scholarly journals Workshop Summary Report for “Building the Federal Profile for IoT Device Cybersecurity” Virtual Workshop

2021 ◽  
Author(s):  
Katerina N. Megas ◽  
Michael Fagan ◽  
David Lemire

This report summarizes the feedback received on the work of the NIST Cybersecurity for IoT program on device cybersecurity at a virtual workshop in July 2020. NISTIR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers and NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline provide general guidance on how manufacturers can understand and approach their role in supporting customers’ cybersecurity needs and goals. As discussed in those documents, specific sectors and use cases may require more specific guidance than what is included in NISTIR 8259A’s core baseline for IoT devices. NIST conducted the virtual workshop “Building the Federal Profile for IoT Device Cybersecurity” to discuss and gather community input on the creation of a federal profile of the core baseline for use by federal agencies. This publication provides a summary of the workshop. The baseline will be published in NISTIR 8259D, Profile of the IoT Core Baseline for the Federal Government.

2021 ◽  
Author(s):  
Katerina N. Megas ◽  
Michael Fagan ◽  
Barbara Cuthill ◽  
Mary Raguso ◽  
John Wiltberger

Author(s):  
Kevin Thompson

This chapter examines systematicity as a form of normative justification. Thompson’s contention is that the Hegelian commitment to fundamental presuppositionlessness and hence to methodological immanence, from which his distinctive conception of systematicity flows, is at the core of the unique form of normative justification that he employs in his political philosophy and that this is the only form of such justification that can successfully meet the skeptic’s challenge. Central to Thompson’s account is the distinction between systematicity and representation and the way in which this frames Hegel’s relationship to the traditional forms of justification and the creation of his own distinctive kind of normative argumentation.


Author(s):  
Anak Agung Ngurah Gede Marhendra ◽  
Agung Eko Budiwaspada ◽  
Sangayu Ketut Laksemi Nilotama

<p>Abstract Design of Cemara Ceramics Visual Rebranding Identity aims to produce a concept strategy and visual rebranding of the Cemara Ceramics company and produce a Cemara Ceramics rebranding visual identity design in order to encourage the creation of a new identity image. The method in this design uses a 5-stage Design Thinking approach, namely Empathize, Define, Ideate, Prototype and Test. The result achieved is the design of the new Cemara Ceramics corporate identity. With the use of the design thinking method in this research, various problems related to the company image of Cemara Ceramics can be found. The core problem obtained is how to design a strategy and concept of visual identity rebranding to encourage the creation of a new corporate image of Cemara Ceramics.</p><p>Keywords: visual rebranding identity, concept strategy, design thinking</p><p>Abstrak Perancangan Identitas Visual Rebranding Citra Perusahaan Cemara Ceramics ini bertujuan untuk menghasilkan strategi konsep dan visual rebranding perusahaan Cemara Ceramics serta menghasilkan rancangan identitas visual rebranding Cemara Ceramics dalam rangka mendorong terciptanya citra identitas yang baru. Metode dalam perancangan ini menggunakan pendekatan 5 tahapan Design Thinking yaitu Empathize, Define, Ideate, Prototype dan Test. Hasil yang dicapai yaitu rancangan corporate identity Cemara Ceramics yang baru. Dengan adanya penggunaan metode design thinking pada penelitian ini dapat menemukan berbagai permasalahan terkait citra perusahaan Cemara Ceramics. Permasalahan inti yang didapat yaitu mengenai bagaimana merancang strategi dan konsep identitas visual rebranding untuk mendorong terciptanya citra baru perusahaan Cemara Ceramics.</p><p>Kata kunci: identitas visual rebranding, strategi konsep dan visual, design thinking</p>


2021 ◽  
Author(s):  
Jill Valentina Sonego

This paper explores the role that the federal government has played in the development of Toronto's central waterfront. Specifically, it focuses on the role and operation of the Harbourfront Corporation, a federally-owned organization that was charged with orchestrating the redevelopment of the central waterfront. This paper provides a brief history of Toronto's waterfront and an overview of the roles of the levels of government in Canada with respect to urban affairs and waterfront redevelopment. It analyzes the creation, operation, and dismantlement of the Harbourfront Corporation, with special attention paid to the organization's objectives, relations with other levels of government, and contributions to the waterfront. Finally, it outlines some lessons to be learned from the Harbourfront project.


2022 ◽  
Vol 11 (1) ◽  
pp. 5
Author(s):  
Njabulo Sakhile Mtetwa ◽  
Paul Tarwireyi ◽  
Cecilia Nombuso Sibeko ◽  
Adnan Abu-Mahfouz ◽  
Matthew Adigun

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.


Author(s):  
Adam I. P. Smith

This chapter discusses the campaign strategies of the two main presidential candidates in the free states in the 1860 election, Abraham Lincoln and Stephen A. Douglas. Both appealed to voters’ desire to contain the Slave Power and assure access to the West for free white settlers. The core difference between Douglasites and Lincolnites was over the role of the Federal government in resolving the crisis: Republicans wanted to take control in Washington to prevent the nationalisation of slavery; Democrats continued to believe that the most effective solution was decentralisation.


Author(s):  
Rebecca Tarlau

The Epilogue reflects on the future of the MST’s political struggle—and that of the Brazilian left more broadly—in the context of the 2016 ousting of the Workers’ Party (PT) from the federal government and the 2018 presidential election of ultra-right conservative Jair Bolsonaro. Although Bolsonaro’s rise to power is a serious setback for the movement, the core argument of the book still holds: the MST’s thirty-five-year strategic engagement with the Brazilian state significantly expanded its internal capacity, including its organizational structure, resource base, and collective leadership, and the movement is unlikely to disappear in the near future. This long march through the institutions was only possible because activists engaged in contentious political mobilization, while also prefiguring their social and economic vision within a variety of state spheres and under a diversity of political regimes. Even in the new political context, activists will be able to defend many of their institutional gains, helping the movement withstand, if not fully deflect, this far-right resurgence.


Author(s):  
Teay Shawyun

As IS/IT are technology enablers in the creation and delivery of the value, it is contended that all the core processes enabled by its technology should be aligned through the “ways and means” and the “what and how” value is added through the IT enabled processes. The management and implementation of the IT is dependant on the capacity and capability of the firm, and these are human and organizational based, that ultimately defines the firm’s competency affecting successful implementation and utilization of the IS/IT. This chapter proposes a “capacity and capability” model based on the management of technology approach (the management of its Technoware, Humanware, Inforware and Orgaware) and its technology capabilities approach to manage its human, information and organization capitals critical to the successful IS/IT implementation and utilization. The “capacity and capability” model is the base of the integrated strategic capability driven implementation model that is contended to address the key implementation issues in a more integrated and comprehensive way. The capability and capacity management of the IS/IT is contended to better address the utilization success based on the inter-twined THIO that addresses the human and organizational issues as compared to the traditional approach of having the MIS resources.


Sign in / Sign up

Export Citation Format

Share Document