security architecture
Recently Published Documents


TOTAL DOCUMENTS

1400
(FIVE YEARS 300)

H-INDEX

32
(FIVE YEARS 6)

2022 ◽  
Author(s):  
Raed Toghuj ◽  
Bashar AbuAlghanam

Throughout the past period, both the U.S and China further expanded their escalation actions (especially during the Trump and the Biden administrations). Within this context, the aim of this paper is to analyze the structural factors that steer the Chinese side to either keep escalating (potentially invading Taiwan), or to practice fluctuation of interests. By questioning the balance of power theorem between China and their adversaries (notably the United States, United Kingdom, and Australia). The literature about China's rise is voluminous, and consistently pinpoints key historical moments of increased tensions among the Western and Eastern fronts. Evidence points to significant variations within the Chinese modus operandi when it comes to use of force in territorial disputes. As it stands, our position is that barriers to direct conflict between the U.S and China are far too significant.


2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Se-Joon Park ◽  
Yong-Joon Lee ◽  
Won-Hyung Park

Recently, due to the many features and advantages of cloud computing, “cloud service” is being introduced to countless industries around the world at an unbelievably rapid pace. However, with the rapid increase in the introduction of cloud computing services, security vulnerabilities are increasing and the risk of technology leakage from cloud computing services is also expected to increase in social network service. Therefore, this study will propose an AWS-based (Amazon Web Services) security architecture configuration method that can be applied for the entire life cycle (planning, establishment, and operation) of cloud services for better security in AWS Cloud Services, which is the most used cloud service in the world. The proposed AWS security guide consists of five different areas, Security Solution Selection Guide, Personal Information Safeguard Guide, Security Architecture Design Guide, Security Configuration Guide, and Operational Security Checklist, for a safe social network. The AWS Security Architecture has been designed with three reference models: Standard Security Architecture, Basic Security Architecture, and Essential Security Architecture. The AWS Security Guide and AWS Security Architecture proposed in this paper are expected to help many businesses and institutions that are hoping to establish and operate a safe and reliable AWS cloud system in the social network environment.


2021 ◽  
Vol 38 (38) ◽  
pp. 38-55
Author(s):  
Adam Kwiatkowski

This article deals with one of the priority areas, the area of European security. Based on the literature on the subject and an analysis of the situation in Central and Eastern Europe, the author presents various types of current threats evident in Belarus, Poland, Russia, Turkey and Hungary, as a result of, among other things, societal alienation from the ruling class. The ignoring of their people and lack of tolerance in these countries has provoked a rebellion in society against governments’ exercise of power and approach to the rule of law. By analysing aspects of the threat, the author tries to uncover the motives of governments that are trying to maintain this approach and are ready to sacrifice the health and lives of their citizens.


2021 ◽  
Vol 13 (24) ◽  
pp. 13898
Author(s):  
Adam Krzymowski

This article presents new approaches to water diplomacy connected with the United Nations 2030 Agenda. The research question is what is the role and significance of water diplomacy for Sustainable Development Goals (SDGs) and global security architecture? The paper is based on the theory of interdependence. To illustrate this concept, the author used several case studies to identify the international security role of water diplomacy in the context of SDGs. The case studies point to the greater likelihood that wars in the twenty-first century will be due to freshwater disputes; water diplomacy should be a crucial instrument for the SDGs implementation. Water diplomacy has the potential to become an effective platform for international cooperation in the face of many current and future global water challenges. Water diplomacy combines preventive and reactive measures, as well as the mediation and implementation of solutions. It is crucial for regional and world security. The results of this paper show future research directions on water diplomacy.


2021 ◽  
Vol 13 (24) ◽  
pp. 13827
Author(s):  
Seungjin Baek ◽  
Young-Gab Kim

Although the defense field is also one of the key areas that use big data for security reasons, there is a lack of study that designs system frameworks and presents security requirements to implement big data in defense. However, we overcome the security matters by examining the battlefield environment and the system through the flow of data in the battlefield. As such, this research was conducted to apply big data in the defense domain, which is a unique field. In particular, a three-layered system framework was designed to apply big data in the C4I system, which collects, manages, and analyzes data generated from the battlefield, and the security measures required for each layer were developed. First, to enhance the general understanding of big data and the military environment, an overview of the C4I system, the characteristics of the 6V’s, and the five-phase big data lifecycle were described. While presenting a framework that divides the C4I system into three layers, the roles and components of each layer are described in detail, considering the big data lifecycle and system framework. A security architecture is finally proposed by specifying security requirements for each field in the three-layered C4I system. The proposed system framework and security architecture more accurately explain the unique nature of the military domain than those studied in healthcare, smart grids, and smart cities; development directions requiring further research are described.


2021 ◽  
Vol 123 ◽  
pp. 102667
Author(s):  
Amir Afaq ◽  
Noman Haider ◽  
Muhammad Zeeshan Baig ◽  
Komal S. Khan ◽  
Muhammad Imran ◽  
...  

Author(s):  
Nazmul Hossain ◽  
Md Zobayer Hossain ◽  
Md Alam Hossain

The IoT (Internet of Things) is now a trendy technology with its numerous apps in multiple areas. It includes a heterogeneous amount of Internet and mutually linked devices. Since the IoT network is characterized by tiny assets that produce less energy and are more flexible, this number of machines is difficult to monitor. SDN (Software Defined Network) is a new network model that facilitates the creation and introduction of fresh networking abstractions, simplifies the management of network and facilitates network development. In this paper, by leveraging the fundamental characteristics represented by Software Defined Networks (SDN), we present an ontological security architecture for IoT networks. Our security architecture restricts access to independently verified IoT devices via the network. To secure the flows in the IoT network infrastructure, we introduced an extra layer and provide a lightweight protocol to authenticate IoT systems. Such an advanced strategy to protection containing IoT device authentication and allowing approved flows can assist secure IoT networks against malicious IoT devices and threats.


Sign in / Sign up

Export Citation Format

Share Document