Policy Technologies for Security Management in Coalition Networks

2011 ◽  
pp. 750-776
Author(s):  
Seraphin B. Calo ◽  
Clare-Marie Karat ◽  
John Karat ◽  
Jorge Lobo ◽  
Robert Craven ◽  
...  

The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.

Author(s):  
Seraphin B. Calo ◽  
Clare-Marie Karat ◽  
John Karat ◽  
Jorge Lobo ◽  
Robert Craven ◽  
...  

The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.


Author(s):  
Annie Shebanow ◽  
Richard Perez ◽  
Caroline Howard

An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.


Author(s):  
Sitalakshmi Venkatraman

Organisations around the world are increasingly relying on the potential of information and communication technologies (ICTs) for their business operations as well as competitiveness. Huge amounts of money and time are invested on ICT infrastructure as there exists a high level of business dependency on ICT. Hence, protecting the ICT resources using effective security policies is of utmost importance for the sustenance of organisations. With the recent exponential rise in ICT security threats witnessed worldwide, governments and businesses are trying to successfully develop ICT security policies for their internal and external operations. While ICT security best practices are quite similar globally, ICT security policy management is very much localised and specific to different business scenarios and applications. Moreover, ICT security policies in an organization keep evolving from time to time and more recently changes take place at a much faster pace. This situation warrants a pragmatic framework for the development and management of ICT security policies in an organisation. Much research has focused on formulating frameworks for ICT management in general and there is a paucity of guidelines in literature for ICT security policy management, in particular. This chapter explores ICT security management issues faced in different environments and proposes an integrated framework for managing ICT security policies in an iterative manner. The framework provides the flexibility and adaptability for different organisations to follow the guidelines effectively as it emphasises on policy alignment with business objectives. Since the framework underpins the continuous improvement philosophy, it caters to ICT security policy reform and implementations for the future as well.


2014 ◽  
Vol 4 (2) ◽  
pp. 46-62
Author(s):  
Riku Nykänen ◽  
Tommi Kärkkäinen

Assuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in the process, structural, and operational level, focusing on the security control objectives and the actual controls. Even if both specifications share the same topics on high level, the results reveal the differences in the scope and in the included security controls.


Energies ◽  
2018 ◽  
Vol 11 (10) ◽  
pp. 2500 ◽  
Author(s):  
Eduardo Hernández-Márquez ◽  
Carlos Avila-Rea ◽  
José García-Sánchez ◽  
Ramón Silva-Ortigoza ◽  
Gilberto Silva-Ortigoza ◽  
...  

This paper has two aims. The first is to develop a robust hierarchical tracking controller for the DC/DC Buck-Boost–inverter–DC motor system. This controller considers a high level control for the inverter–DC motor subsystems and a low level control for the DC/DC Buck-Boost converter subsystem. Such controls solve the tracking task associated with the angular velocity of the motor shaft and the output voltage of the converter, respectively, via the differential flatness approach. The second aim is to present a comparison of the robust hierarchical controller to a passive controller. This, with the purpose of showing that performance achieved with the hierarchical controller proposed in this paper, is better than the one achieved with the passive controller. Both controllers are experimentally implemented on a prototype of the DC/DC Buck-Boost–inverter–DC motor system by using Matlab-Simulink along with the DS1104 board from dSPACE. According to experimental results, the proposal in the present paper achieves a better performance than the passive controller.


2021 ◽  
Author(s):  
Eduardo De Oliveira Burger Monteiro Luiz ◽  
Alessandro Copetti ◽  
Luciano Bertini ◽  
Juliano Fontoura Kazienko

The introduction of the IPv6 protocol solved the problem of providingaddresses to network devices. With the emergence of the Internetof Things (IoT), there was also the need to develop a protocolthat would assist in connecting low-power devices. The 6LoWPANprotocols were created for this purpose. However, such protocolsinherited the vulnerabilities and threats related to Denial of Service(DoS) attacks from the IPv4 and IPv6 protocols. In this paper, weprepare a network environment for low-power IoT devices usingCOOJA simulator and Contiki operating system to analyze theenergy consumption of devices. Besides, we propose an IntrusionDetection System (IDS) associated with the AES symmetric encryptionalgorithm for the detection of reflection DoS attacks. Thesymmetric encryption has proven to be an appropriate methoddue to low implementation overhead, not incurring in large powerconsumption, and keeping a high level of system security. The maincontributions of this paper are: (i) implementation of a reflectionattack algorithm for IoT devices; (ii) implementation of an intrusiondetection system using AES encryption; (iii) comparison ofthe power consumption in three distinct scenarios: normal messageexchange, the occurrence of a reflection attack, and runningIDS algorithm. Finally, the results presented show that the IDSwith symmetric cryptography meets the security requirements andrespects the energy limits of low-power sensors.


2021 ◽  
Vol 21 (4) ◽  
pp. 188-200
Author(s):  
Chiemela Godwin Wambu ◽  
Amaechi Ehimatie

Nigerian military history is an aspect of Nigerian history that reconstructs the philosophies, beliefs, life and times of military personnel in relation to time and place. On the other hand, strategic studies involve a study of the security policies and political conduct of states in their interaction within the international system. Since it is the military institution that implements these security policies, itself central to the objectives of states in international politics, it is logical  to view military history and strategic studies as pivotal to the securitydevelopment of the Nigerian nation as it is for every other nation. Given this understanding, this study attempts to situate Nigerian military history and strategic studies as imperatives for national security development in Nigeria. To achieve its goal, the paper employs mostly secondary and but a few primary sources subjected to content historical analysis from which it was deduced that military history and strategic studies are important for the advancement of security development in Nigeria. Keywords: Military, Strategic Studies, History, Security


F1000Research ◽  
2013 ◽  
Vol 2 ◽  
pp. 20
Author(s):  
Christopher T Noto ◽  
Suleman Mazhar ◽  
James Gnadt ◽  
Jagmeet S Kanwal

A major problem facing behavioral neuroscientists is a lack of unified, vendor-distributed data acquisition systems that allow stimulus presentation and behavioral monitoring while recording neural activity. Numerous systems perform one of these tasks well independently, but to our knowledge, a useful package with a straightforward user interface does not exist. Here we describe the development of a flexible, script-based user interface that enables customization for real-time stimulus presentation, behavioral monitoring and data acquisition. The experimental design can also incorporate neural microstimulation paradigms. We used this interface to deliver multimodal, auditory and visual (images or video) stimuli to a nonhuman primate and acquire single-unit data. Our design is cost-effective and works well with commercially available hardware and software. Our design incorporates a script, providing high-level control of data acquisition via a sequencer running on a digital signal processor to enable behaviorally triggered control of the presentation of visual and auditory stimuli. Our experiments were conducted in combination with eye-tracking hardware. The script, however, is designed to be broadly useful to neuroscientists who may want to deliver stimuli of different modalities using any animal model.


Sign in / Sign up

Export Citation Format

Share Document