Cybersecurity in Networking Devices

Author(s):  
Afroj Jahan Badhon ◽  
◽  
Dr. Shruti Aggarwal ◽  
◽  

Cybersecurity is training defensive arrangements, systems, and plans to save the information from cyber outbreaks. These virtual outbreaks are typically intended to retrieve, alter, or otherwise extinguish delicate data, extracting currency from manipulators, or disturb usual commercial procedures. System Security defends one’s system and information from breaks, interruptions also other intimidations. Network Security contains admission controller, computer virus and defiant computer virus software program, system safety, system analytics, system-connected protection categories, firewalls, and VPN encoding. System substructure strategies stand the mechanisms of a net that conveyance transportations desired intended for information, submissions, facilities, and multimedia. In this paper, we reflect on Cybersecurity in Networking Devices.

Author(s):  
Joseph R. Petrella ◽  
Timothy Stevenson ◽  
Mark Cropper ◽  
Paul Sichta ◽  
Michael D’Agostino ◽  
...  

2013 ◽  
Vol 443 ◽  
pp. 446-450
Author(s):  
Yan Bi

The feedbacks of the results of assessing the network security strategy based on security capability, as a reference to the security strategy for effective adjustment, providing a more robust system and improve the safety. The correct security strategy results from the correct understanding on the system security demands and effective assessment model, because the various security domain information subjects and objects have different security needs. On the basis of the establishment of the network security strategy based on security domain, through analysis of the security strategy defensive methods, application objects, information security attributes and their relationship, this paper proposed an assessment model of network security strategy based on security capability, and analyzed the impact of the network security strategy attributes upon network security capability, that is the robust security strategy is conducive to system safety.


2020 ◽  
Vol 23 (1) ◽  
pp. 8-18
Author(s):  
B. I. Bachkalo ◽  
V. I. Zolotykh

The majority of reasons for aviation accidents that occurred with the state aircraft in the Russian Federation are due to the flight personnel manifestations of the “personality factor” during the flight mission. However, the aviation system security record and evaluation of “personality factor” influence is carried out fragmentarily at present and does not have a systemic character. This is the factor that impedes the use of a systematic approach to the problem of the human factor influence on flight safety. In this regard, there is a need to quantify the "personality factor" impact on the safety of the upcoming flight in order to reduce this impact. The solution to this problem will require the determination of the most significant pilot’s upcoming flight “personality factor” safety indicators set and a substantial description of each specific indicator value. Due to the lack of the assessment mechanisms to solve this problem which are known to the authors the article substantiates the need to develop a tool for the quantitative assessment of potential threats impact associated with the social and psychophysiological restrictions of a human-operator on ergatic system safety controlled by this person. As a result of a personality-oriented approach to assessing the state of system security, implemented by means of using an integral indicator determining the total threats magnitude of a particular human operator personality factor to the ergatic system state the total human operator hazard indicator, and developing criteria for ergatic system safety this indicator influence degree; a universal tool for assessing the influence of the personality factor on ergatic system safety has been obtained. This tool is called the “The ergatic system personality factor formalizing method". The obtained method allows us to develop a methodology for assessing the influence of the operator’s personality factor which is applicable to any ergatic system, including the system of “crew – aircraft”.


2011 ◽  
Vol 213 ◽  
pp. 566-571
Author(s):  
Hui Huang ◽  
Hai Bin Liu

According to modern system security theory and method,a series of indexes to evaluate the system safety and reliability of coal mine ventilation system are established. In order to apply it into practice, the membership function is also introduced into the evaluation process. The formula to calculate integrated score of mine ventilation system safety and reliability were brought into the model. The above model was applied to evaluate safety and reliability of mine ventilation system and had achieved good results.


2014 ◽  
Vol 687-691 ◽  
pp. 1720-1723
Author(s):  
Xu Wang

With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.


2012 ◽  
Vol 190-191 ◽  
pp. 205-208
Author(s):  
Jing Zhou

This article tells the story of in order to effectively resist the invasion of external .NET platform system, improve system security, we must establish the prevention and monitoring technologies improve system security system. System programmer and administrators only in the system design stage, to do a good job safety prevention programs and solutions to security applications wherein, to nip in the bud, development of safer, more reliable and robust web system; 安and this paper Analysis the possible security problems of the .NET platform system; in view of the existing safety problems to make the safety performance analysis; finally put forward the platform system safety prevention programme.


2014 ◽  
Vol 530-531 ◽  
pp. 773-776
Author(s):  
Xin Min Wu ◽  
Hao Shu Wu

First, as the 4G network, the introduction of IPv6 network layer security mechanism, security is enhanced at the same time, IPv6 security mechanism applied to the 4G network system security as well as new demands and challenges, followed by the core network based on IPv6 network security to face the next 4G threats and security problems, concludes with IPv6 technical analysis and 4G network defense and countermeasures.


Author(s):  
Muhammad Hasim Siregar ◽  
Rosi Dermawati

AbstractLack of knowladge of computer user about system security problem is one of the cause of computer problems. There are many computers that do not update their antivirus and some even do not use an antivirus. Network security techniques usually block attacks using a firewall or detect attack with IDS (Intruction Detection System), which is in charge of guarding against axisting attacks. However, by only using IDS the network administrator will be overwhelmed checking every notification given by IDS. This IDS works almost the same as an antivirus, unable to work in an encrypted environment or an IPv6 environment. For that, additional security is needed such as a dionaea honeypot. A honeypot is a fake system the signed to trap attacker, as if it were a real system. Based on these problems, a research will be conducted on the Analysis And Implementation Of Honeypot Using Dionaea as Network Security Support. Keywords: Honeypot, Dionaea, IDS, Firewall, Malware


Sign in / Sign up

Export Citation Format

Share Document