solar winds
Recently Published Documents


TOTAL DOCUMENTS

66
(FIVE YEARS 26)

H-INDEX

8
(FIVE YEARS 2)

Author(s):  
Eko Budi ◽  
Dwi Wira ◽  
Ardian Infantono

Konsep Society 5.0 berpusat pada manusia dan berbasis teknologi. Dimana penggerak utama industri adalah teknologi dan masyarakat modern. Di era teknologi dan informasi berkembang dengan pesat memiliki dampak terhadap seluruh aspek kehidupan. Salah satunya adalah aspek keamanan berupa ancaman cyber crime. Oleh karena itu cyber security mempunyai peran vital untuk mencegah terjadinya cyber crime. Tujuan dari penelitian ini adalah untuk memperoleh gambaran tentang cyber crime dan tantangannya kedepan, strategi cyber security di Indonesia serta penguatan cyber security di Indonesia dalam rangka mewujudkan keamanan nasional di era society 5.0. Metode penelitian yang digunakan adalah pendekatan kualitatif dan deskriptif analitis dengan teknik pengumpulan data menggunakan studi pustaka dari penelitian sebelumnya dan data sekunder lainnya. Hasil dari penelitian ini adalah pandemi Covid-19 menjadi topik utama dalam tren keamanan siber. Para peretas memanfaatkan keresahan masyarakat sebagai celah dalam meluncurkan berbagai serangan, mulai dari phishing hingga ransomware, kasus kebocoran data 91 juta pengguna situs belanja online Tokopedia dan kebocoran data 1,2 juta pengguna situs Bhinneka. Indonesia pun terdampak oleh kasus keamanan siber global seperti Coronavirus Ransomware, Covidlock Malware, peretasan Border Gateway Protocol, kerentanan pada produk router Draytek Vigor, adanya Remote Code Execution pada beberapa versi produk sistem operasi Windows, kerentanan terjadinya Arbitrary Code Execution pada seluruh sistem operasi Google Android, hingga eksploitasi produk Solar Winds Orion Platform. Kesimpulannya adalah saat ini Indonesia tengah dalam keadaan darurat cyber security dan sudah mencapai tahap memprihatinkan. Strategi cyber security yang harus dilakukan Indonesia untuk mewujudkan keamanan nasional di era society 5.0, adalah 1) capacity building, 2) Pembentukan undang-undang khusus tentang tindak pidana siber, 3) Peningkatan sumberdaya manusia, 4) Kerjasama stakeholder di dalam negeri dan kerjasama internasional bidang cyber security untuk mewujudkan keamanan nasional di era society 5.0.


2021 ◽  
Vol 11 (5) ◽  
pp. 537-545
Author(s):  
Jeferson Martínez ◽  
Javier M. Durán

Exploitation of a vulnerability that compromised the source code of the Solar Winds’ Orion system, a software that is used widely by different government and industry actors in the world for the administration and monitoring of networks; brought to the fore a type of stealth attack that has been gaining momentum: supply chain attacks. The main problem in the violation of the software supply chain is that, from 85% to 97% of the code currently used in the software development industry comes from the reuse of open source code frameworks, repositories of third-party software and APIs, creating potential vulnerabilities in the development cycle of a software product. This research analyzes the SolarWinds case study from an exploratory review of academic literature, government information, but also from the articles and reports that are published by different cybersecurity consulting firms and software providers. Then, a set of good practices is proposed such as: Zero trust, Multi-Factor authentication mechanisms (MFA), strategies such as SBOM and the recommendations of the CISA guide to defend against this type of attack. Finally, the research discusses about how to improve response times and prevention against this type of attacks, also future research related to the subject is suggested, such as the application of Machine Learning and Blockchain technologies. Additionally for risk reduction, in addition to the management and articulation of IT teams that participate in all the actors that are part of the software life cycle under a DevSecOps approach.


2021 ◽  
Vol 880 (1) ◽  
pp. 012010
Author(s):  
S N A Syed Zafar ◽  
Roslan Umar ◽  
N H Sabri ◽  
M H Jusoh ◽  
A Yoshikawa ◽  
...  

Abstract Short-term earthquake forecasting is impossible due to the seismometer’s limited sensitivity in detecting the generation of micro-fractures prior to an earthquake. Therefore, there is a strong desire for a non-seismological approach, and one of the most established methods is geomagnetic disturbance observation. Previous research shows that disturbances in the ground geomagnetic field serves as a potential precursor for earthquake studies. It was discovered that electromagnetic waves (EM) in the Ultra-Low Frequency (ULF) range are a promising tool for studying the seismomagnetic effect of earthquake precursors. This study used a multiple regression approach to analyse the preliminary study on the relationship between Pc4 (6.7-22 mHz) and Pc5 (1.7-6.7 mHz) ULF magnetic pulsations, solar wind parameters and geomagnetic indices for predicting earthquake precursor signatures in low latitude regions. The ground geomagnetic field was collected from Davao station (7.00° N, 125.40° E), in the Philippines, which experiences nearby earthquake events (Magnitude <5.0, depth <100 km and epicentre distance from magnetometer station <100 km). The Pc5 ULF waves show the highest variance with four solar wind parameters, namely SWS, SWP, IMF-Bz, SIE and geomagnetic indices (SYM/H) prior to an earthquake event based on the regression model value of R2 = 0.1510. Furthermore, the IMF-Bz, SWS, SWP, SWE, and SYM/H were found to be significantly correlated with Pc5 ULF geomagnetic pulsation. This Pc5 ULF magnetic pulsation behaviour in solar winds and geomagnetic storms establishes the possibility of using Pc5 to predict earthquakes.


Author(s):  
Dr. Shetia C. Butler Lamar ◽  
Michelle Kuralt ◽  
Carolyn Zidor-Guerrier

Along with the rising demand for companies to facilitate business functions more efficiently, information technology has increasingly become a vehicle to bring about the convenience and efficiency that companies require to promote effective business operations. With such reliance upon information technology solutions comes the potential for companies to become more vulnerable to possible security incidents with their increased reliance upon third-party vendors for software solutions. This paper seeks to explore the software company SolarWinds and analyze its 2020 security breach. This paper will discuss how the SolarWinds breach occurred, how IT Security Professionals perceived it, and the vulnerabilities within the SolarWinds system before the breach. It will also analyze and evaluate the lessons learned from the SolarWinds breach and explore security measures implemented after the attack


2021 ◽  
Vol 7 (32) ◽  
pp. eabi7647
Author(s):  
John A. Tarduno ◽  
Rory D. Cottrell ◽  
Kristin Lawrence ◽  
Richard K. Bono ◽  
Wentao Huang ◽  
...  

Determining the presence or absence of a past long-lived lunar magnetic field is crucial for understanding how the Moon’s interior and surface evolved. Here, we show that Apollo impact glass associated with a young 2 million–year–old crater records a strong Earth-like magnetization, providing evidence that impacts can impart intense signals to samples recovered from the Moon and other planetary bodies. Moreover, we show that silicate crystals bearing magnetic inclusions from Apollo samples formed at ∼3.9, 3.6, 3.3, and 3.2 billion years ago are capable of recording strong core dynamo–like fields but do not. Together, these data indicate that the Moon did not have a long-lived core dynamo. As a result, the Moon was not sheltered by a sustained paleomagnetosphere, and the lunar regolith should hold buried 3He, water, and other volatile resources acquired from solar winds and Earth’s magnetosphere over some 4 billion years.


Author(s):  
Rahaf Alkhadra ◽  
Joud Abuzaid ◽  
Mariam AlShammari ◽  
Nazeeruddin Mohammad
Keyword(s):  

2021 ◽  
Author(s):  
Anastasia Bondarenko

When satellites are placed in orbit, often times a specific orientation is required to achieve mission purposes. Different factors (such as atmospheric drag, magnetic fields, solar winds) or tumbling upon deployment from the launch vehicle, may result in an undesirable satellite orientation. To address these challenges, the ability to control the orientation, termed as attitude determination, becomes critical to any mission. This thesis will focus on developing an earth-pointing and sun-pointing mode in order to meet the objectives of the ESSENCE CubeSat. The earth-pointing mode orients the vehicle to point towards a desired target on the earth surface, and the sun-pointing mode orients the vehicle such that the maximum solar array surface area is exposed to the sun when the vehicle is out of eclipse.


2021 ◽  
Author(s):  
Anastasia Bondarenko

When satellites are placed in orbit, often times a specific orientation is required to achieve mission purposes. Different factors (such as atmospheric drag, magnetic fields, solar winds) or tumbling upon deployment from the launch vehicle, may result in an undesirable satellite orientation. To address these challenges, the ability to control the orientation, termed as attitude determination, becomes critical to any mission. This thesis will focus on developing an earth-pointing and sun-pointing mode in order to meet the objectives of the ESSENCE CubeSat. The earth-pointing mode orients the vehicle to point towards a desired target on the earth surface, and the sun-pointing mode orients the vehicle such that the maximum solar array surface area is exposed to the sun when the vehicle is out of eclipse.


Sign in / Sign up

Export Citation Format

Share Document