scholarly journals Awareness about the Online Security Threat and Ways to Secure the Youths

2021 ◽  
Vol 3 (3) ◽  
pp. 133-148
Author(s):  
Yeshi Nidup
2019 ◽  
pp. 172-176
Author(s):  
Otegbulu M. I. ◽  
Ezeagu A. Agbo ◽  
Agbo Genevieve N.

Security is pre-requisite for the development of human beings and the society. It is a pre-condition for the survival, development and advancement of individuals and groups. The school is an organization that needs to have a planned safety rules and regulations to protect it components so that the culture of learning and teaching is enhanced. Security threat within the school environment could hamper the peaceful atmosphere in the school, and disrupt academic exercises and panic among the personnel in the school. The government, security agents, parents, school administrators and the community has a lot of role to play to make school environment safe and conducive. However, security gadgets and apparatus should be provided to nip these issues in the bud, as well as train the teaching and non-teaching staff on security issues.


2014 ◽  
Author(s):  
Surinder Paul Singh ◽  
Philip W Gibbs ◽  
Garl A Bultz

2021 ◽  
Vol 26 (4) ◽  
pp. 1-31
Author(s):  
Pruthvy Yellu ◽  
Landon Buell ◽  
Miguel Mark ◽  
Michel A. Kinsy ◽  
Dongpeng Xu ◽  
...  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.


Sign in / Sign up

Export Citation Format

Share Document