scholarly journals Versioning Catcher Software (VCS) untuk mendeteksi Sensitive Information File Versioning pada Linux Server

AITI ◽  
2021 ◽  
Vol 18 (1) ◽  
pp. 14-33
Author(s):  
Rhenaldo Delfi Nugraha ◽  
Dian Widiyanto Chandra

Abstrak Website merupakan media yang sangat populer untuk menemukan informasi. Membangun sebuah website diperlukan banyak sekali komponen file yang nantinya disimpan di dalam server. Untuk meminimalisir terjadinya peretasan website, diperlukan keamanan dari sisi sistem dan sisi pengguna. Berdasarkan TOP 10 OWASP, salah satu kerentanan yang biasa muncul adalah bocornya informasi sensitif akibat dari file versioning yang berada dalam server. Demi meminimalisir terjadinya kebocoran informasi sensitif dari kerentanan tersebut, maka penulis membuat program Versioning Catcher Software (VCS) yang berfungsi untuk mendeteksi keberadaan file versioning tersebut. Tujuan dilakukannya penelitian ini adalah untuk melindungi dan mencegah bocornya informasi sensitif di server. Hasil pembahasan dari penelitian ini dapat digunakan untuk meminimalisir terjadinya peretasan server akibat dari file versioning berisi informasi sensitif yang tidak segera ditangani.

2016 ◽  
Vol 5 (3) ◽  
pp. 1
Author(s):  
PRASAD KAKI LEELA ◽  
ANUSHA P ◽  
JYOTHI G ◽  
DILEEPKUMAR K ◽  
◽  
...  

HortScience ◽  
1998 ◽  
Vol 33 (3) ◽  
pp. 552e-552
Author(s):  
James L. Green

In 1997, the ASHS Board of Directors established ASHS HortBase as a Standing Committee of the Society. The ASHS HortBase Committee, a six-member Standing Committee and Chair, is charged to implement and maintain ASHS HortBase. The members of the ASHS HortBase Committee will be chair and chair-elect of the three HortBase Task Forces: 1) Finance and Marketing; 2) Standards—authoring, reviewing, and publishing; and 3) Technology. ASHS HortBase is a dispersed, dynamic horticultural information system (network) on the WWW comprised of peer—reviewed, concise, interlinked information modules to meet the information needs of instructors and students, gardeners and growers. A strong advantage and distinguishing characteristic of ASHS HortBase is our dynamic pool of potential authors, reviewers, and users (ASHS Extension, Industry, and Teaching membership) to continually evolve and update the peer-reviewed information in HortBase. We have the scholastic international standing to provide peer review and validation of the information and to recognition to the authors, coupled with the marketing to stimulate wide use of their information modules. ASHS HortBase is a dispersed system (dispersed development and server costs). The “dispersed cost” for information file development and updating and delivery on the respective authors' dispersed servers disperses the major costs of the HortBase information system. Additional information on ASHS HortBase and the papers presented at the 4-h Colloquium on HortBase at ASHS-97 can be found at http://[email protected] or contact me ([email protected], phone 541.737.5452, fax 541.737.3479).


2018 ◽  
Author(s):  
Abby Rudolph ◽  
April Young ◽  
Jennifer Havens

BACKGROUND Geographic momentary assessments (GMA) collect real-time behavioral data in one’s natural environment using a smartphone and could potentially increase the ecological validity of behavioral data. Several studies have evaluated the feasibility and acceptability of GMA among persons who use drugs (PWUD) and men who have sex with men (MSM), but fewer have discussed privacy, confidentiality, and safety concerns, particularly when illegal or stigmatized behavioral data were collected. OBJECTIVE This study explores perceptions regarding privacy, confidentiality, and safety of GMA research among PWUD and MSM recruited in three different settings (rural Appalachia, a mid-sized city in the South, and a mid-Atlantic city). METHODS Between November 2014 and April 2017 we recruited 35 PWUD from rural Appalachian Kentucky (N=20) and Baltimore, Maryland (N=15), and 20 MSM from Lexington, Kentucky to complete semi-structured qualitative interviews. Through thematic analyses, we identified and compared privacy, confidentiality, and safety concerns by demographic characteristics, risk behaviors, and setting. RESULTS Privacy, confidentiality, and safety concerns varied by setting, age, smartphone ownership, use of illegal drugs, and history of drug-related arrests. Among those who used drugs, participants reported concerns with being tracked and burden associated with carrying and safeguarding study phones and responding to survey prompts. Privacy and confidentiality concerns were noted in each setting, but tracking concerns were greatest among Baltimore participants and led many to feel that they (or others) would be unwilling to participate or comply with study procedures. While locations considered to be sensitive varied by setting, participants in all settings said they would take measures to prevent sensitive information from being collected (i.e. intentionally disable devices, leave phones at home, alter response times). CONCLUSIONS Privacy, confidentiality, and safety concerns may limit the accuracy of risk location information, study compliance, and participation. As concerns were often greatest among those engaging in illegal behaviors and with the highest risk behaviors, selection bias and non-response bias could negatively influence the representativeness and validity of study findings.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.


Author(s):  
Cédric du Mouza ◽  
Elisabeth Métais ◽  
Nadira Lammari ◽  
Jacky Akoka ◽  
Tatiana Aubonnet ◽  
...  

2021 ◽  
Vol 27 (1) ◽  
pp. 146045822098003
Author(s):  
Tania Moerenhout ◽  
Ignaas Devisch ◽  
Laetitia Cooreman ◽  
Jodie Bernaerdt ◽  
An De Sutter ◽  
...  

Patient access to electronic health records gives rise to ethical questions related to the patient-doctor-computer relationship. Our study aims to examine patients’ moral attitudes toward a shared EHR, with a focus on autonomy, information access, and responsibility. A de novo self-administered questionnaire containing three vignettes and 15 statements was distributed among patients in four different settings. A total of 1688 valid questionnaires were collected. Patients’ mean age was 51 years, 61% was female, 50% had a higher degree (college or university), and almost 50% suffered from a chronic illness. Respondents were hesitant to hide sensitive information electronically from their care providers. They also strongly believed hiding information could negatively affect the quality of care provided. Participants preferred to be informed about negative test results in a face-to-face conversation, or would have every patient decide individually how they want to receive results. Patients generally had little experience using patient portal systems and expressed a need for more information on EHRs in this survey. They tended to be hesitant to take up control over their medical data in the EHR and deemed patients share a responsibility for the accuracy of information in their record.


Sign in / Sign up

Export Citation Format

Share Document