scholarly journals Misconfiguration in Firewalls and Network Access Controls: Literature Review

2021 ◽  
Vol 13 (11) ◽  
pp. 283
Author(s):  
Michael Alicea ◽  
Izzat Alsmadi

Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.

2021 ◽  
Author(s):  
Helen Cheung

The intent of this thesis research is to develop a concept/methodology to advance technologies for controls of network accesses to the industrial processes of safety/operation-critical and to contribute to the nuclear process control modernization with improved nuclear operation security and consequently increased nuclear safety and cost savings. This thesis is focused on the security-integrated nuclear process network-access controls for modernizing nuclear operations. This thesis research commenced with assessments of the current states of nuclear processes in the live nuclear generating stations and identified improvements on the current nuclear practices and security concerns of using the network-based intelligent features of modern process controls for nuclear operations. This thesis has created SNP - Security-integrated Nuclear Process, OBAC - Operation Based Access Control, NOAA - Nuclear Operation Access Authentication, CSM - Cost Savings Model, etc. as the fundamental developments for contributions to the nuclear operations modernization with improved operation security and subsequently increased nuclear safety and cost savings in daily nuclear operations. The SNP is to transform the current nuclear practices into network-based nuclear operations that include equipment performance monitoring, nuclear data processing, nuclear equipment control and maintenance. The OBAC is an operation-based access control built upon the core nuclear operations and facilitates the security and quality controls of network accesses to nuclear operations. The NOAA is to provide user security authentication for access to nuclear operation network, which is composed of APP for access pre-access authentication and AQP for access qualification authentication. The CSM is designed for evaluations of the SNP and associated designs in terms of cost savings opportunity. The feasibility and practicality of these new designs are illustrated in the thesis, by analytical and numerical methods. The significance of these new designs is tremendous, resulting in potentially significant cost savings in daily nuclear generation, in addition with increased nuclear operation network security and subsequently the nuclear safety that is priceless.


2014 ◽  
Vol 940 ◽  
pp. 465-468
Author(s):  
Yu Wang ◽  
Yu Duan

This research proposes network access control model based on the trusted label. The model combines the admission access control of network device and the transmission access control of data flow effective, and uses the trusted computing technology to ensure the credibility of the generated label, and adopts the access control based on the security domain to locate the granularity of access control to every packets, reduces the probability of successful attack to the network based on the information flow, thereby improving the security control of the network.


2021 ◽  
Author(s):  
Helen Cheung

The intent of this thesis research is to develop a concept/methodology to advance technologies for controls of network accesses to the industrial processes of safety/operation-critical and to contribute to the nuclear process control modernization with improved nuclear operation security and consequently increased nuclear safety and cost savings. This thesis is focused on the security-integrated nuclear process network-access controls for modernizing nuclear operations. This thesis research commenced with assessments of the current states of nuclear processes in the live nuclear generating stations and identified improvements on the current nuclear practices and security concerns of using the network-based intelligent features of modern process controls for nuclear operations. This thesis has created SNP - Security-integrated Nuclear Process, OBAC - Operation Based Access Control, NOAA - Nuclear Operation Access Authentication, CSM - Cost Savings Model, etc. as the fundamental developments for contributions to the nuclear operations modernization with improved operation security and subsequently increased nuclear safety and cost savings in daily nuclear operations. The SNP is to transform the current nuclear practices into network-based nuclear operations that include equipment performance monitoring, nuclear data processing, nuclear equipment control and maintenance. The OBAC is an operation-based access control built upon the core nuclear operations and facilitates the security and quality controls of network accesses to nuclear operations. The NOAA is to provide user security authentication for access to nuclear operation network, which is composed of APP for access pre-access authentication and AQP for access qualification authentication. The CSM is designed for evaluations of the SNP and associated designs in terms of cost savings opportunity. The feasibility and practicality of these new designs are illustrated in the thesis, by analytical and numerical methods. The significance of these new designs is tremendous, resulting in potentially significant cost savings in daily nuclear generation, in addition with increased nuclear operation network security and subsequently the nuclear safety that is priceless.


2019 ◽  
Vol 21 (3) ◽  
pp. 214-222
Author(s):  
Moh. Idris

Abstract :  The term BYOD (Bring Your Own Device) refers to the use of employees' personal devices (for example smartphones, tablets, laptops, netbooks) to do their work and manage corporate data from anywhere at any time. BYOD has been widely applied in the business world, hospitals, and education. With the ease that can be achieved by using BYOD, the security aspect is very important to consider. It starts with the security of the device to the security of company data that can be accessed by employees. Five dimensions of security control that must be considered in implementing BYOD: 1) data control; 2) access control; 3) network access control; 4) device management; 5) create a supporting framework. With the five BYOD implementation solutions presented in this study, there is only one solution that accommodates the five dimensions of BYOD security control, the use of Mobile Device Management (MDM) technology.


Antibiotics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 437
Author(s):  
Ilaria Maria Saracino ◽  
Matteo Pavoni ◽  
Angelo Zullo ◽  
Giulia Fiorini ◽  
Tiziana Lazzarotto ◽  
...  

Background and aims: Only a few antimicrobials are effective against H. pylori, and antibiotic resistance is an increasing problem for eradication therapies. In 2017, the World Health Organization categorized clarithromycin resistant H. pylori as a “high-priority” bacterium. Standard antimicrobial susceptibility testing can be used to prescribe appropriate therapies but is currently recommended only after the second therapeutic failure. H. pylori is, in fact, a “fastidious” microorganism; culture methods are time-consuming and technically challenging. The advent of molecular biology techniques has enabled the identification of molecular mechanisms underlying the observed phenotypic resistance to antibiotics in H. pylori. The aim of this literature review is to summarize the results of original articles published in the last ten years, regarding the use of Next Generation Sequencing, in particular of the whole genome, to predict the antibiotic resistance in H. pylori.Methods: a literature research was made on PubMed. The research was focused on II and III generation sequencing of the whole H. pylori genome. Results: Next Generation Sequencing enabled the detection of novel, rare and complex resistance mechanisms. The prediction of resistance to clarithromycin, levofloxacin and amoxicillin is accurate; for other antimicrobials, such as metronidazole, rifabutin and tetracycline, potential genetic determinants of the resistant status need further investigation.


Sign in / Sign up

Export Citation Format

Share Document