Stronger Authentication

Author(s):  
Alvin Y.C. Yeo

Authentication is a prime challenge for banks today as end users’ digital identities are being compromised through increasingly sophisticated means. This chapter provides a timely review of the authentication concept and key authentication technologies, namely password tokens, biometrics, smart cards, smart tokens, and out-of-band authentication. An integrative model is proposed, which frames three key considerations in choosing an authentication solution—cyber threat types, regulatory requirements, and business considerations. Each of the implications is considered in turn. Finally, to guide future deployments of authentication solutions, the chapter concludes with pragmatic suggestions by proposing a set of evaluation criteria for choosing authentication solutions and key legal considerations.

2020 ◽  
Vol 12 (6) ◽  
pp. 108
Author(s):  
Alessandra de Melo e Silva ◽  
João José Costa Gondim ◽  
Robson de Oliveira Albuquerque ◽  
Luis Javier García Villalba

The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with multi-vectored, multi-staged and polymorphic characteristics are performing complex attacks, making the processes of detection and mitigation far more complicated. Thus, organizations were encouraged to change their traditional defense models and to use and to develop new systems with a proactive approach. Such changes are necessary because the old approaches are not effective anymore to detect advanced attacks. Also, the organizations are encouraged to develop the ability to respond to incidents in real-time using complex threat intelligence platforms. However, since the field is growing rapidly, today Cyber Threat Intelligence concept lacks a consistent definition and a heterogeneous market has emerged, including diverse systems and tools, with different capabilities and goals. This work aims to provide a comprehensive evaluation methodology of threat intelligence standards and cyber threat intelligence platforms. The proposed methodology is based on the selection of the most relevant candidates to establish the evaluation criteria. In addition, this work studies the Cyber Threat Intelligence ecosystem and Threat Intelligence standards and platforms existing in state-of-the-art.


2015 ◽  
pp. 1660-1685
Author(s):  
Vladimir Vujin ◽  
Konstantin Simić ◽  
Borko Kovačević

Existing approaches for management of digital identities within e-learning ecosystems imply defining different access parameters for each service or application. However, this can reduce system security and lead to insufficient usage of the services by end-users. This chapter investigates various approaches for identity management, particulary in a cloud computing environment. Several complex issues are discussed, such as cross-domain authentication, provisioning, multi-tenancy, delegation, and security. The main goal of the research is to provide a highly effective, scalable identity management for end-users in an educational private cloud. A federated identity concept was introduced as a solution that enables organizations to implement secure identity management and to share information on the identities of users in the cloud environment. As a proof of concept, the identity management system was implemented in the e-learning system of Faculty of Organizational Sciences, University of Belgrade.


2019 ◽  
Vol 10 (4) ◽  
pp. 1250
Author(s):  
Gustavo Stamm ◽  
Andre Missaggia ◽  
Bruno Miranda Santos ◽  
Franco Silveira ◽  
Paulo Cesar Chagas Rodrigues ◽  
...  

The emergence of emergency orders, in the course of services already underway, in an electricity distribution concessionaire is inevitable, characterizing a dynamic scenario. Minimizing the delays resulting from these emergencies is a challenge for companies that provide this type of service. In this way, such companies need strategies to meet the needs of customers while meeting regulatory requirements. Aiming at this routing problem, the following work aims to identify evaluation criteria in the dispatch of these emergency orders and the impacts that these criteria will result in the execution times of these work orders in an electricity distribution company. As findings of this research, we verify that the demand exceeds the capacity of the teams and that the orders end up being passed on to the next day. Through the criteria, it was possible to prioritize commercial and emergency orders and analyze the impact generated.


2021 ◽  
Vol 1 (2) ◽  
pp. 2-8
Author(s):  
Z.A. Godzhayev ◽  
◽  
T.Z. Godzhayev ◽  
M.V. Lyashenko ◽  
V.V. Shekhovtsov ◽  
...  

The paper discusses the main requirements of Russian and foreign regulatory documents on vi-bration protection of the operator's workplace of wheeled and tracked vehicles. Their comparative analysis was performed. The normalization of the parameters of general vibration at the workplaces of operators of tractors and self-propelled agricultural vehicles in our country occurs in accordance with the requirements of SN 2.2.4 / 2.1.8.566-96, GOST 12.1.012-2004 and GOST 12.2.019-2015. The root-mean-square values of vibration accelerations for a certain period of exposure in each oc-tave (one-third octave) frequency band are allocated as the evaluation criteria. They are compared for compliance with the regulated values from a specific standard. At the international level, the ob-ject of compliance is the ISO 2631-1: 1997 standard, which establishes the requirements for vertical and horizontal vibration with a certain exposure time on a person from 1 minute to 24 hours in the frequency range from 1 to 80 Hz. The article shows that the most stringent requirements for the lev-el of local vibration are established in the Russian Federation. They provide clear regulation of the type of work performed, duration, magnitude, direction of existing loads, etc. Relatively soft re-quirements are in most European countries, except Poland, where the MPL is regulated taking into account the age, gender and condition of a person. In addition, in the regulatory documents of most foreign countries there are two and sometimes three indicators: threshold (upper and lower) values and MPL. When the threshold is reached, primary measures are usually initiated to counter harmful factors.


2022 ◽  
Vol 25 (3) ◽  
pp. 18-22
Author(s):  
Ticao Zhang ◽  
Shiwen Mao

With the growing concern on data privacy and security, it is undesirable to collect data from all users to perform machine learning tasks. Federated learning, a decentralized learning framework, was proposed to construct a shared prediction model while keeping owners' data on their own devices. This paper presents an introduction to the emerging federated learning standard and discusses its various aspects, including i) an overview of federated learning, ii) types of federated learning, iii) major concerns and the performance evaluation criteria of federated learning, and iv) associated regulatory requirements. The purpose of this paper is to provide an understanding of the standard and facilitate its usage in model building across organizations while meeting privacy and security concerns.


Author(s):  
Vladimir Vujin ◽  
Konstantin Simić ◽  
Borko Kovačević

Existing approaches for management of digital identities within e-learning ecosystems imply defining different access parameters for each service or application. However, this can reduce system security and lead to insufficient usage of the services by end-users. This chapter investigates various approaches for identity management, particulary in a cloud computing environment. Several complex issues are discussed, such as cross-domain authentication, provisioning, multi-tenancy, delegation, and security. The main goal of the research is to provide a highly effective, scalable identity management for end-users in an educational private cloud. A federated identity concept was introduced as a solution that enables organizations to implement secure identity management and to share information on the identities of users in the cloud environment. As a proof of concept, the identity management system was implemented in the e-learning system of Faculty of Organizational Sciences, University of Belgrade.


Author(s):  
Wisa Majamaa ◽  
Seppo Junnila ◽  
Hemanta Doloi ◽  
Emma Niemostö

The European Union (EU) is reforming its public services and suggesting Public‐Private Partnerships (PPPs) as a solution for producing high quality and cost effective real estate service delivery. However, the use of PPP approach in real estate industries has been found to have significant constraints related to the end‐users’ (general public's) perspective. The purpose of the paper is to show how PPP projects have failed to produce desirable characteristics expressed in purchasing processes and fulfilment of the end‐user expectations. While the customer‐oriented development of public services and the needs of the end‐users were noted to be crucial points in all five major Finnish PPP projects studied, the case studies pointed out a fundamental lack of understanding and maintaining the end‐user perspective through the tendering and evaluation processes. Especially, in the final stage of evaluation, and evaluation criteria used to decision making, the disappearance of the end‐users’ perspective was evident. The findings are further used to develop a new suggested Public‐Private‐People Partnership (4P) model. The results can be useful to the public sector's purchasers and to the private sector's providers to understand the limitations of current PPP practices and to further develop their practices towards more customer‐oriented service production. Santrauka Europos Sąjunga (ES) vykdo viešųjų paslaugų reformą ir viešąsias bei privačiąsias partnerystes (VPP) siūlo kaip sprendimą teikti pigias ir kokybiškas nekilnojamojo turto paslaugas. Tačiau pastebėta, kad nekilnojamojo turto sektoriuose VPP požiūris susiduria su reikšmingais suvaržymais, kurie yra susiję su galutinių vartotojų (plačiosios visuomenės) perspektyva. Šiame darbe siekiama pademonstruoti, kaip VPP projektams nepavyko pasiekti pirkimo procesuose numatytų pageidaujamų charakteristikų ir patenkinti galutinio vartotojo lūkesčius. Nors visi penki pagrindiniai Suomijos VPP projektai, kurie yra nagrinėjami darbe, į klientą orientuotą viešųjų paslaugų plėtrą ir galutinių vartotojų poreikius nurodo kaip svarbiausius punktus, atvejo tyrimai parodė, kad gebėjimo suprasti bei išlaikyti galutinio vartotojo perspektyvą iš esmės trūko ir organizuojant konkursus, ir vertinant. Galutinio vartotojo perspektyvos išnykimas ypač akivaizdžiai išreiškia galutinis vertinimo etapas ir vertinimo kriterijai, kuriais grindžiami sprendimai. Išvados pritaikytos plėtojant naują siūlomą viešosios bei privačiosios žmonių partnerystės (VPŽP) modelį. Rezultatai naudos gali duoti viešojo sektoriaus pirkėjams ir privačiojo sektoriaus tiekėjams, siekiant suprasti esamų VPP praktikų ribotumą ir toliau plėtojant savo praktikas, kad teikiamos paslaugos būtų labiau orientuotos į klientą.


1998 ◽  
Vol 3 (5) ◽  
pp. 8-10
Author(s):  
Robert L. Knobler ◽  
Charles N. Brooks ◽  
Leon H. Ensalada ◽  
James B. Talmage ◽  
Christopher R. Brigham

Abstract The author of the two-part article about evaluating reflex sympathetic dystrophy (RSD) responds to criticisms that a percentage impairment score may not adequately reflect the disability of an individual with RSD. The author highlights the importance of recognizing the difference between impairment and disability in the AMA Guides to the Evaluation of Permanent Impairment (AMA Guides): impairment is the loss, loss of use, or derangement of any body part, system, or function; disability is a decrease in or the loss or absence of the capacity to meet personal, social, or occupational demands or to meet statutory or regulatory requirements because of an impairment. The disparity between impairment and disability can be encountered in diverse clinical scenarios. For example, a person's ability to resume occupational activities following a major cardiac event depends on medical, social, and psychological factors, but nonmedical factors appear to present the greatest impediment and many persons do not resume work despite significant improvements in functional capacity. A key requirement according to the AMA Guides is objective documentation, and the author agrees that when physicians consider the disability evaluation of people, more issues than those relating to the percentage loss of function should be considered. More study of the relationships among impairment, disability, and quality of life in patients with RSD are required.


Author(s):  
John Robertson ◽  
Ahmad Diab ◽  
Ericsson Marin ◽  
Eric Nunes ◽  
Vivin Paliath ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document