scholarly journals Discuss the Security Countermeasures and Data Protection of Library Computer Network

2021 ◽  
Vol 1915 (4) ◽  
pp. 042049
Author(s):  
Wanchun Guo
2021 ◽  
Vol 10 (2) ◽  
pp. 51-74
Author(s):  
Mikołaj BOROWSKI ◽  
Jakub DYSARZ ◽  
Maciej REICHWALD

Mining cryptocurrencies is much more profitable if one is not paying for equipment or the electricity used for the mining. This is the main reason why cryptojacking has become so prevalent as one of the predominant cybersecurity threats facing Europe today. While the robustness of an organisation is important, one should also know what to do following a security incident or breach. Whilst post-incident analyses are important, an organization should also ascertain their legal standing as well as any possible ways forward after the damage has been done. In order to have a better idea of such a situation, we conducted an in-depth analysis of what a cryptojacking attack would do to our computer network. We did not do that to better protect ourselves, but rather to assess what management can do after an attack happens. Furthermore, we present areas that should be taken into account when assessing damage and propose legal measures effective at the European Union level, relying on criminal, civil and data protection provisions.


Author(s):  
L. S. Chumbley ◽  
M. Meyer ◽  
K. Fredrickson ◽  
F.C. Laabs

The Materials Science Department at Iowa State University has developed a laboratory designed to improve instruction in the use of the scanning electron microscope (SEM). The laboratory makes use of a computer network and a series of remote workstations in a classroom setting to provide students with increased hands-on access to the SEM. The laboratory has also been equipped such that distance learning via the internet can be achieved.A view of the laboratory is shown in Figure 1. The laboratory consists of a JEOL 6100 SEM, a Macintosh Quadra computer that acts as a server for the network and controls the energy dispersive spectrometer (EDS), four Macintosh computers that act as remote workstations, and a fifth Macintosh that acts as an internet server. A schematic layout of the classroom is shown in Figure 2. The workstations are connected directly to the SEM to allow joystick and computer control of the microscope. An ethernet connection between the Quadra and the workstations allows students seated there to operate the EDS. Control of the microscope and joystick is passed between the workstations by a switch-box assembly that resides at the microscope console. When the switch-box assembly is activated a direct serial line is established between the specified workstation and the microscope via the SEM’s RS-232.


2007 ◽  
Vol 4 (5) ◽  
pp. 36-37
Author(s):  
N. Cater
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document