high security
Recently Published Documents


TOTAL DOCUMENTS

773
(FIVE YEARS 195)

H-INDEX

30
(FIVE YEARS 6)

2022 ◽  
pp. 089331892110622
Author(s):  
Charis Rice ◽  
Rosalind H. Searle

This paper explores the role of internal communication in one under-researched form of organizational crisis, insider threat – threat to an organization, its people or resources, from those who have legitimate access. In this case study, we examine a high security organization, drawing from in-depth interviews with management and employees concerning the organizational context and a real-life incident of insider threat. We identify the importance of three communication flows (top-down, bottom-up, and lateral) in explaining, and in this case, enabling, insider threat. Derived from this analysis, we draw implications for communication and security scholars, as well as practitioners, concerning: the impact of unintentional communication, the consequences of selective silence and the divergence in levels of shared understanding of security among different groups within an organization.


2022 ◽  
pp. 002190962110696
Author(s):  
Shabir Hussain ◽  
Farrukh Shahzad ◽  
Shirin Ahmad

In this study, we present a contextual model for analyzing the escalatory and de-escalatory trends in media reporting of seven conflicts in Pakistan. For this purpose, we combined findings from both survey and content analysis. While the survey helped to examine the journalists’ perceptions about the security threats of conflicts and the factors that influence the reportage, the content analysis was utilized to analyze the escalatory and de-escalatory characteristics in the coverage. The findings show that high security conflicts lead to a patriotic reporting scenario that results in high escalatory coverage. There is a significant decrease in the escalatory coverage as the assumed threat level of a conflict decreases. Similarly, we found that a conflict in which journalists exercised more relative freedom from pressure groups was reported in de-escalatory fashion. These findings can be useful for strategizing for the implementation of peace journalism in Pakistan in particular and elsewhere in general.


2022 ◽  
pp. 728-753
Author(s):  
Rohit Rastogi ◽  
Puru Jain ◽  
Rishabh Jain

In current conditions, robotization has changed into the fundamental piece of our lives. Everybody is completely subject to mechanization whether it is an extraordinary bundling or home robotization. So as to bring home automation into thought, everybody now needs a heterogeneous state security, and in our task on residential robotization, such high security highlights are completely on the best possible consumption for this reason. In light of the structure of the interruption zone, there are some fundamental interests in it. Piezoelectric sensors are compelling for sharpening appropriated wellbeing checking and structures. An intrusion detection system (IDS) is a structure that screen for suspicious movement and issues alarms when such advancement is found. While impossible to miss worthiness and presentation is, some obstruction divulgence structures are fit to take practice when poisonous improvement or peculiar action is perceived.


2022 ◽  
pp. 754-779
Author(s):  
Rohit Rastogi ◽  
Rishabh Jain ◽  
Puru Jain

Robotization has changed into a fundamental piece of our lives. Everybody is completely subject to mechanization whether it is an extraordinary bundling or home robotization. So as to bring home automation into thought, everybody now needs a heterogeneous state security, and in our task on residential robotization, such high security highlights are completely on the best possible consumption. Piezoelectric sensors are compelling for sharpening appropriated wellbeing checking and structures. An intrusion detection system (IDS) is a structure that screens for suspicious movement and issues alarms when such advancement is found. Some obstruction divulgence structures are fit to take practice when poisonous improvement or peculiar action is perceived.


2021 ◽  
Vol 64 (12) ◽  
pp. 105-112
Author(s):  
Jiyong Yu ◽  
Mengjia Yan ◽  
Artem Khyzha ◽  
Adam Morrison ◽  
Josep Torrellas ◽  
...  

Speculative execution attacks present an enormous security threat, capable of reading arbitrary program data under malicious speculation, and later exfiltrating that data over microarchitectural covert channels. This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism to block these attacks. The main idea is that it is safe to execute and selectively forward the results of speculative instructions that read secrets, as long as we can prove that the forwarded results do not reach potential covert channels. The technical core of the paper is a new abstraction to help identify all micro-architectural covert channels, and an architecture to quickly identify when a covert channel is no longer a threat. We further conduct a detailed formal analysis on the scheme in a companion document. When evaluated on SPEC06 workloads, STT incurs 8.5% or 14.5% performance overhead relative to an insecure machine.


Sign in / Sign up

Export Citation Format

Share Document