scholarly journals FIREWALL RULE CONFIGURATION TECHNIQUES MULTI-SERVICE SUPERCOMPUTER NETWORK

2020 ◽  
Vol 1 (6(75)) ◽  
pp. 26-36
Author(s):  
V.V. Bondarchuk

The article describes the Firewall settings rules for ensuring information security when transmitting data over the Internet of a multiservice supercomputer network. The relevance of three-level architecture is grounded. The logic of information flows, firewall settings is described, Certificate Services.

2021 ◽  
pp. 1-13
Author(s):  
Fernando Rebollar ◽  
Rocío Aldeco-Perez ◽  
Marco A. Ramos

The general population increasingly uses digital services, meaning services which are delivered over the internet or an electronic network, and events such as pandemics have accelerated the need of using new digital services. Governments have also increased their number of digital services, however, these digital services still lack of sufficient information security, particularly integrity. Blockchain uses cryptographic techniques that allow decentralization and increase the integrity of the information it handles, but it still has disadvantages in terms of efficiency, making it incapable of implementing some digital services where a high rate of transactions are required. In order to increase its efficient, a multi-layer proposal based on blockchain is presented. It has four layers, where each layer specializes in a different type of information and uses properties of public blockchain and private blockchain. An statistical analysis is performed and the proposal is modeled showing that it maintains and even increases the integrity of the information while preserving the efficiency of transactions. Besides, the proposal can be flexible and adapt to different types of digital services. It also considers that voluntary nodes participate in the decentralization of information making it more secure, verifiable, transparent and reliable.


Author(s):  
Sergey Volodenkov

Introduction. The author aims to analyze the phenomenon of information interference with national political processes in the conditions of the contemporary information society and the evolution of the Internet as a space of political communications. The article shows that the digital information intervention is relevant and at the same time, a complex multidimensional phenomenon of contemporary politics. In many respects, the potential of the digital interference phenomenon is closely related to the essential features of functioning and the transformation of the contemporary Internet, which has been actively used when changing political regimes in many countries. The problem of information security and sovereignty of the present state on the Internet is becoming one of the most urgent in the conditions of the rapid development of information and communication technologies. Methods and materials. The issues identified in the article are investigated using the methods of comparative, structural-functional and normative analysis, included observation, as well as the case-study method. The method of scientific forecasting and scripting techniques has allowed to form a scenario for the effective settlement of international conflicts in the field of information security. The empirical base of the study is reports of foreign experts, official materials of state authorities of the Russian Federation and foreign countries, reports of Freedom House international organization, official speeches and statements by the heads of state on the issues outlined in the work. Analysis. Countering external information expansion is becoming one of the most critical tasks of effective political governance at the state level to preserve the sovereignty of the national political communication space, including domestic segments of the Internet. The initiatives of states to form the sovereign national segments of the Internet space are, on the one hand, an attempt to protect their political systems from external influence and invasion, to ensure their own political stability, and on the other hand, they create risks for the democratic potential of the Internet. The article substantiates the thesis that the phenomenon of interference in elections in actual practice often becomes not so much an objective process as an instrument of information warfare, mass political propaganda and discrediting political opponents, a manipulative tool that can be actively used not only by authoritarian regimes with a low level of democratic development. Results. The study shows that differences in understanding and defining the essence of the Internet by various countries give rise to a significant potential for political conflicts on a global scale. This circumstance leads the author to the conclusion that it is necessary to form international institutions capable of preventing and regulating information conflicts in the Internet space, as well as reducing global political risks (including risks associated with potential interference in the electoral process of sovereign states). The implementation of this scenario will allow forming a collective responsibility in the functioning of the global Internet.


Author(s):  
Aditya Raj ◽  
Tushar Pahwa ◽  
Ashish Jain

CAPTCHAs are employed on websites to differentiate between human users and bot programs that indulge in spamming and other fraudulent activities. With the advent and advancement of sophisticated computer programs to break CAPTCHAs, it has become imperative to continuously evolve the CAPTCHA schemes in order to keep the Internet network and website free of congestion and spam-bots. In light of these developments concerning information security, in this chapter, the authors introduce the novel concept of Scrambled CAPTCHA, which is a combination of OCR-based and Picture CAPTCHAs and exploits an inherent characteristic of human vision and perception. They also introduce Hindi CAPTCHA, developed in Hindi language (Devanagari script). This CAPTCHA will typically address spamming on Indian websites. It also contributes to the digitalization of books written in this script. The authors also discuss the features and security aspects of these schemes in detail, which, to the best their knowledge, had not been implemented earlier.


Cyber Crime ◽  
2013 ◽  
pp. 1-13
Author(s):  
Tejaswini Herath ◽  
H. Raghav Rao ◽  
Shambhu Upadhyaya

It is estimated that over 1 billion people now have access to the Internet. This unprecedented access and use of Internet by individuals around the world, however, is accompanied by malicious and mischievous activities online. With the traditional crimes such as fraud, identity theft, and harassment now being committed with the use of the Internet, and networked home computers being exploited to carry out attacks such as denial of service, spamming, phishing and virus/worm propagation, it has become important to investigate security and privacy issues as they pertain to individual Internet users. To date very little is known about what characteristics of internet users affect their computing and on-line behaviors as they relate to security online. While some attention has been paid to understand the security issues affecting corporations, research investigating security issues as they relate to home users is still in infancy. Drawing from disciplines such as criminology, sociology, consumer fraud, and information security, this study seeks to find the role of computing skills and computer training, social influence, and gender on person’s vulnerability to Internet crimes. Our findings are significant and shed light in this important area of Internet crime contributing to the information security literature.


2011 ◽  
pp. 1393-1399
Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of information technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructures and technologies provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as of summer 2004, 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet, because it would be a waste of resource. However, the Internet is an open environment; therefore, protecting data flowing on the Internet from attacks is a pressing e-government issue. All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO’04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang, Feng, Lai, & Yu, 2004). From the last decade, steganology—the technique for digitally hiding and detecting information – is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security.


Author(s):  
Tejaswini Herath

It is estimated that over 1 billion people now have access to the Internet. This unprecedented access and use of Internet by individuals around the world, however, is accompanied by malicious and mischievous activities online. With the traditional crimes such as fraud, identity theft, and harassment now being committed with the use of the Internet, and networked home computers being exploited to carry out attacks such as denial of service, spamming, phishing and virus/worm propagation, it has become important to investigate security and privacy issues as they pertain to individual Internet users. To date very little is known about what characteristics of internet users affect their computing and on-line behaviors as they relate to security online. While some attention has been paid to understand the security issues affecting corporations, research investigating security issues as they relate to home users is still in infancy. Drawing from disciplines such as criminology, sociology, consumer fraud, and information security, this study seeks to find the role of computing skills and computer training, social influence, and gender on person’s vulnerability to Internet crimes. Our findings are significant and shed light in this important area of Internet crime contributing to the information security literature.


2013 ◽  
Vol 4 (2) ◽  
pp. 9-18
Author(s):  
Mohd Faiz Hilmi ◽  
Shahrier Pawanchik ◽  
Yanti Mustapha ◽  
Hafizi Muhamad Ali

The advancement of information technology has changed the education landscape. The process of teaching is no longer the same. Information technology has made e-learning possible and available on a large scale. The main component of an e-learning is a learning management system (LMS). LMS has been widely used and are accessible through the Internet. By connected and accessed to the Internet, LMS are exposed to various threats. Proper understanding of these threats combined with strategy and best practices countermeasures will ensure a safe learning environment. Therefore this study will look into the information security aspect of LMS. There are two main purpose of this study. First, this study provides a review of information security in e-learning environments and explains the important of information security. Confidentiality, integrity and availability are considered to be the primary pillars of information security. In addition to these pillars, the International Information Systems Security Certification Consortium introduced a common body of knowledge (CBK) comprised of ten domains relating to specific information security topics. These domains are the foundation of security practices for those involved in information security. In this article, each of these is explained within an e-learning context. It is recommended that institutions employing e-learning adhere to these domains. By applying the principles and practices associated with each domain, e-learning institutions should be able to provide an e-learning system with high confidentiality, integrity and availability. The second purpose of this study is to understand student perception of an information security perspective of an e-learning management system. To achieve this purpose, a survey was conducted targeted at undergraduate students in a distance learning program. 497 students responded to a survey questionnaires. Apart from demographics information, the survey asked the respondent to rate six statements related to how they perceived security of the learning management system which they are currently using. All six statements are rated using a five point Likert scale anchored at 1 (Not at all) to 5 (Very much). Frequencies analysis was conducted to show the profile of the respondent. Overall, respondent has strong positive perceptions towards security of their LMS. This study provides an overall picture of information security elements of a learning management system. It can serve as an introduction which help LMS administrator to understand the issues and possibilities related to the safety of LMS.


Author(s):  
W. Baker ◽  
G. Smith ◽  
K. Watson

Collaboration between supply chain partners, facilitated by integration of information flows, has created more efficient and effective networks. However, the benefits of interconnectivity are not gained without risk. Though essential to support collaboration, increased use of information technology has removed internal and external protective barriers around an organization’s assets and processes. Thus, supply chains are better able to satisfy the needs of customers while more vulnerable to an array of IT-specific risks. This chapter identifies the sources of IT threats in the supply chain, categorizes those threats, and validates them by means of a survey of 188 companies representing a range of supply chain functions. Analysis suggests that supply chain risk is affected by IT threats, and therefore the benefits of collaboration facilitated by IT integration must exceed the increase in risk due to IT security threats.


Sign in / Sign up

Export Citation Format

Share Document