systematic security
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 5)

H-INDEX

4
(FIVE YEARS 1)

Author(s):  
Yu Long Chen ◽  
Atul Luykx ◽  
Bart Mennink ◽  
Bart Preneel

2021 ◽  
Vol 1 (1) ◽  
pp. 1-8
Author(s):  
Sachin Kr. Tomar ◽  

Cyber Security refers to the processes of protecting data and systems from cyber-attacks. Any firm without security policies and systematic security systems is at large risk and the important data related to that firm are not safe without security policies like. Payment Card Industry and Data Security Standard framework used to protect payment security credit card, debit card, etc. In maintaining access, the hacker inside the target system is used to exploit vulnerabilities and password cracking. In today’s era, day by day cybercrimes rise so it raised the requirement of system Security or even the entire network. As more business exercises are being mechanized and an expanding number of PCs are being utilized to store important data, the requirement for secure PC frameworks turns out to be more evident. As a result, network safety issues have become public safety issues.


Author(s):  
Julian Tekaat ◽  
Aschot Kharatyan ◽  
Harald Anacker ◽  
Roman Dumitrescu

AbstractThe increasingly intelligent, highly complex, technical systems of tomorrow - for instance autonomous vehicles - result in the necessity for a systematic security- and safety-oriented development process that starts in the early phases of system design. Automotive Systems Engineering (ASE) as one approach is increasingly gaining ground in the automotive industry. However, this approach is still in a prototype stage. The consideration of security and safety within the early stages of systems design leads to so- called ill-defined problems. Such are not covered by ASE, but can be addressed by means of Design Thinking. Therefore we introduce an approach to combine both approaches. Based on this combination, we derive potentials in the context of the consideration of security and safety. Essential advantages are the possibility to think ahead of threat scenarios at an early stage in system design. Due to an incomplete database, this is not supported or only partially supported by conventional approaches. The resulting potentials are derived based upon a practical example.


2019 ◽  
Vol 3 (1) ◽  
pp. 115
Author(s):  
Chun-Lin Liu1 ◽  
Jeslin Quek2

Embassies are important buildings, involving the diplomatic image of a country’s government in another foreign country. Given the rising tensions between countries, either political, economic, religion or war, attacks on embassies have been increasing in recent years. Thus, it is evident that appropriate measures are to be taken to reduce the potential impact of an attack. The paper discusses the measures in enhancing building security of embassies. The principles for Security Planning and Design are discussed, followed by an introduction to a systematic security risk assessment framework. The framework is evaluated regarding the potential security risk posed by an attack against elements of the mega infrastructure using explosives. Further options to increase the security of embassies are also explored to reduce the risk of a potential attack. A security-enhanced building, planned and constructed well to specifications, can provide benefits to the client, including greater cost advantage and increase of value for the structure.


2018 ◽  
Vol 77 ◽  
pp. 360-379 ◽  
Author(s):  
Madeline Cheah ◽  
Siraj A. Shaikh ◽  
Jeremy Bryans ◽  
Paul Wooderson

2018 ◽  
pp. 1705-1738
Author(s):  
William J. Bailey

The protection of critical infrastructure assets is vital to every government, organisation, business and person. If the asset forms part of the vital critical infrastructure, the loss could be catastrophic and far reaching with considerable knock-on effects. To avoid such negative outcomes requires a wide range of in-built resilient security structures, plans and operating procedures. A more adaptive, proactive, comprehensive security management process needs to be embraced to: prevent, detect, deter, respond and defeat potential damaging events and incidents. Core to security planning is a full understanding of the potential consequences of worst case scenarios. Adopting a process driven model is a proactive approach and grounded upon current operational procedures used by major international companies in hostile and dangerous environments. By utilizing a clearly defined comprehensive risk management tool, a more systematic Security, Threat, Risk and Vulnerability Assessment (STRVA), process can be developed. This process uses a multi-layered intelligence gathering capabilities.


2017 ◽  
Vol 9 ◽  
pp. 8-18 ◽  
Author(s):  
Madeline Cheah ◽  
Siraj A. Shaikh ◽  
Olivier Haas ◽  
Alastair Ruddle

Sign in / Sign up

Export Citation Format

Share Document