access controls
Recently Published Documents


TOTAL DOCUMENTS

210
(FIVE YEARS 49)

H-INDEX

13
(FIVE YEARS 2)

2022 ◽  
Author(s):  
Ugochi Ebere Eziukwu

Small and medium enterprises (SMEs) are depending more on their ICT framework however they do not possess the ability to direct it reasonably because of monetary impediments, limited assets, and insufficient specialized expertise. A sizeable number of SME executives expect that ICT security per remote access in their organizations is only like introducing a firewall and refreshing the antivirus program as frequently on a case by case basis. Remote access initiatives, against hacking systems and approaches, remote access controls, and numerous other related aspects are only investigated solely after security breaches. To improve remote access security in an organization comprehensively, four aspects including organizational, work process, data, and technical aspects must be figured out. With SMEs’ limited spending plans and more requirements for remote employees, it is exceptionally evident that they will remain easy prey for attackers since they cannot bear the cost of the typical secure remote access technologies and solutions. This paper explored a more ideal solution that will fit into the usual SME low remote access security financial plans but at the same time sufficiently powerful to protect them from digital and other IT attacks.


Author(s):  
Robert Kemp ◽  
Richard Smith

Access controls are a key area for any security program. However, the recommended access controls cannot always be implemented across the entire organisations. This is the case within critical infrastructure organisations that have both Information Technology and Operational Technology assets where many of the controls cannot be implemented on Operational Technology. Also, safety is a key concern for critical infrastructure organisations which is not always the case with many standard commercial organisations. This means the access controls while maintaining security must not impact safety which can occur if considerations are not given to Operational Technology and safety objectives. This paper will provide ways to manage the conflicts and issues that can occur and provide a process to allow critical infrastructure organisations to implement the required controls without impacting safety and security.


2021 ◽  
Author(s):  
A.M. Fayas ◽  
◽  
M.T.O.V. Peiris ◽  
K.G.P. Kalugalla ◽  

Public spaces are considered one of the fundamental elements in the urban context to promote leisure and recreation for urban dwellers. Public spaces contain variations within each other from the physical appearance, activities, and to usage factors. Private sector involvement for public space provision was increased in the recent past where public space ownership and access controls were shifted from solely public to private. This was criticized as privatization of public space and lead to debates on the decline of publicness and privacy of space. In this context, this research studied the public space from the user perception by considering publicly owned and operated versus privately owned and operated public spaces within Colombo, Sri Lanka. It is also explored the balance between ownership and access controls to determine the user preference in terms of the publicness features. User defined public space features were identified using 35 semi-structured interviews and 119 online questionnaire surveys. Qualitative analytic tools were used to evaluate the results including Content analysis and Space-shaper models with the support of NVivo software. The results revealed that publicly owned spaces were preferred by the users due to easy access and freedom for activities while privately owned spaces were preferred due to better infrastructure, safety, and security within. Also, it is identified that urban public space offered users the freedom to experience based on the levels of ownership and access controls. Finally, people preferred ownership by public over private sector as anecdotal evidence and values dominated in the public space attributes. This study provides key insights for planners to consider in the public space planning and the importance of private sector involvement and balance in the provision of optimal urban spaces in cities.


2021 ◽  
Author(s):  
S. Magesh ◽  
Sujatha Jamuna Anand ◽  
Niveditha V.R ◽  
Y. Pavan Kumar Reddy ◽  
P.S. Rajakumar

Pervasive computing has made life easy with communication devices. Today devise collaboration has enhanced everywhere in this environment. It has made computing devices invisible and the services. This pervasive framework provides applications with interactions, numerous cooperation and accessibility, and integration. The proposed work enumerates the applications, pervasive security challenges. It provides security predicaments by assigning certificate credentials, access controls, trust management, and some security techniques to overcome the security paradigms in these distributed networks with IoT and the pervasive computing framework. The work also encounters security perplexities in handling the security threats and user interaction issues. Nevertheless, security techniques are listed for various pervasive applications in distinct domains such as healthcare, industries, and transforming sensitive information. The smart applications with smart environments perhaps force towards the new technologies in the pervasive computing outlook. The work also embedded with middleware with the context-based situation in these pervasive applications


2021 ◽  
Author(s):  
Pedro H. M. Costa ◽  
André F. R. Cordeiro ◽  
Edson OliveiraJr

Open Data is one of the main concepts of Open Science, which has the purpose to make scientific research artifacts accessible for everyone. Open data provides recommendations and practices to get access and use data from scientific researches, in a free, permanent, citable, auditable and interchangeable way. To facilitate the data management, it is important to store them in a repository. Considering this context, this paper provides a comparison among five known open data repositories. We performed the comparison taking into account a set of criteria, such as, data format constraints, digital identifier, versioning of published datasets, curators of data collections, metadata schema, versioning and exportation, storage limit, paid services, redundancy and preservation, access controls and APIs. We present results and discussions, in terms of such criteria.


2021 ◽  
Author(s):  
Jeffrey Harris

We relied on reports of confirmed case incidence and test positivity, along with data on the movements of devices with location-tracking software, to evaluate a novel scheme of three concentric regulatory zones introduced by then New York Governor Cuomo to address an outbreak of COVID-19 in South Brooklyn in the fall of 2020. The regulatory scheme imposed differential controls on access to eating places, schools, houses of worship, large gatherings and other businesses within the three zones, but without restrictions on mobility. Within the central red zone, COVID-19 incidence temporarily declined from 131.2 per 100,000 population during the week ending October 3 to 62.5 per 100,000 by the week ending October 31, but then rebounded to 153.6 per 100,000 by the week ending November 28. Within the intermediate orange and peripheral yellow zones combined, incidence steadily rose from 28.8 per 100,000 during the week ending October 3 to 109.9 per 100,000 by the week ending November 28. Data on device visits to pairs of eating establishments straddling the red-orange boundary confirmed compliance with access controls. More general analysis of device movements showed stable patterns of mobility between and beyond zones unaffected by the Governor's orders. A geospatial regression model of COVID-19 incidence in relation to device movements across zip code tabulation areas identified a cluster of five high-mobility ZCTAs with estimated reproduction number 1.91 (95% confidence interval, 1.27-2.55). In the highly populous area of South Brooklyn, controls on access alone, without restrictions on mobility, were inadequate to halt an advancing COVID-19 outbreak.


2021 ◽  
Author(s):  
Fathima T ◽  
Vennila S M

IEEE 802 is used in LAN networks that expose or provide sensitive data to complex applications or services. These are protocols for accessing, managing and controlling access to network-based services and applications in general. Port-controlled network access controls network access and prevents the transmission and reception of nameless or unauthorized persons, leading to network interruption, service theft and data loss. This paper introduces a new approach to investigate whether a data packets in wired networks transferred to a management device is authenticated packet. The data packets are sent to the SDN from RAR and share the information associated with each packet with a limited rate for the access management and are received by the RFC. Here it detects whether the data packet arrived is accepted or restricted. The speed at the authentication start packet is restricted to manage the number of terminals that enter later authentication, and it avoids avalanche impact of wireless authentication which may cause faults to lots of terminals which enter later authentication at the same time.


2021 ◽  
Vol 13 (11) ◽  
pp. 283
Author(s):  
Michael Alicea ◽  
Izzat Alsmadi

Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.


2021 ◽  
Vol 11 (5) ◽  
pp. 529-535
Author(s):  
Jihane El Mokhtari ◽  
Anas Abou El Kalam ◽  
Siham Benhaddou ◽  
Jean-Philippe Leroy

This article is devoted to the topic of coupling access and inference controls into security policies. The coupling of these two mechanisms is necessary to strengthen the protection of the privacy of complex systems users. Although the PrivOrBAC access control model covers several privacy protection requirements, the risk of inferring sensitive data may exist. Indeed, the accumulation of several pieces of data to which access is authorized can create an inference. This work proposes an inference control mechanism implemented through multidimensional analysis. This analysis will take into account several elements such as the history of access to the data that may create an inference, as well as their influence on the inference. The idea is that this mechanism delivers metrics that reflect the level of risk. These measures will be considered in the access control rules and will participate in the refusal or authorization decision with or without obligation. This is how the coupling of access and inference controls will be applied. The implementation of this coupling will be done via the multidimensional OLAP databases which will be requested by the Policy Information Point, the gateway brick of XACML to the various external data sources, which will route the inference measurements to the decision-making point.


2021 ◽  
Vol 1 (13) ◽  
pp. 61-97
Author(s):  
Lucas Guerra da Silva ◽  
Vicente Tchalian

O presente estudo objetivou descrever um modus operandi cisgênero de divulgação de notícias falsas com conteúdos que remetem a gênero e sexualidade, com vistas a reconhecer estratégias comunicacionais de manipulação heteroterrorista nas eleições presidenciais do ano de 2018 no Brasil. Para tanto, utilizamos a categoria “controladores de acesso”, de Raewyn Connell (2016), aprofundando-a em outros possíveis desdobramentos, ao observarmos o contexto político brasileiro contemporâneo, que garante (1) rito jurídico de legitimidade do lugar para candidaturas e conteúdos com possibilidade de veiculação; (2) o trânsito de conteúdos falsos condizentes com o imaginário de quem encontra respaldo nesse lugar legitimado, em função da possibilidade de candidaturas cujos discursos oficiais manifestam publicamente a abjeção por determinados conteúdos – que tem impacto e afetação na vida de pessoas; e (3) o comportamento dos veículos de comunicação mainstream que tiveram ferramentas construídas para desmentir as notícias falsas, ou que negligenciaram a construção de tais ferramentas, aproveitando-se também do lugar do legitimado. O referencial teórico visa construir uma narrativa sobre comunicação de guerra, encontrando na história do século 20 as funções que determinadas veiculações de conteúdos têm, quando encontram legitimidade nos lugares dados como possíveis de pertencimento; e como essa história é, na realidade, história do presente, apresentando-se em roupagens outras no século 21, em um contínuo ancestrofuturista. Aqui, circunda todo o texto a comunicação na pós-humanidade, em que há complexas tramas comunicacionais e circulação de informações multiplataformas que nos constituem em hibridez humano-máquina. Os aspectos metodológicos contaram com (1) coleta e sistematização das notícias veiculadas durante o período selecionado, bem como (2) imagens (prints) feitas a partir das plataformas comunicacionais mainstream estudados (o tecnohabitat): as ferramentas Fato ou Fake, das Organizações Globo, e seus compartilhamentos no Facebook; com vistas a oferecer a possibilidade de o/a leitor/a visualizar efetivamente os formatos e diagramações das notícias em questão, considerando também a estética da comunicação como reflexão de análise. Por fim, a categoria de análise que propusemos e intitulamos “controladores de acesso da agenda pública” mostrou-se útil para pensar as relações entre cisgeneridade, branquitude, masculinidade e os espaços de trânsito comunicacionais, sobretudo, no que tange os aspectos políticos e sociais da vida pública que espetacularizam-se como nunca; e, como nunca, nos afetam. Palavras-chave: Masculinidades; Cisgeneridades; Controle de Acesso; Agenda Pública.


Sign in / Sign up

Export Citation Format

Share Document