scholarly journals Optimization Of Server Computer Security Using The Port Knoking Method On Ubuntu Server 12.04 LTS

2020 ◽  
Vol 5 (1) ◽  
pp. 26-34
Author(s):  
Amsar

Each online based server cannot be fully secured from various external attacks that attempt to infiltrate the system. Server security is the most important part for administrators against intruders who carry out their actions in attacking computer systems, there are several attack methods that can be done, method like brute-force are usually deployed to attack computer security systems that are connected to the internet. In this study to overcome attacks penetrating into the server system, the port knoking method can be used as a step taken to prevent attacks that enter the system or also known as the authentication method. By using this port knoking method the administrator can control the system to be more secure from brute-force attackers addressed in certain parts such as SSH server and FTP server. So that users can perform services connected with SSH server and FTP server services, knocked functions as a port knocking daemon that is ready to receive port knocking authentication from the user then rewrites the firewall, so that the connected services can be secured from attacks that try to infiltrate the server system. Furthermore, Ip tables and uncomplicated firewalls function to build firewalls that will deny connections to the SSH server and FTP server services. So when a foreign user accesses SSH and FPT without first doing the autendiction, the firewall will reject the connection, but if the user passes the port knocking autendiction stage via sending SYN packets to the port provided in the knocking daemon port, then the knocking daemon port is will rewrite the firewall so users can connect to the SSH server and FPT server services.

2019 ◽  
Vol 8 (3) ◽  
pp. 19-22
Author(s):  
K. Sailaja ◽  
M. Rohitha

Security is a million dollar issue for all computer systems. Every week there is news of another major breakin to a commercial or government system. Also it is well known that many governments are actively engaged in cyber-warfare, trying to break into the systems of other governments and other groups. The Internet of Things is increasingly changing into an omnipresent computing service, requiring vast volumes of knowledge storage and process. Unfortunately, due to the unique characteristics of resource constraints, self-organization and short range communication in IoT, it always resorts to the cloud for outsourced storage and computation. Security is one of the major challenges faced by cloud based IoT. The standard file protection technique relies on password based encryption schemes and they are vulnerable to brute force attacks. The reason is that, for a wrongly guessed key, the decryption process yields an invalid-looking plaintext message, confirming the invalidity of the key, while for the correct key it outputs a valid-looking plaintext message, confirming the correctness of the guessed key. Honey encryption helps to minimise this vulnerability. Hence, this paper proposed an extended Honey Encryption (XHE) scheme for enhancing the security of the cloud based IoT.


2015 ◽  
Vol 2015 ◽  
pp. 1-12
Author(s):  
Sergio Mauricio Martínez Monterrubio ◽  
Juan Frausto Solis ◽  
Raúl Monroy Borja

The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 315-328
Author(s):  
Vishal Patel ◽  
Pravin H. Bhathawala

Anti Virus are nasty software’s. It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on Anti Virus analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most Anti Virus programs are large and complex and one can’t possibly understand every detail. Educating the internet users about Anti Virus attack, as well as the implementation and proper application of anti-Anti Virus tools, are critical steps in protecting the identities of online consumers against Anti Virus attacks.


2021 ◽  
pp. 026461962110381
Author(s):  
Risa Nara ◽  
Yukie Sato ◽  
Yusuke Masuda ◽  
Masamitsu Misono ◽  
Koichi Tanida

The purpose of this study was to determine whether people with visual impairment in Japan are provided with useful information by their ophthalmologist while being notified of their disability, and what information is needed by these individuals upon being diagnosed. An analysis of the responses from 197 respondents revealed that only 30.45% had been provided information by their ophthalmologist upon being diagnosed, while 69.55% patients were not provided any information. When asked about the form of media they used to receive information, the most frequently used was the internet (16.68%). As web accessibility is not sufficient in Japan, making information media accessible to the visually impaired is a challenge. Finally, when asked about the type of information they would like to be provided, the most common answer was information about peer support. This suggests that ophthalmologists are expected to (1) understand the needs of the visually impaired and (2) provide information appropriately and promptly.


2021 ◽  
Vol 21 (1) ◽  
pp. 1
Author(s):  
Marfuah Marfuah ◽  
Alifia Rachma Diani ◽  
Chivalrind G Ayuntari

<p><em>The purpose of this study was to determine the effect of donations, restricted funds, organizational size, and age of the organization age on the voluntary disclosure of the foundation. All foundations in Indonesia are the population in this study. The sample of this research is foundations in Indonesia that submit financial reports via the internet between 2013-2019 and have complete data. Based on these criteria, 114 financial reports were obtained as the research sample. The results of this study prove that restricted funds and organizational size have a significant positive effect on voluntary disclosure, while the donations and age of the organization have no significant positive effect on voluntary disclosure. The implication of this research is that funders must consider the restricted funds and the size of the organization to assess the prospects of the foundation. In addition, the foundation must increase voluntary disclosure to be more transparent in providing information about its foundation. With transparency, the foundation will more easily get the trust to receive funds that are beneficial to the foundation's survival.</em></p>


2020 ◽  
Vol 26 (6) ◽  
pp. 747-761
Author(s):  
Łukasz Apiecionek ◽  
Jacek Czerniak ◽  
Dawid Ewald ◽  
Mateusz Biedziak

There is currently an era of Internet of Things in the computer systems, which consists in connecting all possible devices to the Internet in order to provide them with new functionalities and thus { to improve the user's life standard. One of such solutions could be Smart Home. The possibility of monitoring inner environment is required for such solutions. Such monitoring provides potential for e.g. better heating control. The authors of this paper propose some heating control method with Fuzzy Logic. The proposed method was tested in a special climate chamber. The authors provided conclusions at the end of the paper.


2021 ◽  
Vol 9 (2) ◽  
pp. 103-107
Author(s):  
Minda Septiani ◽  
Rizki Aulianita ◽  
Verra Sofica ◽  
Noor Hasan

Abstrak  - Website merupakan kumpulan halaman dalam suatu domain yang memuat tentang berbagai informasi agar dapat dibaca dan dilihat oleh pengguna internet. Dengan adanya website, banyak informasi yang dapat disebar luaskan agar sampai pada pengguna informasi. Dalam perkembangan teknologi saat ini, penyampaian informasi yang cepat dan tepat sangat dibutuhkan. Perusahaan lebih mudah menyebarluaskan informasi yang mereka jual kepada masyarakat luas. Dengan adanya internet, perusahaan lebih mudah untuk menyebar luaskan informasi sehingga masyarakat lebih mudah untuk menerimanya. Dengan adanya teknologi internet saat ini sangat memudahkan didalam bidang promosi. Website dibuat dengan tujuan agar mempermudahkan para pelanggan untuk melihat-lihat jenis dan tipe yang ada dengan keterangan yang sangat jelas. Dan juga, memudahkan pelanggan untuk memesan kusen tanpa harus datang langsung ke perusahaan untuk memesan. Seperti kusen yang sangat dibutuhkan dan banyak dicari oleh masyarakat untuk melengkapi bangunan atau rumah mereka. Kata Kunci : Sistem Informasi Penjualan, Website, Promosi, Kayu Kusen Abstract  - Website is a collection of pages in a domain that contains various information so that it can be read and viewed by internet users. With the website, a lot of information can be disseminated to reach information users. In today's technological developments, the delivery of information quickly and precisely is needed. It is easier for companies to disseminate the information they sell to the wider community. With the internet, it is easier for companies to disseminate information so that it is easier for people to receive it. With the internet technology today is very easy in the field of promotion. The website was created with the aim of making it easier for customers to see the types and types that exist with very clear information. And also, making it easier for customers to order frames without having to come directly to the company to order. Such as frames that are needed and much sought after by the community to complement their buildings or houses. Keywords: Sales Information System, Website, Promotion, Wood Frame


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
M. V. Danilchuk

The present research considers crowdsourcing as a method of linguistic experiment. The paper features an experiment with the following algorithm: 1) problem statement, 2) development, 3) and questionnaire testing. The paper includes recommendations on crowdsourcing project organization, as well as some issues of respondents’ motivation, questionnaire design, choice of crowdsourcing platform, data export, etc. The linguistic experiment made it possible to obtain data on the potential of the phonosemantic analysis in solving naming problems in marketing. The associations of the brand name designer matched those of the majority of the Internet pannellists. The experiment showed that crowdsourcing proves to be an available method within the network society. It gives an opportunity to receive objective data and demonstrates high research capabilities. The described procedure of the crowdsourcing project can be used in various linguistic experiments.


Sign in / Sign up

Export Citation Format

Share Document