Enhanced Biometric Based Automated Teller Machine Authenticate Security System Using Low Power Microcontroller

2019 ◽  
Vol 16 (2) ◽  
pp. 759-763
Author(s):  
T. K. Thivakaran ◽  
D. Sasikumar

Information and communication technology achieved mass improvement on ATMs cyber-security but there is a strong need to strengthen all parts of operation. ATM skimmers are card readers that collect the data from magnetic card stripe that is attached to the real payment terminals; especially criminals can create cloned cards to steal money from the bank account. After these also we think that ATM is the safest place. But, nowadays in ATM, robbery happens easily by damaging the system for money. In this paper we bring an idea about biometric based system to enhance security. There is signal processing which alerts the police and gives information to bank.

2020 ◽  
Vol 10 (16) ◽  
pp. 5649 ◽  
Author(s):  
Bushra Canaan ◽  
Bruno Colicchio ◽  
Djaffar Ould Abdeslam

The importance of looking into microgrid security is getting more crucial due to the cyber vulnerabilities introduced by digitalization and the increasing dependency on information and communication technology (ICT) systems. Especially with a current academic unanimity on the incremental significance of the microgrid’s role in building the future smart grid, this article addresses the existing approaches attending to cyber-physical security in power systems from a microgrid-oriented perspective. First, we start with a brief descriptive review of the most commonly used terms in the latest relevant literature, followed by a comprehensive presentation of the recent efforts explored in a manner that helps the reader to choose the appropriate future research direction among several fields.


2018 ◽  
Vol 71 (5) ◽  
pp. 1025-1039 ◽  
Author(s):  
Odd Sveinung Hareide ◽  
Øyvind Jøsok ◽  
Mass Soldal Lund ◽  
Runar Ostnes ◽  
Kirsi Helkala

As technology continues to develop, information and communication technology and operational technology on board ships are increasingly being networked, and more frequently connected to the Internet. The introduction of cyber systems changes the work environment with the aim of decreasing the workload for the navigator, but at the same time introduces more complexity and vulnerabilities that in turn may alter the competencies needed to perform safe and efficient navigation. Contemporary examples of how cyber-attacks can distort situational awareness and interfere with operations are needed to enhance the navigator's competence through increased system awareness. This paper demonstrates some of the possible attack vectors that a cyber-attack can present to a ship, as well as discussing the plausibility and consequences of such attacks. In this study we provide a practical example to better understand how one can demystify cyber threats in order to enhance the navigators' competence.


2021 ◽  
Vol 19 (1) ◽  
pp. 70-94
Author(s):  
Ivo Juurvee ◽  
Uku Arold

Disruptive developments in the field of information and communication technology have enabled malicious actors to turn elements of the digital ecosystem into information weapons in hybrid conflict.  Estonia has tackled the new security realm with comprehensive national defence that is built upon understanding that the society itself is object of security and should provide appropriate safeguards and responses. Estonian conceptualisations of national cybersecurity, cyber psychological defence, strategic communications are elaborated in the light of actual seminal threat situations. Analysis of evolvement of the strategic documents guides the recommendations for even deeper blend of the technical cybersecurity culture with value-centric psychological defence and internationalisation of information security situational awareness and planning.


2021 ◽  
Vol 3 (2) ◽  
pp. 24-35
Author(s):  
Shofa Shofiah Hilabi

Teknologi Informasi dan Komunikasi digunakan saat ini akan memberikan manfaat dalam hal informasi pada pemerintahan. Pengelolaan pemerintahan saat ini sudah berbasis elektronik atau sering disebut E-Governance. E-Governance dapat berperan dalam proses perencanaan data geografis dalam batasan waktu, mengurangi partisipasi warga negara. POSDESKEL merupakan suatu aplikasi pemerintahan desa berbasis teknologi informasi. Kuliah Kerja Nyata (KKN) Kuliah Kerja Nyata (KKN) tahun 2020 bertemakan Profil Desa Berkelanjutan. Profil Desa Berkelanjutan sangat membantu instansi desa terkait pelaporan informasi mengenai berbagai bidang, seperti kesehatan, pendidikan, sumber daya manusia, dan lain – lain. Selama melaksanakan Kuliah Kerja Nyata (KKN) terdapat beberapa kendala yang dialami oleh mahasiswa antara lain, sulitnya perizinan, pengumpulan data, dan terbatasnya interaksi antara mahasiswa dan masyarakat. Metode yang digunakan dalam pelaksanaan Kuliah Kerja Nyata (KKN) tahun 2020 adalah metode observasi. Hasil yang didapat dari Kuliah Kerja Nyata (KKN) adalah terkumpulnya informasi mengenai kelurahan Adiarsa Barat dalam berbagai bidang.   Kata kunci : Kuliah Kerja Nyata, Adiarsa Barat, Profil Desa Berkelanjutan  Information and communication technology used today will provide benefits in terms of information on government. Currently, government management is based on electronics or often called E-Governance. E-Governance can play a role in the geographic data planning process within time limits, reducing citizen participation. POSDESKEL is an information technology-based village government application. Real Work Lecture (RWL) in 2020 with the theme of Sustainable Village Profiles. Sustainable Village Profiles are very helpful for village agencies in reporting information on various fields, such as health, education, human resources, and others. During the implementation of the Real Work Lecture (RWL) there are several obstacles experienced by students, among others, difficulties in licensing, data collection, and limited interaction between students and the community. The method used in the implementation of Real Work Lecture (RWL) in 2020 is the observation method. The results obtained from the Real Work Lecture (RWL) are the collection of information about the West Adiarsa village in various fields.  Keywords: Real Work Lecture, West Adiarsa, Sustainable Village Profile


Author(s):  
DAMJAN ŠTRUCL

Povzetek Terminologija je temeljna za razumevanje in obravnavanje neke tematike, še posebej, če ta tematika vpliva na reševanje varnostnih vprašanj v sodobnem varnostnem okolju, ki ni omejeno le na fizične meje in posamične države. Svet je s kibernetskim prostorom in informacijskim okoljem postal soodvisen ter medsebojno povezan s pomočjo informacijsko-komunikacijske tehnologije, zato so se pojavili novi termini, ki jih posamezniki, strokovna javnost, države in mednarodna skupnost razumejo drugače in se posledično tudi različno odzivajo, kar vpliva na varnost vseh sodelujočih. V prispevku želimo prikazati, da urejanje varnosti v kibernetskem prostoru brez enotne in strokovne terminologije ni dovolj, še posebej, če upoštevamo definicijo kibernetske varnosti. Ključne besede Terminologija, zaščita informacij, informacijska varnost, kibernetska varnost, kibernetska obramba. Abstract Terminology is fundamental to understanding and addressing a particular topic, especially if that topic has implications for addressing security issues in a modern security environment that is not limited to physical borders and individual countries. With the existence of cyberspace and information environment, the world has through the use of information and communication technology become interdependent and interconnected. As a result, new terms have emerged which are understood differently by individuals, the professional public, countries and the international community. Consequently, their responses differ, also affecting the security of all the involved entities. The aim of this article is to show that the regulation of security in cyberspace without uniform and professional terminology is not enough, especially if we consider the definition of cyber security. Key words Terminology, information assurance, information security, cyber security, cyber defence.


2012 ◽  
Vol 43 (4) ◽  
pp. 222-231 ◽  
Author(s):  
Nina Hansen ◽  
Tom Postmes ◽  
Nikita van der Vinne ◽  
Wendy van Thiel

This paper studies whether and how information and communication technology (ICT) changes self-construal and cultural values in a developing country. Ethiopian children were given laptops in the context of an ICT for development scheme. We compared children who used laptops (n = 69) with a control group without laptops (n = 76) and a second control group of children whose laptop had broken down (n = 24). Results confirmed that after 1 year of laptop usage, the children’s self-concept had become more independent and children endorsed individualist values more strongly. Interestingly, the impact of laptop usage on cultural values was mediated by self-construal (moderated mediation). Importantly, modernization did not “crowd out” traditional culture: ICT usage was not associated with a reduction in traditional expressions (interdependent self-construal, collectivist values). Theoretical and practical implications are discussed.


Sign in / Sign up

Export Citation Format

Share Document