Security measures for the Austrian "PAYCHIP" electronic purse application

Author(s):  
A.M. Holzbach
Keyword(s):  
2019 ◽  
Author(s):  
Marjin Martens ◽  
Ralf De Wolf ◽  
Lieven De Marez
Keyword(s):  

Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


2020 ◽  
Author(s):  
Е. A. Akunchenko ◽  
S. P. Basalaeva ◽  
M. A. Volkova ◽  
S. I. Gutnik ◽  
P. A. Vyrva ◽  
...  
Keyword(s):  

Author(s):  
G. I. Korshunov ◽  
V. A. Lipatnikov ◽  
A. A. Shevchenko ◽  
V. Y. Malyshev

Introduction:The known methods of adaptive management of information network protection with special security measures are not effective enough in modern conditions, as they only take into account collected and processed data on security events and do not analyze the dynamics of the actions.Purpose:Developing a method of adaptive control of information network protection based on the analysis of violator's actions.Results:A method has been proposed for adaptive management of information network protection. Unlike other known methods, it is based on analyzing the dynamics of the violator's actions and determining the situational confrontation parameters under stochastic uncertainty. The method includes situation monitoring, operational control of the sequence of violator's actions, modeling the attacker's strategy, determining the situational parameters with a reliable prediction of the intrusion strategy. During the analysis, the network administrator receives information about the priority purposes of an intruder, the tools used and the vulnerabilities of the network. This provides an opportunity to promptly take measures to increase the security of the network and avoid its compromise.Practical relevance: Тhis approach allows you to maintain the operation of automated management systems for an organization with integrated structure, taking into account the scaling in planning and making changes to the structure on the background of information confrontation at the required level when multiple threats are changing their dynamics. 


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Author(s):  
O. Maistrenko ◽  
M. Petrushenko ◽  
S. Nikul ◽  
Y. Sinilo

The article analyzes the possible risks that can arise when firing artillery and rocket launches. The disadvantages of the method of calculating the protection zones are identified, which taking into account will reduce the likelihood of the occurrence of abnormal situations, which can lead to tragic consequences and damage to objects adjacent to the boundary of the testing ground. Additions to the procedure for determining the protection zones of the test site in the interests of RVIA are proposed and the specified, correct sizes of these zones are provided. Development of rocket troops and artillery (RTaA) of the Armed Forces (AF) of Ukraine is impossible without a permanent improvement and modernisation of types of armament and ammunition to them, development of the new artillery systems and their ground tests. During realization of ground tests of types of armament and military technique (WME) of RTaA firing of artillery and starting of rockets is accompanied by errors or wrong acts of WME attendant and personnel or extraneous persons, the consequences of that must be envisaged, and the risk of their origin is Analysis of the battle firing, including during realization of anti-terror operation and operation of the incorporated forces on east of Ukraine row of ground tests of standards of WME RTaA test if possibility of origin of nonpermanent near-accidents during application of armament of RtaA as a result of rejection of trajectory of flight of projectile (mines) by the direction and distance from the expected targets. Mostly it happens through untaking into account of maximal rejections of meteorological and ballistic terms of firing from tabular or errors in calculations, wrong acquisition of charge, error at aiming of fighting machines, cannons, mortars. There for practice of the battle firing needs taking into account of these errors, that will give an opportunity consider ably to promo test rength security at application of armament of RAaT during testing of standards of WME. Thus, in the article certainly and possible risks that can arise up during realization of firing of artillery and starting of rockets are analysed, related to the lacks of existent methodology of realization of calculations in relation to providing of safety measures during the tests of WME RtaA. Suggestions are brought in, in relation to the improvement of methodology of realization of calculations of sizes of protective zones, that unlike existing more in detail take into account maximal deviations of terms of firing from tabular values. These suggestions for providing of safety measures it will be allowed to decrease probability of origin of situations, that can result in tragic consequences and to causing of damages to the objects that fit closely to the limits of training field. Anoffer adding to the order of determination of protective zones and given specified sizes of the sezones have an important practical value at determination of possibilities of grounds and providing of safety of testing and battle firing (starting) of RtaA.


Sign in / Sign up

Export Citation Format

Share Document