scholarly journals Database protection model based on security system with full overlap

Radiotekhnika ◽  
2021 ◽  
pp. 88-105
Author(s):  
V.V. Vilihura ◽  
V.I. Yesin

Security is one of the most important characteristics of the quality of information systems in general and databases, as their main component, in particular. Therefore, the presence of an information protection system, as a complex of software, technical, cryptographic, organizational and other methods, means and measures that ensure the integrity, confidentiality, authenticity and availability of information in conditions of exposure to natural or artificial threats, is an integral feature of almost any modern information system and database. At the same time, in order to be able to verify the conclusions about the degree of security, it must be measured in some way. The paper considers a database security model based on a full overlap security model (a covered security system), which is traditionally considered the basis for a formal description of security systems. Thanks to expanding the Clements-Hoffman model by including a set of vulnerabilities (as a separately objectively existing category necessary to describe a weakness of an asset or control that can be exploited by one or more threats), which makes it possible to assess more adequately the likelihood of an unwanted incident (threat realization) in a two-factor model (in which one of the factors reflects the motivational component of the threat, and the second takes into account the existing vulnerabilities); a defined integral indicator of database security (as a value inverse to the total residual risk, the constituent components of which are represented in the form of the corresponding linguistic variables); the developed technique for assessing the main components of security barriers and the security of the database as a whole, based on the theory of fuzzy sets and risk, it becomes possible to use the developed model to conduct a quantitative assessment of the security of the analyzed database.

2020 ◽  
Vol 52 (4) ◽  
pp. 75-84
Author(s):  
MIKHAIL M. PUTYATO ◽  
◽  
ALEXANDER S. MAKARYAN ◽  
ALEXANDER N. CHERKASOV ◽  
IVAN G. GORIN ◽  
...  

The article deals with the analysis and modeling of an adaptive system for integrated security provision as an element of the infrastructure of the situation center. The constantly changing conditions of the information environment and the global information space dictate the possibility of automated or automatic "adaptation" of security systems to the requirements of modern software systems. The main tasks for organizing the integration of an integrated security system into the situation center system and determining the rules for interaction with functional blocks is the analysis and implementation of various formalized procedures for ensuring integrated security. An adaptive integrated security system is considered as an object that implements the ability to manage and quickly build a security model for a situation center, depending on the problem being solved, or preventing or eliminating an incident. The proposed approach is dictated not only by an increase in the functionality of modern technologies, but also by the requirements for the creation of adaptive integrated solutions that are scalable within the architecture to protect against various types of threats. The use of an integrated security system within the framework of the proposed approach will make it possible to promptly respond to incidents of both external and internal nature, which will allow timely neutralization of the consequences of their influence. An adaptive integrated security system as a common platform will provide timely monitoring, context and control capabilities in various situations. The development of such an integration platform will improve automation and improve the quality of information provided by information security products.


Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


1999 ◽  
Vol 39 (4) ◽  
pp. 103-111 ◽  
Author(s):  
Frank Obenaus ◽  
Karl-Heinz Rosenwinkel ◽  
Jens Alex ◽  
Ralf Tschepetzki ◽  
Ulrich Jumar

This report presents the main components of a system for the model-based control of aerobic biological wastewater treatment plants. The crucial component is a model which is linked to the actual processes via several interfaces and which contains a unit which can immediately follow up the current process state. The simulation calculation of the model is based on data which are yielded by on-line measuring devices. If the sensors should fail at times, there are available a number of alternative concepts, some of which are based on the calculations of artificial neural networks or linear methods.


2018 ◽  
Vol 24 (2) ◽  
pp. 67-76
Author(s):  
Sujadi Sujadi ◽  
Hasrul Abdi Hasibuan ◽  
Meta Rivani ◽  
Abdul Razak Purba

Fresh fruit bunches (FFB) consist of fruit be composed grade in few spikelet. Fruit at a spikelet can be distinguished into performed fruit namely internal fruit, middle fruit and outer fruit as soon as each section contain parthenocarpy fruits. This research was conducted for determine composition and content fatty acid of oil at internal fruit, middle, outer and parthenocarpy fruit from oil palm fruit. Samples of fruit came from 3 – 5 spikelet the central of FFB. Result showed that oil content of outer fruit (46.9 + 9.9)% trend higher be compared middle fruit (42.8 + 10.3)% and internal fruit (39.1 + 9.5)%. Parthenocarpy fruits have a low oil content (14.2 + 16.2)% except yellowish fruit trend high relatively oil content. The main components of fatty acid at outer fruit, middle and internal are palmitic acid, oleic, linoleic and stearic with mean value respectively (44.8 – 45.8)%, (37.6 – 38.0)%, (9.9 – 10.9)% and (4.6 – 4.8)%. Oil content at parthenocarpy fruit have amount main component of fatty acid with performed fruit but composition of palmitic acid (40.0 + 5.9)% and oleic (34.6 + 8.4)% lower while linoleic acid (16.9 + 8.5)% and linolenic (1.6 + 1.8)% higher be compared to performed fruit. Simalungun variety has the highest oil content in the part of fruit, with that PPKS 540 and La Mé respectively. PPKS 540 variety has the highest oleic acid content while PPKS 718 has the highest linoleic content.


Molecules ◽  
2021 ◽  
Vol 26 (15) ◽  
pp. 4393
Author(s):  
Cesar Auguste Badji ◽  
Jean Dorland ◽  
Lynda Kheloul ◽  
Dimitri Bréard ◽  
Pascal Richomme ◽  
...  

Essential oils of aromatic plants represent an alternative to classical pest control with synthetic chemicals. They are especially promising for the alternative control of stored product pest insects. Here, we tested behavioral and electrophysiological responses of the stored product pest Tribolium confusum, to the essential oil of a Brazilian indigenous plant, Varronia globosa, collected in the Caatinga ecosystem. We analyzed the essential oil by GC-MS, tested the effects of the entire oil and its major components on the behavior of individual beetles in a four-way olfactometer, and investigated responses to these stimuli in electroantennogram recordings (EAG). We could identify 25 constituents in the essential oil of V. globosa, with anethole, caryophyllene and spathulenole as main components. The oil and its main component anethole had repellent effects already at low doses, whereas caryophyllene had only a repellent effect at a high dose. In addition, the essential oil abolished the attractive effect of the T. confusum aggregation pheromone. EAG recordings revealed dose-dependent responses to the individual components and increasing responses to the blend and even more to the entire oil. Our study reveals the potential of anethole and the essential oil of V. globosa in the management of stored product pests.


1986 ◽  
Vol 71 ◽  
Author(s):  
I. Suni ◽  
M. Finetti ◽  
K. Grahn

AbstractA computer model based on the finite element method has been applied to evaluate the effect of the parasitic area between contact and diffusion edges on end resistance measurements in four terminal Kelvin resistor structures. The model is then applied to Al/Ti/n+ Si contacts and a value of contact resistivity of Qc = 1.8×10−7.Ωcm2 is derived. For comparison, the use of a self-aligned structure to avoid parasitic effects is presented and the first experimental results obtained on Al/Ti/n+Si and Al/CoSi2/n+Si contacts are shown and discussed.


2021 ◽  
Vol 1 ◽  
pp. 84-90
Author(s):  
Rustam Kh. Khamdamov ◽  
◽  
Komil F. Kerimov ◽  

Web applications are increasingly being used in activities such as reading news, paying bills, and shopping online. As these services grow, you can see an increase in the number and extent of attacks on them, such as: theft of personal information, bank data and other cases of cybercrime. All of the above is a consequence of the openness of information in the database. Web application security is highly dependent on database security. Client request data is usually retrieved by a set of requests that request the application user. If the data entered by the user is not scanned very carefully, you can collect a whole host of types of attacks that use web applications to create security threats to the database. Unfortunately, due to time constraints, web application programmers usually focus on the functionality of web applications, but only few worry about security. This article provides methods for detecting anomalies using a database firewall. The methods of penetration and types of hacks are investigated. A database firewall is proposed that can block known and unknown attacks on Web applications. This software can work in various ways depending on the configuration. There are almost no false positives, and the overhead of performance is relatively small. The developed database firewall is designed to protect against attacks on web application databases. It works as a proxy, which means that requests for SQL expressions received from the client will first be sent to the developed firewall, rather than to the database server itself. The firewall analyzes the request: requests that are considered strange are blocked by the firewall and an empty result is returned to the client.


Sign in / Sign up

Export Citation Format

Share Document