Vulnerability Patch Modeling

Author(s):  
Yogita Kansal ◽  
Deepak Kumar ◽  
P. K. Kapur

The Information Technology products are suffering from various security issues due to the flaws residing in the software system. These flaws allow the violations of security policy and leads into vulnerability. Once the associated user discovers vulnerability the number of intrusions increases until the vendor releases a patch. The patching process helps in maintaining the stability of the software and reduces the probability of damage potential. Even after diffusion and installation whether the patch has successfully removed the vulnerability or not is of great importance. Patch failures creates more vulnerabilities and leads into disaster for developing organizations and users. Thus the success rate of patch is also an unavoidable factor on the basis of which the intrusion rate can be judged. Here in this paper we propose a vulnerability patch modeling that addresses the patching of vulnerabilities that are either discovered by external user or internal user. We also discuss after installation what leads a patch towards failure and what will be its impact on an intact system. The model also provides measures to estimate the potential unsuccessful patch rate that will help developers in logistic planning while patch development. We have used three datasets of different domain to validate the model. A numerical with different goodness of fit criteria is also illustrated in the paper.

2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


China Report ◽  
2021 ◽  
pp. 000944552110470
Author(s):  
Rudolf Fürst

Deepening globalisation and worldwide availability of free information and ideas raise concerns of the communist China’s political leadership about the stability of the regime and the sustainability of the state ideological orthodoxy. Therefore, the state’s tightening control of the public communication to curtail the domestic criticism and occasional public discontent is becoming framed and legitimised in terms of cultural security as a non-traditional security concern. This study argues that the restrictive impacts of the politicisation of culture in the centralised agenda of President Xi Jinping reinvigorate China’s anti-Western narratives and attitudes. The research focuses on the state’s cultural security-related and applicable strategy in the political and institutional agenda and media. Moreover, the study also traces the state cultural security policy in the field of the civic and non-governmental sector, religious and ethnic minorities policy, literature, film and audiovisual sectors. The findings assess the concern that the intellectually anachronistic, self-restraining and internationally hostile policy devaluates China’s cultural potential and complexity.


2018 ◽  
Vol 82 (5) ◽  
pp. 1187-1210
Author(s):  
Marie-Lola Pascal ◽  
Michel Fonteilles ◽  
Véronique Tournis ◽  
Benoît Baptiste ◽  
Jean-Louis Robert ◽  
...  

ABSTRACTBa-rich and Si-rich phlogopites occur in the talc-bearing rocks of the La Creuse sulfide ore deposit in Beaujolais, France. They form a group of compositions completely separated from the common Al-rich phlogopites that occur in the surrounding talc-free metasiltites and metarhyolites, with higher Ba and Mg and lower Al contents. The Ba-rich phlogopites have a relatively narrow compositional range (0.24 to 0.80 Ba per formula unit, for 44 valencies) with high and constant Si (5.8 atoms per formula unit, apfu) and Mg + Fe (5.6 apfu), probably buffered by the presence of talc. Compared to low-Al phlogopites from talc-free rocks, the excess charge introduced by the BaK–1 substitution is compensated by interlayer vacancies. Such a high level of interlayer vacancy (0.56 pfu), related to the talc-producing metasomatic conditions, is essential for the stability of this special group of Ba-rich and Si-rich phlogopites.Single crystal X-ray diffraction analyses were performed. Ba-rich and Si-rich phlogopite is monoclinic, space group C2/m, (R = 5.31%) with a = 5.3185(5), b = 9.2136(9), c = 10.1349(11) Å and β = 100.131(11)°. The occupancies of Mg/Fe and K/Ba were refined exploring different vacancies. The solutions giving the best R factor (4.77%) and goodness-of-fit (1.06) are obtained with 15% < vacancy < 40% at the interlayer site.


2004 ◽  
Vol 16 (3) ◽  
pp. 263-274 ◽  
Author(s):  
Joshua Onome Imoniana

Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.


Author(s):  
Dmitry Dvoretsky ◽  
Natalia Kolesnikova ◽  
Oksana Makarkina ◽  
Kira Lagvilava

The mass introduction of information technologies in the activities of state structures has made it possible to transfer the efficiency of their functioning to a qualitatively new level. Unfortunately, as a means of action, they have characteristic vulnerabilities and can be used not only for good, but also for harm. For the state, as a guarantor of the stability of a civilized society, the issue of ensuring the security of information processing is particularly important. Despite the automation of many information processes, the most vulnerable link in the work of information systems remains a person. A person acts as an operator of information systems and a consumer of information. The entire service process depends on the competence of the operator and the quality of his perception. There are areas of government activity where the cost of error is particularly high. These include ensuring the life and health of citizens, protecting public order and the state system, and ensuring territorial integrity. The specifics of the spheres must be taken into account when ensuring the security of information. This study concerns official activities that are provided by paramilitary groups. Currently, there is a discrepancy in the level of competence of new personnel in the first months of service. The author traces the shortcomings of general and special professional qualities in the field of information security. The purpose of the study is to substantiate certain pedagogical means of forming cadets ' readiness to ensure information security. As forms of theoretical knowledge, we will use the traditional hypothesis and model, as well as functionally distinguishable judgments – problem, assumption, idea and principle. Empirical forms of knowledge will be observation (experimental method) and fixation of facts. To evaluate the effectiveness of the developed pedagogical tools, we use statistical methods: observation (documented and interrogated) and calculation of generalizing indicators. To formulate conclusions, we will use logical methods: building conclusions and argumentation. The approbation of certain pedagogical tools described in this article showed a significant positive trend in terms of competence in information security issues.


Sign in / Sign up

Export Citation Format

Share Document