scholarly journals SAFEST: Secure Actions for FTP Environment with Smart Token

10.29007/5945 ◽  
2019 ◽  
Author(s):  
Tarek Sobh ◽  
Awad Khalil

Nowadays, with the wide applications of distributed systems, web-based applications, and communications systems over the Internet for carrying data between users such as terminal client and computer/server or communications between different devices using a computer network, network security has become crucial requirement to ensure authentic received data during transmission. Authentication and encryption are basic procedures to ensure secure communications over a public network due to tamper-resistance and convenience in dealing with a password file. Most of the used protocols; HTTP, FTP, and SMTP of the Internet applications use text stream that is more and more vulnerable to attacks. Encryption represents the main security for the most computer applications.This work proposes enhanced secure actions for transferring data using FTP protocol by using a smart token. A smart token has the capabilities of the smart card, but more secured beside some interesting operations. A practical and secure user scheme, based on a smart token device, is proposed. A Secure Platform has been developed using implemented APIs and PKCS#11 as RSA standard interface. The proposed API is called SAFEST (Secure Actions for FTP Environment with Smart Token). SAFEST API wraps a standard protocol for implementing the communication between a token and the application using it. This API is a platform independent, scalable to support more functionality, optimizing token usage and adding more security for accessing token objects. The smart token can process the cryptographic key operations on its own rather than on the host computer, which supports high-level platform independence. In addition, through the proposed SAFEST API, standard interfacing to such token devices from any vendor can be implemented through using PKCS#11 interfaces, developed by RSA labs.

KOMTEKINFO ◽  
2021 ◽  
pp. 169-175
Author(s):  
Prayogi Wicaksana ◽  
Febri Hadi ◽  
Aulia Fitrul Hadi

One of the ways to maintain and improve the quality of service and security on the network of an agency of the Barangin Sub-District Office, Sawahlunto City (Central) is to add a VPN feature. Administrators who always monitor the flow of traffic by accessing routers and access points to find out network conditions. There are times when the Administrator is on a public network, he or she cannot access routers and access point devices because the Public IP obtained is Dynamic (random). To solve this problem, it is done through the Network Development Life Cycle (NDLC) method by combining the L2TP and IPsec VPN protocol systems on Mikrotik. A Virtual Private Network (VPN) is a private and secure network using a public network such as the internet. One of the bases for securing VPN technology is Internet Protocol Security (IPSec). IPSec is a protocol used to secure datagram transmission on TCP/IP-based networks. This study aims to design and implement a VPN network system by utilizing a public network, where this system provides advanced security enhancements on the internet network using IPSec. The information/data sent will be confidential with an automatic encryption method through the L2TP tunnel method from the server to the branch/client computer and vice versa. The VPN is implemented using a layer 2 (L2TP) tunneling protocol using two Mikrotik routers. There are few changes to the computer network configuration to minimize costs and implementation time. Tests are carried out to implement security on the network using the command prompt, where the admin observes packet loss and delay parameters to determine the increase in security quality on the network.


2011 ◽  
Vol 4 (4) ◽  
pp. 403-421 ◽  
Author(s):  
Molly Yanity ◽  
Aimee C. Edmondson

Coverage of the recruitment of high school athletes has exploded in the last decade as the advent of the Internet turned a once-obscure type of coverage into a multimillion-dollar industry. The demand for information about college football recruits has led to new ethical challenges for Web-based publications. This survey of sport media identifies some of the ethical challenges associated with such coverage and proposes a code of ethics for Web-based media outlets. Media covering high school recruiting can use these guidelines to gain and maintain credibility, to uphold a high level of ethics, and to avoid restrictions or rules mandated by an outside source in a specialized beat where high school students are the primary subjects.


Author(s):  
Kemal Altinkemer ◽  
Kerem Tomak

The study divides the Internet Economy into four layers. The first layer consists of the telecommunications companies, Internet Service Providers, Internet backbone carriers, local access companies and manufacturers of end-user networking equipment. In the second layer, Internet Applications Infrastructure involves software products and services necessary to facilitate Web transactions and transaction intermediaries. In addition to the software products that help facilitate Web transactions, this layer of the Internet Economy includes the consultants and service companies that design, build and maintain all types of Web sites, from portals to full e-commerce sites. The third layer, called the Internet Intermediary Indicator, consists of businesses that do not generate transaction-related revenues in the same way as the companies in other layers. There is a distinct type of company that operates in layer three, one that is predominantly an Internet pure-play. While not directly generating revenues from transactions, their Web-based business generates revenues through advertising, membership subscription fees and commissions. Many of the layer three companies are purely Web content providers, while others are market makers or market intermediaries. Finally, the companies that are included in layer four are only those companies that are conducting Web-based commerce transactions (Barua and Whinston, 2000).


Author(s):  
Febrian Reza Hermawan ◽  
Maukar Maukar

Layanan urun dana atau lebih dikenal dengan istilah equity crowdfunding adalah salah satu mekanisme pengumpulan dana yang saat ini mulai banyak dilakukan di Indonesia.Equity Crowdfunding merupakan alternatif pengumpulan dana untuk suatu project yang bersifat profit maupun non profit. Equity Crowdfunding banyak diminati saat ini disebabkan oleh faktor-faktor pendukungnya, yaitu pemerataan Internet yang sudah banyak meluas hingga ke industri-industri kecil dan menengah dan juga teknologi komputer yang berkembang begitu pesat sekali. Blockchain adalah salah satu teknologi komputer yang saat ini juga sedang banyak diterapkan diberbagai negara temasuk Indonesia. Teknologi ini adalah salah satu teknologi yang merupakan pemecah permasalahan pencatatan transaksi dan juga memilikitingkat kepercayaan yang cukup tinggi karena konsepnya yang menggunakan konsep decentralisasi yang bisa diartikan tidak ada pihak yang secara khusus mengelola data karena datanya disimpan diberbagai tempat yang ada pada jaringan komputer. Konsep ini merupakan konsep yang dapat dikatakan aman karena keterbukaan merupakan kunci utama dari adanya konsep ini sehingga tidak ada pihak-pihak yang dapat memanipulasi data yang berjalan. Kepercayaan merupakan faktor penting dalam menerapkan konsep Equity Crowdfunding ini karena layanan ini harus memastikan keabsahan pihak yang terlibat yaitu Investor dan Perusahaan sehingga teknologi Blockchain ini dapat dipadukan dengan Equity Crowdfunding. Crowdfunding services, or better known as equity crowdfunding, is a fundraising mechanism that is currently being implemented in Indonesia. Equity Crowdfunding is an alternative to raising funds for a project that is profit or non-profit. Equity crowdfunding is in great demand today due to its supporting factors, namely the distribution of the Internet which has spread to small and medium-sized industries as well as computer technology which is developing very rapidly. Blockchain is a computer technology that is currently being widely applied in various countries including Indonesia. This technology is a technology that solves the problem of recording transactions and also has a high level of trust because the concept uses the concept of decentralization, which means that no party specifically manages data because the data is stored in various places on the computer network. This concept is a concept that can be said to be safe because openness is the main key to this concept so that no party can manipulate the running data. Trust is an important factor in implementing the Equity Crowdfunding concept because this service must ensure the validity of the parties involved, namely Investors and Companies so that Blockchain technology can be combined with Equity Crowdfunding.


Sexual Health ◽  
2009 ◽  
Vol 6 (3) ◽  
pp. 258 ◽  
Author(s):  
Veronique Verhoeven ◽  
Marc Baay ◽  
Pieter Baay

A website with evidence-based information on human papillomavirus (HPV) has been developed at the University of Antwerp, Belgium. Visitors were asked to fill in a web-based form, including the State-Trait Anxiety Inventory (STAI), to obtain information on their profile. During the study period, 232 of 3638 (6.4%) visitors filled in the form. In our study, people looking for HPV information on the internet showed high anxiety levels. Three determinants contributed to the STAI score: a previous HPV-test, young age, and not feeling reassured by the website’s content. It is warranted that physicians counsel their patients on HPV-related issues in the context of cervical cancer screening.


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Raid Daoud ◽  
Yaareb Al-Khashab

The internet service is provided by a given number of servers located in the main node of internet service provider (ISP). In some cases; the overload problem was occurred because a demand on a given website goes to very high level. In this paper, a fuzzy logic control (FLC) has proposed to distribute the load into the internet servers by a smart and flexible manner. Three effected parameters are tacked into account as input for FLC: link capacity which has three linguistic variables with Gaussian membership function (MF): (small, medium and big), traffic density with linguistic variables (low, normal and high) and channel latency with linguistic variables (empty, half and full); with one output which is the share server status (single, simple and share). The proposed work has been simulated by using MATLAB 2016a, by building a structure in the Fuzzy toolbox. The results were fixed by two manners: the graphical curves and the numerical tables, the surface response was smoothly changed and translates the well-fixed control system. The numerical results of the control system satisfy the idea of the smart rout for the incoming traffics from the users to internet servers. So, the response of the proposed system for the share of server ratio is 0.122, when the input parameter in the smallest levels; and the ratio is 0.879 when the input parameters are in highest level. The smart work and flexible use for the FLC is the main success solution for most of today systems control.


2020 ◽  
Vol 2 (2) ◽  
pp. 113-127
Author(s):  
Nova Indrayana Yusman

Yamaha Vixion Club Bandung (YVCB) was formed on July 7, 2007 in the city of Bandung, as a place of friendship between Yamaha Vixion motorcyclists. In its organizational structure, YVCB has a Human Resource Development (HRD) division. Until now, there are more than 800 Yamaha Vixion Club Bandung members. This software is made to facilitate the work of the Yamaha Vixion Club Bandung HRD Division in processing member data. Created using Microsoft Webmatrix as an editor with the PHP programming language. The database uses MySQL with PHPMyAdmin as the software. The method used in making this software is prototyping so that between developers and customers can understand each other what the customer wants. The purpose of making web-based member data management software is that in terms of managing member data it can be done anytime and anywhere by just accessing the internet. In the use of the program, the author chose to use PHP, because PHP is the best and easiest to use in website programming language. Based on the last paragraph, the author intends to make aplication based computerized attendance so that become effective and efficient in terms of time.


Author(s):  
Muchammad Ismail Hamzah

In accordance with the technological advances of web-based information delivery via the internet has more value, because the information can be delivered easily, quickly,  spacious and interactive. Because this way, information is simply inserted into the web and within seconds the information can be accessed globally.  Submission of this information has not been used in Ngebruk Islamic Junior High School, Sumberpucung District, Malang Regency. Submission of the information in these schools still use manual way, such as by mail, bulletin boards, or orally. Surely this way less effective and efficient, since it requires a lot of expenses such as the purchase of paper, printing machine and maintenance, ink, and its scope was limited to the scope of the school.To reduce the above problems, the delivery of information in this school need to use web media created with the PHP programming language and MySQL. PHP is a programming language that is used to allow users to process information on the web, while MySQL is the software used to store the information on the web. Once the web is run online, the school entered information to the web, can be accessed via intenet by anyone without the limited space and time


Public Voices ◽  
2017 ◽  
Vol 5 (3) ◽  
pp. 3
Author(s):  
Mark Peterson

"Distance education" at the college level is well over a century old.  It has served the needs of a numerically large, but proportionately small population of learners who have eschewed the campus classroom.  These correspondence school enrollees, educational TV watchers, and audiocassette listeners have had only modest impact on the structure, mission, and strategy of the institutions serving them.  But that is now changing, and changing very dramatically.  The advent of the Internet, interactive television technology, and web-based instructional software, coupled with administrative and political perceptions of educational reformation and fiscal efficiency, may be causing nothing less than a revolution in higher education.  By applying a feminist model of assessment called "unthinking technology," that is to say, exploring the potential, but unthought of socio-political aspects of this technological revolution, this paper raises significant questions about the security of the traditional academic enterprise.  "The Politics of Distance Education" urges a pro-active embrace of these technologies by the academy in order to enable a legitimate "competency for grievance" so that the protection of the validity of higher education, and legitimacy of the academic profession can be ethically defended and publicly respected, rather than being viewed as mulish resistance to the inevitable.


Sign in / Sign up

Export Citation Format

Share Document