaries of markets based on a mixture of surveys and economic modeling.


2020 ◽  
Vol 17 (1) ◽  
pp. 68-77
Author(s):  
V. E. Zaikovsky ◽  
A. V. Karev

Project success depends on the ability to respond to risks and make correct decisions in a timely manner. The project approach provides a better framework for implementing a new management system into the company’s business processes. The risk management framework developed by the company comprises a risk management infrastructure, a set of standards, human resources, and a risk management information system. To improve staff compliance, it is necessary to provide training and to communicate the goals of the project effectively. It is also important to develop a motivation system because well trained and motivated staff are able to work more efficiently.


2009 ◽  
Vol 129 (2) ◽  
pp. 283-290 ◽  
Author(s):  
Junji Kondoh ◽  
Ahmed Shafiu ◽  
Nick Jenkins ◽  
Danny Pudjianto ◽  
Goran Strbac

2017 ◽  
Vol 1 (2) ◽  
pp. 131-136 ◽  
Author(s):  
Deni Apriadi ◽  
Arie Yandi Saputra

The agricultural sector has an important role in supporting the Indonesian economy. But on the other hand, sometimes many community groups do not benefit due to problems that arise because the distribution chain of agricultural products are long enough, especially for farmers and consumers (end users). Of course the situation must be improved, so that the agricultural products of Indonesia can be enjoyed by consumers or farmers with proper. One of its efforts is by establishing an e-commerce based e-commerce system in agriculture. E-commerce based ecommerce system can be used as an alternative for farmers, used as a media campaign, communication and information and can cut the distribution chain of agricultural products marketing. The benefits felt by farmers and consumers directly and indirectly give a positive influence, especially from the broader marketing channels of agricultural products can increase production demand and spur the procurement of production among farmers and also the price offered to consumers will be cheaper so that sales in agricultural products can be more increased and profitable for farmers


Sign in / Sign up

Export Citation Format

Share Document