An Encryption Scheme for Communication Internet SCADA Components
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Survey of methods for secure connection to the internet
NASA Astrophysics Data System (ADS)
Matsui, Shouichi
1994-04-01
This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
The impact of internet-connected control systems on the oil and gas industry
NASA Astrophysics Data System (ADS)
Martel, Ruth T.
In industry and infrastructure today, communication is a way of life. In the oil and gas industry, the use of devices that communicate with the network at large is both commonplace and expected. Unfortunately, security on these devices is not always best. Many industrial control devices originate from legacy devices not originally configured with security in mind. All infrastructure and industry today has seen an increase in attacks on their networks and in some cases, a very dramatic increase, which should be a cause for alarm and action. The purpose of this research was to highlight the threat that Internet-connected devices present to an organization's network in the oil and gas industry and ultimately, to the business and possibly even human life. Although there are several previous studies that highlight the problem of these Internet-connected devices, there remains evidence that security response has not been adequate. The analysis conducted on only one easily discovered device serves as an example of the ongoing issue of the security mindset in the oil and gas industry. The ability to connect to a network through an Internet-connected device gives a hacker an anonymous backdoor to do great damage in that network. The hope is that the approach to security in infrastructure and especially the oil and gas industry, changes before a major catastrophe occurs involving human life.
Code of Federal Regulations, 2011 CFR
2011-04-01
... security holders, proxy statement, information statement, or Notice of Internet Availability of Proxy...(e)(1) (with respect to annual reports to security holders, proxy statements, and Notices of Internet..., information statements, and Notices of Internet Availability of Proxy Materials) applicable to registrants...
Code of Federal Regulations, 2013 CFR
2013-04-01
... security holders, proxy statement, information statement, or Notice of Internet Availability of Proxy...(e)(1) (with respect to annual reports to security holders, proxy statements, and Notices of Internet..., information statements, and Notices of Internet Availability of Proxy Materials) applicable to registrants...
Code of Federal Regulations, 2010 CFR
2010-04-01
... security holders, proxy statement, information statement, or Notice of Internet Availability of Proxy...(e)(1) (with respect to annual reports to security holders, proxy statements, and Notices of Internet..., information statements, and Notices of Internet Availability of Proxy Materials) applicable to registrants...
Code of Federal Regulations, 2012 CFR
2012-04-01
... security holders, proxy statement, information statement, or Notice of Internet Availability of Proxy...(e)(1) (with respect to annual reports to security holders, proxy statements, and Notices of Internet..., information statements, and Notices of Internet Availability of Proxy Materials) applicable to registrants...
Code of Federal Regulations, 2014 CFR
2014-04-01
... security holders, proxy statement, information statement, or Notice of Internet Availability of Proxy...(e)(1) (with respect to annual reports to security holders, proxy statements, and Notices of Internet..., information statements, and Notices of Internet Availability of Proxy Materials) applicable to registrants...
Finding Effective Responses Against Cyber Attacks for Divided Nations
2015-12-01
Coordination Center LTE Long Term Evolution MAC Media Access Control MCRC Master Control and Reporting Center MEI Ministry of Electronics...satellites that aid Internet connections. Individual users can access the Internet via not only a wired connection up to 1 Gbps, but also by 4G LTE ...operate air-gapped intranets with security measures such as cryptographic modules that correspond to security levels. The MND does maintain the public
Command and Control of Space Assets Through Internet-Based Technologies Demonstrated
NASA Technical Reports Server (NTRS)
Foltz, David A.
2002-01-01
The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space experiment. A second Internet connection at the demonstration area was implemented to provide Internet connectivity to a group of workstations to serve as platforms for controlling the simulated space experiment. Installation of this Internet connection was coordinated with an Internet service provider (ISP) and local NASA Johnson Space Center personnel. Not only did this TCP/IP-based architecture prove that a principal investigator on the Internet can securely command and control on-orbit assets, it also demonstrated that valuable virtual testing of planned on-orbit activities can be conducted over the Internet prior to actual deployment in space.
ERIC Educational Resources Information Center
Campbell, Wendy
2017-01-01
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Functional Internet Literacy: Required Cognitive Skills with Implications for Instruction
ERIC Educational Resources Information Center
Johnson, Genevieve Marie
2007-01-01
Patterns of typical Internet use provide the basis for defining "functional Internet literacy." Internet use commonly includes communication, information, recreation, and commercial activities. Technical competence with connectivity, security, and downloads is a prerequisite for using the Internet for such activities. Bloom's taxonomy of cognitive…
Do You Lock Your Network Doors? Some Network Management Precautions.
ERIC Educational Resources Information Center
Neray, Phil
1997-01-01
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
Home security system using internet of things
NASA Astrophysics Data System (ADS)
Anitha, A.
2017-11-01
IoT refers to the infrastructure of connected physical devices which is growing at a rapid rate as huge number of devices and objects are getting associated to the Internet. Home security is a very useful application of IoT and we are using it to create an inexpensive security system for homes as well as industrial use. The system will inform the owner about any unauthorized entry or whenever the door is opened by sending a notification to the user. After the user gets the notification, he can take the necessary actions. The security system will use a microcontroller known as Arduino Uno to interface between the components, a magnetic Reed sensor to monitor the status, a buzzer for sounding the alarm, and a WiFi module, ESP8266 to connect and communicate using the Internet. The main advantages of such a system includes the ease of setting up, lower costs and low maintenance.
A malicious pattern detection engine for embedded security systems in the Internet of Things.
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
2014-12-16
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.
An Impact Assessment Model for Distributed Adaptive Security Situation Assessment
2005-01-01
the cargo manifest can be either a 56K modem-based TCP/IP connection (the oval labeled internet) or a 40K wireless modem connection ( cell phone ) that...via a UDP connection on the 40K wireless modem ( cell phone ). For each resource, either alternative may be used to achieve the same goal, but some...Manifests Comm-in Comp- power Comm- out JTF Internet (TCP-IP) Cell phone (TCP-IP) Internet (UDP) Cell phone (UDP) Manual Computer 4
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
Connecting to the Internet Securely; Protecting Home Networks CIAC-2324
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W J; Krystosek, P; Smith, J
2002-11-27
With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less
A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
2014-01-01
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382
Recommended Practice for Securing Control System Modems
DOE Office of Scientific and Technical Information (OSTI.GOV)
James R. Davidson; Jason L. Wright
2008-01-01
This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.
State of the Art of Network Security Perspectives in Cloud Computing
NASA Astrophysics Data System (ADS)
Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang
Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.
Safe at Any Speed: Securing Your Wi-Fi Network Is Easier and More Important than You Might Think
ERIC Educational Resources Information Center
Branzburg, Jeffrey
2007-01-01
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Lessons Learned from the Afghan Mission Network: Developing a Coalition Contingency Network
2014-01-01
SIPRNet Secret Internet Protocol Router Network SOP Standard Operating Procedure SVTC Secure Video Teleconference (or –Conferencing) TTP Tactics...Voice over internet protocol (VOIP) telephone connectivity • Email • Web browsing • Secure video teleconferencing (SVTC...10, 2012. As of January 15, 2013: http://www.guardian.co.uk/world/2012/oct/10/us-troops-jordan-syria-crisis Baldor, Lolita C., and Pauline Jelinek
Security and Privacy Grand Challenges for the Internet of Things
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Zarzhitsky, Dimitri V.; Carroll, Thomas E.
Abstract— The growth of the Internet of Things (IoT) is driven by market pressures, and while security is being considered, the relationship between the unintended consequences of billions of such devices connecting to the Internet cannot be described with existing mathematical methods. The possibilities for illicit surveillance through lifestyle analysis, unauthorized access to information, and new attack vectors will continue to increase by 2020, when up-to 50 billion devices may be connected. This paper discusses various kinds of vulnerabilities that can be expected to arise, and presents a research agenda for mitigating the worst of the impacts. We hope tomore » draw research attention to the potential dangers of IoT so that many of these problems can be avoided.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
... statement, information statement, or Notice of Internet Availability of Proxy Materials to more than one... annual reports to security holders, proxy statements, and Notices of Internet Availability of Proxy..., and Notices of Internet Availability of Proxy Materials) applicable to registrants, with the exception...
Code of Federal Regulations, 2012 CFR
2012-04-01
... statement, information statement, or Notice of Internet Availability of Proxy Materials to more than one... annual reports to security holders, proxy statements, and Notices of Internet Availability of Proxy..., and Notices of Internet Availability of Proxy Materials) applicable to registrants, with the exception...
Code of Federal Regulations, 2013 CFR
2013-04-01
... statement, information statement, or Notice of Internet Availability of Proxy Materials to more than one... annual reports to security holders, proxy statements, and Notices of Internet Availability of Proxy..., and Notices of Internet Availability of Proxy Materials) applicable to registrants, with the exception...
Code of Federal Regulations, 2011 CFR
2011-04-01
... statement, information statement, or Notice of Internet Availability of Proxy Materials to more than one... annual reports to security holders, proxy statements, and Notices of Internet Availability of Proxy..., and Notices of Internet Availability of Proxy Materials) applicable to registrants, with the exception...
Code of Federal Regulations, 2014 CFR
2014-04-01
... statement, information statement, or Notice of Internet Availability of Proxy Materials to more than one... annual reports to security holders, proxy statements, and Notices of Internet Availability of Proxy..., and Notices of Internet Availability of Proxy Materials) applicable to registrants, with the exception...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-21
... things, the telephone services provided by third-party carriers to the Exchange were still not fully... intermittent phone and internet service. Specifically, the wired telephone lines and internet connections for... and Internet issues. \\6\\ See Securities Exchange Act Release No. 68161 (Nov. 5, 2012), 77 FR 67704...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-28
.... Among other things, the telephone services provided by third-party carriers to the Exchange were still... Internet service. Specifically, the wired telephone lines and Internet connections for Floor brokers... aspects of Rules 36.20 and 36.21 because of ongoing telephone and Internet issues. \\5\\ See Securities...
Designing a Secure Exam Management System (SEMS) for M-Learning Environments
ERIC Educational Resources Information Center
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc
2016-01-01
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
ihear[R] Internet Therapy Program: A Program by St. Joseph Institute for the Deaf
ERIC Educational Resources Information Center
Broekelmann, Cheryl
2012-01-01
The ihear[R] Internet Therapy Program (ihear) provides effective, individualized, and interactive therapy that is tailored to each child's specific needs through a secure, high-quality Internet connection. The program brings listening and spoken language services directly to schools and families. The foundation for ihear is based on the St. Joseph…
Computer Security Primer: Systems Architecture, Special Ontology and Cloud Virtual Machines
ERIC Educational Resources Information Center
Waguespack, Leslie J.
2014-01-01
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
2018-01-01
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
Ali, Bako; Awad, Ali Ismail
2018-03-08
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.
Performance optimization of internet firewalls
NASA Astrophysics Data System (ADS)
Chiueh, Tzi-cker; Ballman, Allen
1997-01-01
Internet firewalls control the data traffic in and out of an enterprise network by checking network packets against a set of rules that embodies an organization's security policy. Because rule checking is computationally more expensive than routing-table look-up, it could become a potential bottleneck for scaling up the performance of IP routers, which typically implement firewall functions in software. in this paper, we analyzed the performance problems associated with firewalls, particularly packet filters, propose a good connection cache to amortize the costly security check over the packets in a connection, and report the preliminary performance results of a trace-driven simulation that show the average packet check time can be reduced by a factor of 2.5 at the least.
31 CFR 363.5 - How do I contact Fiscal Service?
Code of Federal Regulations, 2014 CFR
2014-07-01
...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE REGULATIONS GOVERNING SECURITIES...” feature within TreasuryDirect ® to communicate information to us over a secure Internet connection. (b... otherwise. We are not responsible for the security of e-mail messages you may send to us, or replies we may...
Designing Secure Library Networks.
ERIC Educational Resources Information Center
Breeding, Michael
1997-01-01
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Glucoweb: a case study of secure, remote biomonitoring and communication.
Nigrin, D J; Kohane, I S
2000-01-01
As the Internet begins to play a greater role in many healthcare processes, it is inevitable that remote monitoring of patients' physiological parameters over the Internet will become increasingly commonplace. Internet-based communication between patients and their healthcare providers has already become prevalent, and has gained significant attention in terms of confidentiality issues. However, transmission of data directly from patients' physiological biomonitoring devices over the Web has garnered significantly less focus, especially in the area of authentication and security. In this paper, we describe a prototype system called Glucoweb, which allows patients with diabetes mellitus to transmit their self-monitored blood glucose data directly from their personal glucometer device to their diabetes care provider over the Internet. No customized software is necessary on the patient's computer, only a Web browser and active Internet connection. We use this example to highlight key authentication and security measures that should be considered for devices that transmit healthcare data to remote locations.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-12-30
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-01-01
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831
31 CFR 363.5 - How do I contact Public Debt?
Code of Federal Regulations, 2012 CFR
2012-07-01
... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN... TreasuryDirect ® to communicate information to us over a secure Internet connection. (b) Emails may be sent... responsible for the security of e-mail messages you may send to us, or replies we may send to you. (c) Letters...
31 CFR 363.5 - How do I contact Public Debt?
Code of Federal Regulations, 2013 CFR
2013-07-01
... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN... TreasuryDirect ® to communicate information to us over a secure Internet connection. (b) Emails may be sent... responsible for the security of e-mail messages you may send to us, or replies we may send to you. (c) Letters...
31 CFR 363.5 - How do I contact Public Debt?
Code of Federal Regulations, 2011 CFR
2011-07-01
... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN... TreasuryDirect ® to communicate information to us over a secure Internet connection. (b) Emails may be sent... responsible for the security of e-mail messages you may send to us, or replies we may send to you. (c) Letters...
Tao of Gateway: Providing Internet Access to Licensed Databases.
ERIC Educational Resources Information Center
McClellan, Gregory A.; Garrison, William V.
1997-01-01
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Study on Information Security and e-Trust in Spanish households
NASA Astrophysics Data System (ADS)
Aguado, José
The study on Information Security and e-Trust in Spanish households has been conducted by INTECO (The National Institute of Communication Technologies) through the Information Security Observatory. It is a study on the incidence and trust of users in the Internet by means of measuring the frequency of the episodes of individual risk in a wide sample of users that are monitored online on a monthly basis, combining quantitative data of incidences (monthly scans of home computers) and qualitative perception data (quarterly surveys). The study is supplied with data from more than 3,000 households with Internet connection, spread across the whole country.
One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.
Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor
2016-10-13
The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things.
Transformative Rendering of Internet Resources
2012-10-01
4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any
NASA Astrophysics Data System (ADS)
Zhang, Hong
2017-06-01
In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.
One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices
Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor
2016-01-01
The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things. PMID:27754378
Data mining technique for a secure electronic payment transaction using MJk-RSA in mobile computing
NASA Astrophysics Data System (ADS)
G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.
2012-04-01
Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
ERIC Educational Resources Information Center
Liesen, Joseph J.
2017-01-01
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
31 CFR 363.5 - How do I contact Public Debt?
Code of Federal Regulations, 2010 CFR
2010-07-01
... TreasuryDirect ® to communicate information to us over a secure Internet connection. (b) Emails may be sent... should be addressed to the address provided on our web site at http://www.treasurydirect.gov/write.htm...
Communication Security for Control Systems in Smart Grid
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.
Privacy and security of patient data in the pathology laboratory
Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sparks, Sandy; Miller, Russell B.
This project evaluated the information security posture of QUALCOMM regarding its Internet connections. It also enhanced and refined the ability of LLNL to perform these evaluations and add to its body of knowledge concerning Internet threats, vulnerabilities, and countermeasures. The evaluations required a high degree of trust and cooperation between the assessors (LLNL) and the target organization (QUALCOMM). Without this high level of cooperation, the activity could easily have become an adversarial audit type situation and counterproductive to all parties.
Subjective Audio Quality over a Secure IEEE 802.11n Draft 2.0 Wireless Local Area Network
2009-03-01
hereafter referred to as 802.11) provide users with mobile connectivity without the need for expensive and inflexible wiring. The 802.11n extension, for...through another protocol, such as Secure / Multipurpose Internet Mail Extensions ( S /MIME). SDPS is, therefore, not a complete solution for secure key...number of packets per second (“Pkts/ s ”) are visible. Audio recordings are taken at AFIT within range of several other 802.11g APs as shown in Figure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lurie, Gordon
2007-01-02
The cell phone software allows any Java enabled cell phone to view sensor and meteorological data via an internet connection using a secure connection to the CB-EMIS Web Service. Users with appropriate privileges can monitor the state of the sensors and perform simple maintenance tasks remotely. All sensitive data is downloaded from the web service, thus protecting sensitive data in the event a cell phone is lost.
Old Buildings Broadband Home Networks: Technologies and Services Overview
NASA Astrophysics Data System (ADS)
Fantacci, Romano; Pecorella, Tommaso; Micciullo, Luigia; Viti, Roberto; Pasquini, Vincenzo; Calì, Marco
2014-05-01
Internet broadband access is becoming a reality in many countries. To fully exploit the benefits from high-speed connection, both suitable home network connectivity and advanced services support have to be made available to the user. In this article, issues relative to the upgrade of existing home networks, particularly in old buildings, together with networking and security requirements are addressed, and possible solutions are proposed.
Improving Remote Voting Security with CodeVoting
NASA Astrophysics Data System (ADS)
Joaquim, Rui; Ribeiro, Carlos; Ferreira, Paulo
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors.
75 FR 63206 - Notice of Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
... and cooperative agreement partners are required to submit new technology reports indicating new... technology to prepare patent reports through a hyperlink to the electronic New Technology Reporting Web (e...) to report new technology and patent notification directly, via a secure Internet connection, to NASA...
Computer Center Reference Manual. Volume 1
1990-09-30
Unlimited o- 0 0 91o1 UNCLASSI FI ED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE...with connection to INTERNET ) (host tables allow transfer to some other networks) OASYS - the DTRC Office Automation System The following can be reached...and buffers, two windows, and some word processing commands. Advanced editing commands are entered through the use of a command line. EVE las its own
An Alliance Built Upon Necessity: AQIM, Boko Haram, and the African Arch of Instability
2013-06-01
of globalization and connectivity along with the advent of free trade, instant communication , internet usage, social media, and mass transportation...kidnappings, and mass suicide bombing attacks, Nigerian government security forces consequently use disproportionate large-scale security sweeps in those...Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE June 2013 3
Wind turbine remote control using Android devices
NASA Astrophysics Data System (ADS)
Rat, C. L.; Panoiu, M.
2018-01-01
This paper describes the remote control of a wind turbine system over the internet using an Android device, namely a tablet or a smartphone. The wind turbine workstation contains a LabVIEW program which monitors the entire wind turbine energy conversion system (WECS). The Android device connects to the LabVIEW application, working as a remote interface to the wind turbine. The communication between the devices needs to be secured because it takes place over the internet. Hence, the data are encrypted before being sent through the network. The scope was the design of remote control software capable of visualizing real-time wind turbine data through a secure connection. Since the WECS is fully automated and no full-time human operator exists, unattended access to the turbine workstation is needed. Therefore the device must not require any confirmation or permission from the computer operator in order to control it. Another condition is that Android application does not have any root requirements.
Prototype system of secure VOD
NASA Astrophysics Data System (ADS)
Minemura, Harumi; Yamaguchi, Tomohisa
1997-12-01
Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.
Clark, Barry; Wachowiak, Bartosz; Crawford, Ewan W.; Jakubowski, Zenon; Kabata, Janusz
1998-01-01
A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLinkTM LIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP ‘get’ and ‘post’ operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols. PMID:18924820
Clark, B; Wachowiak, B; Crawford, E W; Jakubowski, Z; Kabata, J
1998-01-01
A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLink(TM) LIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP 'get' and 'post' operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Park, Namje; Kang, Namhi
2015-12-24
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.
Communications Security: A Timeless Requirement While Conducting Warfare
2012-04-10
services remotely to connect to the Global Information Grid ( GIG ). The GIG is the essential gateway to the Internet that DISA uses to allow service...nations that 16 thrive off free market and global economies . These hostile actors, such as Al Qaida or Hezbollah, do not posses the
Cybersecurity Strategy in Developing Nations: A Jamaica Case Study
ERIC Educational Resources Information Center
Newmeyer, Kevin Patrick
2014-01-01
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Security Frameworks for Machine-to-Machine Devices and Networks
NASA Astrophysics Data System (ADS)
Demblewski, Michael
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
Developing Thoughtful "Cybercitizens"
ERIC Educational Resources Information Center
Berson, Michael J.; Berson, Ilene R.
2004-01-01
What does it mean to be a citizen in a digital world where technology has facilitated global connections? The children of today are immersed in a digital age, and as increasing numbers of students go online, they require skills to securely and responsibly take full advantage of computers and the Internet. Despite the natural enthusiasm that many…
Virtual private networks can provide reliable IT connections.
Kabachinski, Jeff
2006-01-01
A VPN is a private network that uses a public network, such as the Internet, to connect remote sites and users together. Instead of using a dedicated hard-wired connection as in a trusted connection or leased lines, a VPN uses a virtual connection routed through the Internet from the organization's private network to the remote site or employee. Typical VPN services allow for security in terms of data encryption as well as means to authenticate, authorize, and account for all the traffic. VPN services allow the organization to use whatever network operating system they wish as it also encapsulate your data into the protocols needed to transport data across public lines. The intention of this IT World article was to give the reader an introduction to VPNs. Keep in mind that there are no standard models for a VPN. You're likely to come across many vendors presenting the virtues of their VPN applications and devices when you Google "VPN." However the general uses, concepts, and principles outlined here should give you a fighting chance to read through the marketing language in the online ads and "white papers."
The enhancement of security in healthcare information systems.
Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De
2012-06-01
With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
Park, Namje; Kang, Namhi
2015-01-01
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759
NASA Astrophysics Data System (ADS)
Wolthuis, Reinder; Broenink, Gerben; Fransen, Frank; Schultz, Sven; de Vries, Arnout
This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.
Security policies and trust in ubiquitous computing.
Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand
2008-10-28
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
Gbadamosi, Semiu Olatunde; Eze, Chuka; Olawepo, John Olajide; Iwelunmor, Juliet; Sarpong, Daniel F; Ogidi, Amaka Grace; Patel, Dina; Oko, John Okpanachi; Onoka, Chima; Ezeanolue, Echezona Edozie
2018-01-15
Community-based strategies to test for HIV, hepatitis B virus (HBV), and sickle cell disease (SCD) have expanded opportunities to increase the proportion of pregnant women who are aware of their diagnosis. In order to use this information to implement evidence-based interventions, these results have to be available to skilled health providers at the point of delivery. Most electronic health platforms are dependent on the availability of reliable Internet connectivity and, thus, have limited use in many rural and resource-limited settings. Here we describe our work on the development and deployment of an integrated mHealth platform that is able to capture medical information, including test results, and encrypt it into a patient-held smartcard that can be read at the point of delivery without the need for an Internet connection. We engaged a team of implementation scientists, public health experts, and information technology specialists in a requirement-gathering process to inform the design of a prototype for a platform that uses smartcard technology, database deployment, and mobile phone app development. Key design decisions focused on usability, scalability, and security. We successfully designed an integrated mHealth platform and deployed it in 4 health facilities across Benue State, Nigeria. We developed the Vitira Health platform to store test results of HIV, HBV, and SCD in a database, and securely encrypt the results on a Quick Response code embedded on a smartcard. We used a mobile app to read the contents on the smartcard without the need for Internet connectivity. Our findings indicate that it is possible to develop a patient-held smartcard and an mHealth platform that contains vital health information that can be read at the point of delivery using a mobile phone-based app without an Internet connection. ClinicalTrials.gov NCT03027258; https://clinicaltrials.gov/ct2/show/NCT03027258 (Archived by WebCite at http://www.webcitation.org/6owR2D0kE). ©Semiu Olatunde Gbadamosi, Chuka Eze, John Olajide Olawepo, Juliet Iwelunmor, Daniel F Sarpong, Amaka Grace Ogidi, Dina Patel, John Okpanachi Oko, Chima Onoka, Echezona Edozie Ezeanolue. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 15.01.2018.
ROVER: A DNS-Based Method to Detect and Prevent IP Hijacks
ERIC Educational Resources Information Center
Gersch, Joseph E.
2013-01-01
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…
Secure HL7 transactions using Internet mail (Internet draft).
Schadow, Gunther; Tucker, Mark; Rishel, Wes
2002-01-01
The document describes the applicability of the Internet standardisation efforts on secure electronic data interchange (EDI) transactions for Health Level-7 (HL7), an EDI standard for Healthcare used world-wide. The document heavily relies on the work in progress by the IETF EDIINT working group. It is in most parts a restatement of the EDIINTs requirements document and application statement 1 (AS#1) tailored to the needs of the HL7 audience. The authors tried to make the document as self consistent as possible. The goal is to give to the reader who is not a security or Internet standards expert enough foundational and detail information to enable him to build communication software that complies to the Internet standards. Even though the authors rely on and promote the respective Internet standards and drafts, they did not withstand from commenting on and criticising the work where they see upcoming problems in use with HL7 or other EDI protocols that have not been in the initial focus of the EDIINT working group. The authors make suggestions to add parameters to the specification of the MIME type for EDI messages in RFC 1767 in order to enhance functionality. The authors give use cases for a larger subset of disposition types and modifiers of message disposition notifications. One key issue where the document goes beyond the current EDIINT drafts is the concept of non-repudiation of commitment to an EDI transaction. Secure EDI transactions should be regarded as "distributed contracts," i.e. not only the sending and receiving of single messages should be non-refutable but also the connection between messages interchanges. In anticipation of this requirement HL7 usually requires a response message to be sent to acknowledge every transaction. The authors therefore have the requirement to securely couple an EDI response message to its request message. Given the current shape of RFC 1767 this is generally possible only if a response message is coupled with an MDN receipt and the combination of both signed by the responder. The document describes a protocol to bundle MDN and response that uses the MIME multi-part/related content type in RFC 2112.
Eze, Chuka; Olawepo, John Olajide; Iwelunmor, Juliet; Sarpong, Daniel F; Ogidi, Amaka Grace; Patel, Dina; Oko, John Okpanachi; Onoka, Chima; Ezeanolue, Echezona Edozie
2018-01-01
Background Community-based strategies to test for HIV, hepatitis B virus (HBV), and sickle cell disease (SCD) have expanded opportunities to increase the proportion of pregnant women who are aware of their diagnosis. In order to use this information to implement evidence-based interventions, these results have to be available to skilled health providers at the point of delivery. Most electronic health platforms are dependent on the availability of reliable Internet connectivity and, thus, have limited use in many rural and resource-limited settings. Objective Here we describe our work on the development and deployment of an integrated mHealth platform that is able to capture medical information, including test results, and encrypt it into a patient-held smartcard that can be read at the point of delivery without the need for an Internet connection. Methods We engaged a team of implementation scientists, public health experts, and information technology specialists in a requirement-gathering process to inform the design of a prototype for a platform that uses smartcard technology, database deployment, and mobile phone app development. Key design decisions focused on usability, scalability, and security. Results We successfully designed an integrated mHealth platform and deployed it in 4 health facilities across Benue State, Nigeria. We developed the Vitira Health platform to store test results of HIV, HBV, and SCD in a database, and securely encrypt the results on a Quick Response code embedded on a smartcard. We used a mobile app to read the contents on the smartcard without the need for Internet connectivity. Conclusions Our findings indicate that it is possible to develop a patient-held smartcard and an mHealth platform that contains vital health information that can be read at the point of delivery using a mobile phone-based app without an Internet connection. Trial Registration ClinicalTrials.gov NCT03027258; https://clinicaltrials.gov/ct2/show/NCT03027258 (Archived by WebCite at http://www.webcitation.org/6owR2D0kE) PMID:29335234
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
GOOSE: semantic search on internet connected sensors
NASA Astrophysics Data System (ADS)
Schutte, Klamer; Bomhof, Freek; Burghouts, Gertjan; van Diggelen, Jurriaan; Hiemstra, Peter; van't Hof, Jaap; Kraaij, Wessel; Pasman, Huib; Smith, Arthur; Versloot, Corne; de Wit, Joost
2013-05-01
More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mission execution. Smart access to all sensor data acts as enabler for questions such as "Is there a person behind this building" or "Alert me when a vehicle approaches". The GOOSE concept has the ambition to provide the capability to search semantically for any relevant information within "all" (including imaging) sensor streams in the entire Internet of sensors. This is similar to the capability provided by presently available Internet search engines which enable the retrieval of information on "all" web pages on the Internet. In line with current Internet search engines any indexing services shall be utilized cross-domain. The two main challenge for GOOSE is the Semantic Gap and Scalability. The GOOSE architecture consists of five elements: (1) an online extraction of primitives on each sensor stream; (2) an indexing and search mechanism for these primitives; (3) a ontology based semantic matching module; (4) a top-down hypothesis verification mechanism and (5) a controlling man-machine interface. This paper reports on the initial GOOSE demonstrator, which consists of the MES multimedia analysis platform and the CORTEX action recognition module. It also provides an outlook into future GOOSE development.
Rajan, J Pandia; Rajan, S Edward
2018-01-01
Wireless physiological signal monitoring system designing with secured data communication in the health care system is an important and dynamic process. We propose a signal monitoring system using NI myRIO connected with the wireless body sensor network through multi-channel signal acquisition method. Based on the server side validation of the signal, the data connected to the local server is updated in the cloud. The Internet of Things (IoT) architecture is used to get the mobility and fast access of patient data to healthcare service providers. This research work proposes a novel architecture for wireless physiological signal monitoring system using ubiquitous healthcare services by virtual Internet of Things. We showed an improvement in method of access and real time dynamic monitoring of physiological signal of this remote monitoring system using virtual Internet of thing approach. This remote monitoring and access system is evaluated in conventional value. This proposed system is envisioned to modern smart health care system by high utility and user friendly in clinical applications. We claim that the proposed scheme significantly improves the accuracy of the remote monitoring system compared to the other wireless communication methods in clinical system.
Deception Using an SSH Honeypot
2017-09-01
the device itself but also the device’s cloud and mobile infrastructure. This increase in unsecured devices connected to the Internet presents...have SSH enabled on their systems without knowledge that this service is running. Computer -security professionals use several techniques to gain...early 2000s. Honeypots are decoy computer systems intended for no other purpose than to collect data on attackers. They gather information about
2013-09-01
control GCE ground combat element LCE logistics combat element MAGTF Marine Air Ground Task Force MWCS Marine Wing Communications Squadron NPS Naval...elements: command element (CE), ground combat el- ement ( GCE ), aviation combat element (ACE), and logistics combat element (LCE). Each ele- ment...This layer provides unimpeded high-speed connectivity between remote sites and the Internet. Limited security policies are applied at this level to
Communication Breakdown: DHS Operations During a Cyber Attack
2010-12-01
is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and...maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of...Presidential Directive, Malware, National Exercise, Quadrennial Homeland Security Review , Trusted Internet Connections, Zero-Day Exploits 16. PRICE CODE 17
Internet Connections: Understanding Your Access Options.
ERIC Educational Resources Information Center
Notess, Greg R.
1994-01-01
Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…
The security concern on internet banking adoption among Malaysian banking customers.
Sudha, Raju; Thiagarajan, A S; Seetharaman, A
2007-01-01
The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.
Home Computer and Internet User Security
2005-01-01
Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB
Live video monitoring robot controlled by web over internet
NASA Astrophysics Data System (ADS)
Lokanath, M.; Akhil Sai, Guruju
2017-11-01
Future is all about robots, robot can perform tasks where humans cannot, Robots have huge applications in military and industrial area for lifting heavy weights, for accurate placements, for repeating the same task number of times, where human are not efficient. Generally robot is a mix of electronic, electrical and mechanical engineering and can do the tasks automatically on its own or under the supervision of humans. The camera is the eye for robot, call as robovision helps in monitoring security system and also can reach into the places where the human eye cannot reach. This paper presents about developing a live video streaming robot controlled from the website. We designed the web, controlling for the robot to move left, right, front and back while streaming video. As we move to the smart environment or IoT (Internet of Things) by smart devices the system we developed here connects over the internet and can be operated with smart mobile phone using a web browser. The Raspberry Pi model B chip acts as heart for this system robot, the sufficient motors, surveillance camera R pi 2 are connected to Raspberry pi.
Information Security: Computer Hacker Information Available on the Internet
1996-06-05
INFORMATION SECURITY Computer Hacker Information Available on the Internet Statement for the Record of...Report Type N/A Dates Covered (from... to) - Title and Subtitle INFORMATION SECURITY Computer Hacker Information Available on the Internet Contract...1996 4. TITLE AND SUBTITLE Information Security: Computer Hacker Information Available on the Internet 5. FUNDING NUMBERS 6. AUTHOR(S) Jack L.
PKI security in large-scale healthcare networks.
Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos
2012-06-01
During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.
The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2015-01-01
This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.
Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication
NASA Astrophysics Data System (ADS)
Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn
2014-11-01
Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.
NSI customer service representatives and user support office: NASA Science Internet
NASA Technical Reports Server (NTRS)
1991-01-01
The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.
Internetting tactical security sensor systems
NASA Astrophysics Data System (ADS)
Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.
1998-08-01
The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.
17 CFR 240.14a-16 - Internet availability of proxy materials.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Internet availability of proxy... Under the Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-16 Internet... the security holder a Notice of Internet Availability of Proxy Materials, as described in this section...
17 CFR 240.14a-16 - Internet availability of proxy materials.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Internet availability of proxy... Under the Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-16 Internet... the security holder a Notice of Internet Availability of Proxy Materials, as described in this section...
17 CFR 240.14a-16 - Internet availability of proxy materials.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Internet availability of proxy... Under the Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-16 Internet... the security holder a Notice of Internet Availability of Proxy Materials, as described in this section...
17 CFR 240.14a-16 - Internet availability of proxy materials.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Internet availability of proxy... Under the Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-16 Internet... the security holder a Notice of Internet Availability of Proxy Materials, as described in this section...
17 CFR 240.14a-16 - Internet availability of proxy materials.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Internet availability of proxy... Under the Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-16 Internet... the security holder a Notice of Internet Availability of Proxy Materials, as described in this section...
2009-05-01
information technology revolution. The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient...thriving digital infrastructure. In addi tion, differing national and regional laws and practices —such as laws concerning the investigation and... technology has transformed the global economy and connected people and markets in ways never imagined. To realize the full benefits of the digital
Improving Smart Home Concept with the Internet of Things Concept Using RaspberryPi and NodeMCU
NASA Astrophysics Data System (ADS)
Amri, Yasirli; Andri Setiawan, Mukhammad
2018-03-01
The Internet of things (IoT) is getting more tractions in recent years. One of the usage scenario of IoT is smart home. Smart home basically provides home automation for installed devices at home such as thermostat, lighting, air conditioning, etc and allows devices connected to the Internet to be monitored and controlled remotely by user. However many studies on smart home concept focusing only on few main features. They still lack of important usage of IoT i.e. providing energy efficiency, energy monitoring, dealing with security, and managing privacy. This paper proposes a smart home system with RaspberryPi and NodeMCU as the backend that not only serves as home automation and merely a switch replacement, but to also record and report important things to the owner of the house e.g. when someone trespasses the house (security perimeter), or to report the calculation of how much money has been spent in consuming the electrical appliances. We successfully examine our proposed system in a real life working scenario. The communication between user and the system is done using Telegram Bot.
K-12 access to internet: Securing the legal framework
NASA Astrophysics Data System (ADS)
Blauassociate, Andrew
1993-09-01
While many people in government, education, and industry have lauded the potential educational value of Internet access for students in grades K-12, there is as yet no legal or regulatory framework within which this new medium is being offered to students. The Communications Policy Forum, a nonpartisan project of the Electronic Frontier Foundation, recently convened a roundtable to discuss some of the legal issues that arise when K-12 schools provide Internet access to their students. Approximately 15 people, representing carriers who provide connections to the Internet, schools or school systems who are connected to the Internet, and legal experts with expertise in this and related areas, met to discuss questions of legal liability as this new medium enters an educational setting for minors. The following attempts to capture the major issues, suggestions, and directions for further collaborative efforts raised during the course of that discussion. In brief, the group identified statutory language aimed at other types of electronic communication that may offer some guidance; was briefed on a host of state laws that could be used to prosecute providers of certain materials found on the Internet; and concluded that there is no case law that clearly applies to this setting. The discussion revealed an interest in anticipating issues and developing responses before problems arose, and the need for shared approaches to allow carriers to move forward in serving and expanding this field. Members of the group offered to pursue these issues jointly and agreed upon a handful of concrete steps for further exploration and discussion.
Physician office readiness for managing Internet security threats.
Keshavjee, K; Pairaudeau, N; Bhanji, A
2006-01-01
Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.
Physician Office Readiness for Managing Internet Security Threats
Keshavjee, K; Pairaudeau, N; Bhanji, A
2006-01-01
Internet security threats are evolving toward more targeted and focused attacks. Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done. PMID:17238600
Interactive telemedicine solution based on a secure mHealth application.
Eldeib, Ayman M
2014-01-01
In dynamic healthcare environments, caregivers and patients are constantly moving. To increase the healthcare quality when it is necessary, caregivers need the ability to reach each other and securely access medical information and services from wherever they happened to be. This paper presents an Interactive Telemedicine Solution (ITS) to facilitate and automate the communication within a healthcare facility via Voice over Internet Protocol (VOIP), regular mobile phones, and Wi-Fi connectivity. Our system has the capability to exchange/provide securely healthcare information/services across geographic barriers through 3G/4G wireless communication network. Our system assumes the availability of an Electronic Health Record (EHR) system locally in the healthcare organization and/or on the cloud network such as a nation-wide EHR system. This paper demonstrate the potential of our system to provide effectively and securely remote healthcare solution.
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance
Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti
2010-01-01
Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.
Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti
2010-01-01
Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.
AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.
AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879
NASA Astrophysics Data System (ADS)
Riesmeier, Joerg; Eichelberg, Marco; Kleber, Klaus; Groenemeyer, Dietrich H.; Oosterwijk, Herman J.; Jensch, Peter F.
2002-05-01
With the release of 'DICOM Structured Reporting' (SR) as an official extension of the standard about two years ago, DICOM has entered a new domain that is only indirectly related to medical imaging. Basically, DICOM SR is a general model allowing to encode medical reports in a structured manner in DICOM's tag-based format. Therefore, the existing DICOM infrastructure can be used to archive and communicate structured reports, with only relatively small changes to existing systems. As a consequence of the introduction of medical reports in a digital form, the relevance of security measures increases significantly. We have developed a prototype implementation of DICOM structured reporting together with the new security extensions for secure transport connections and digital signatures. The application allows to create, read and modify any SR document, to digitally sign an SR document in whole or part and to transmit such documents over a network. While the secure transport connection protects data from modifications or unauthorized access only during transmission, digital signatures provide a lifetime integrity check and, therefore, maintain the legal document status of structured reports. The application has been successfully demonstrated at RSNA 2000 and ECR 2001, and is freely available on the Internet.
Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E
2016-08-01
Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, P<0.001 for both). Education and sex-related differences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.
Graphical Internet Access on a Budget: Making a Pseudo-SLIP Connection.
ERIC Educational Resources Information Center
McCulley, P. Michael
1995-01-01
Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…
Why You Should Establish a Connection to the Internet.
ERIC Educational Resources Information Center
Hill, Judy A.; Misic, Mark M.
1996-01-01
Provides the rationale for establishing a connection to the Internet. Describes Internet services, including e-mail, telnet, file transfer protocol (FTP), USENET, gopher, Archie, and World Wide Web. Identifies reasons why the Internet is a valuable tool. Outlines steps for establishing a connection and discusses the future of the Internet. A…
Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance.
Kramer, Daniel B; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R
2012-01-01
Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware.
Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance
Kramer, Daniel B.; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R.
2012-01-01
Background Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. Methods We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Results Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Conclusions Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware. PMID:22829874
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
Modeling structure and resilience of the dark network.
De Domenico, Manlio; Arenas, Alex
2017-02-01
While the statistical and resilience properties of the Internet are no longer changing significantly across time, the Darknet, a network devoted to keep anonymous its traffic, still experiences rapid changes to improve the security of its users. Here we study the structure of the Darknet and find that its topology is rather peculiar, being characterized by a nonhomogeneous distribution of connections, typical of scale-free networks; very short path lengths and high clustering, typical of small-world networks; and lack of a core of highly connected nodes. We propose a model to reproduce such features, demonstrating that the mechanisms used to improve cybersecurity are responsible for the observed topology. Unexpectedly, we reveal that its peculiar structure makes the Darknet much more resilient than the Internet (used as a benchmark for comparison at a descriptive level) to random failures, targeted attacks, and cascade failures, as a result of adaptive changes in response to the attempts of dismantling the network across time.
Modeling structure and resilience of the dark network
NASA Astrophysics Data System (ADS)
De Domenico, Manlio; Arenas, Alex
2017-02-01
While the statistical and resilience properties of the Internet are no longer changing significantly across time, the Darknet, a network devoted to keep anonymous its traffic, still experiences rapid changes to improve the security of its users. Here we study the structure of the Darknet and find that its topology is rather peculiar, being characterized by a nonhomogeneous distribution of connections, typical of scale-free networks; very short path lengths and high clustering, typical of small-world networks; and lack of a core of highly connected nodes. We propose a model to reproduce such features, demonstrating that the mechanisms used to improve cybersecurity are responsible for the observed topology. Unexpectedly, we reveal that its peculiar structure makes the Darknet much more resilient than the Internet (used as a benchmark for comparison at a descriptive level) to random failures, targeted attacks, and cascade failures, as a result of adaptive changes in response to the attempts of dismantling the network across time.
Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.
Hahn, Erin; Blazes, David; Lewis, Sheri
2016-01-01
Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Electronic patient data confidentiality practices among surgical trainees: questionnaire study.
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-10-01
The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.
A selective involvement of putamen functional connectivity in youth with internet gaming disorder.
Hong, Soon-Beom; Harrison, Ben J; Dandash, Orwa; Choi, Eun-Jung; Kim, Seong-Chan; Kim, Ho-Hyun; Shim, Do-Hyun; Kim, Chang-Dai; Kim, Jae-Won; Yi, Soon-Hyung
2015-03-30
Brain cortico-striatal circuits have consistently been implicated in the pathology of addiction related disorders. We applied a reliable seed-based analysis of the resting-state brain activity to comprehensively delineate the subdivisions of striatal functional connectivity implicated in internet gaming disorder. Among twelve right-handed male adolescents with internet gaming disorder and 11 right-handed and gender-matched healthy controls, we examined group differences in the functional connectivity of dorsal and ventral subdivisions of the caudate nucleus and putamen, as well as the association of these connectivity indices with behavioral measures of internet use. Adolescents with internet gaming disorder showed significantly reduced dorsal putamen functional connectivity with the posterior insula-parietal operculum. More time spent playing online games predicted significantly greater functional connectivity between the dorsal putamen and bilateral primary somatosensory cortices in adolescents with internet gaming disorder, and significantly lower functional connectivity between the dorsal putamen and bilateral sensorimotor cortices in healthy controls. The dorsal putamen functional connectivity was significantly and specifically different in adolescents with internet gaming disorder. The findings suggest a possible biomarker of internet gaming disorder. Copyright © 2015. Published by Elsevier B.V.
Das, Ashok Kumar; Goswami, Adrijit
2013-06-01
Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226
Security threat assessment of an Internet security system using attack tree and vague sets.
Chang, Kuei-Hu
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
Optimizing the Long-Term Capacity Expansion and Protection of Iraqi Oil Infrastructure
2005-09-01
remotely using only a computer and a high-speed internet connection. I only wish that the Navy as a whole were as receptive to telecommuting as you...INTRODUCTION Formula for success: Rise early, work hard , strike oil. Jean Paul Getty (1892-1976), American Industrialist and Founder of the Getty...In truth , Iraq has neglected its lifeblood industry for far too long and requires a capital expansion and security plan - as well as the financial
Connecting to success: practice management on the Net.
Freydberg, B K
2001-08-15
Profound changes in the way dental practices manage data, patient records, and communication are beginning to unfold. Sooner than most of us can imagine, secured patient medical and dental records will reside on the Internet. Additionally, communication between health care providers and patients will become virtually 100% electronic. As the Application Service Provider (ASP) dental models mature, practices will transition from paper to "paperless" to "web-based" management and clinical systems. This article examines and explains these future frontiers.
PCASSO: a design for secure communication of personal health information via the internet.
Baker, D B; Masys, D R
1999-05-01
The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.
Big data: survey, technologies, opportunities, and challenges.
Khan, Nawsher; Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Inayat, Zakira; Ali, Waleed Kamaleldin Mahmoud; Alam, Muhammad; Shiraz, Muhammad; Gani, Abdullah
2014-01-01
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data.
Big Data: Survey, Technologies, Opportunities, and Challenges
Khan, Nawsher; Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Inayat, Zakira; Mahmoud Ali, Waleed Kamaleldin; Alam, Muhammad; Shiraz, Muhammad; Gani, Abdullah
2014-01-01
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data. PMID:25136682
Renovation of HEPnet-J for near-future experiments
NASA Astrophysics Data System (ADS)
Suzuki, Soh Y.; Yuasa, Fukuko; Nakamura, Tomoaki; Hara, Takanori
2015-12-01
Originally HEPnet-J had only one instance that is connected to Internet as the network connectivity by campus network of institutes in Japan was very limited, so the main purpose of HEPnet-J was providing enough connectivity for interactive use on domestic and international links funded by KEK. In last 10 years, the domestic and international connectivity provided by NRENs have been dramatically improved and they are enough for manual transfer of typical skimmed data files. Therefore, HEPnet-J has many closed networks that connect domestic sites related to specific projects, in order to access them on computer farms in private networks in their home institutes. The rapid growth of data volume makes it unable to apply same model to new generation experiments. As the tier structure for LHC computing sites has proved that the distributed computing model over collaboration sites is really applicable to the huge scale experiment, the external connectivity for international collaboration sites should be faster and secure. For example, the Belle II experiment in KEK will have many repositories in U.S. and EU. The expected throughput from KEK to U.S. is about 20 Gbps, thus it need the bypass of slow security devices like a firewall. Now bypass lines for Belle II are prepared and under tasting. This article reports the brief history of HEPnet- J and recent changes for project-specific networks.
Lacher, D.; Nelson, E.; Bylsma, W.; Spena, R.
2000-01-01
The American College of Physicians-American Society of Internal Medicine conducted a membership survey in late 1998 to assess their activities, needs, and attitudes. A total of 9,466 members (20.9% response rate) reported on 198 items related to computer use and needs of internists. Eighty-two percent of the respondents reported that they use computers for personal or professional reasons. Physicians younger than 50 years old who had full- or part-time academic affiliation reported using computers more frequently for medical applications. About two thirds of respondents who had access to computers connected to the Internet at least weekly, with most using the Internet from home for e-mail and nonmedical uses. Physicians expressed concerns about Internet security, confidentiality, and accuracy, and the lack of time to browse the Internet. In practice settings, internists used computers for administrative and financial functions. Less than 19% of respondents had partial or complete electronic clinical functions in their offices. Less than 7% of respondents exchanged e-mail with their patients on a weekly or daily basis. Also, less than 15% of respondents used computers for continuing medical education (CME). Respondents reported they wanted to increase their general computer skills and enhance their knowledge of computer-based information sources for patient care, electronic medical record systems, computer-based CME, and telemedicine While most respondents used computers and connected to the Internet, few physicians utilized computers for clinical management. Medical organizations face the challenge of increasing physician use of clinical systems and electronic CME. PMID:11079924
Lacher, D; Nelson, E; Bylsma, W; Spena, R
2000-01-01
The American College of Physicians-American Society of Internal Medicine conducted a membership survey in late 1998 to assess their activities, needs, and attitudes. A total of 9,466 members (20.9% response rate) reported on 198 items related to computer use and needs of internists. Eighty-two percent of the respondents reported that they use computers for personal or professional reasons. Physicians younger than 50 years old who had full- or part-time academic affiliation reported using computers more frequently for medical applications. About two thirds of respondents who had access to computers connected to the Internet at least weekly, with most using the Internet from home for e-mail and nonmedical uses. Physicians expressed concerns about Internet security, confidentiality, and accuracy, and the lack of time to browse the Internet. In practice settings, internists used computers for administrative and financial functions. Less than 19% of respondents had partial or complete electronic clinical functions in their offices. Less than 7% of respondents exchanged e-mail with their patients on a weekly or daily basis. Also, less than 15% of respondents used computers for continuing medical education (CME). Respondents reported they wanted to increase their general computer skills and enhance their knowledge of computer-based information sources for patient care, electronic medical record systems, computer-based CME, and telemedicine While most respondents used computers and connected to the Internet, few physicians utilized computers for clinical management. Medical organizations face the challenge of increasing physician use of clinical systems and electronic CME.
Development of an Internet Security Policy for health care establishments.
Ilioudis, C; Pangalos, G
2000-01-01
The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.
Susceptibility of SCADA systems and the energy sector
NASA Astrophysics Data System (ADS)
Goike, Lindsay
The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.
Using OpenSSH to secure mobile LAN network traffic
NASA Astrophysics Data System (ADS)
Luu, Brian B.; Gopaul, Richard D.
2002-08-01
Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Municipal securities...
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.
Quantum communication with coherent states of light
NASA Astrophysics Data System (ADS)
Khan, Imran; Elser, Dominique; Dirmeier, Thomas; Marquardt, Christoph; Leuchs, Gerd
2017-06-01
Quantum communication offers long-term security especially, but not only, relevant to government and industrial users. It is worth noting that, for the first time in the history of cryptographic encoding, we are currently in the situation that secure communication can be based on the fundamental laws of physics (information theoretical security) rather than on algorithmic security relying on the complexity of algorithms, which is periodically endangered as standard computer technology advances. On a fundamental level, the security of quantum key distribution (QKD) relies on the non-orthogonality of the quantum states used. So even coherent states are well suited for this task, the quantum states that largely describe the light generated by laser systems. Depending on whether one uses detectors resolving single or multiple photon states or detectors measuring the field quadratures, one speaks of, respectively, a discrete- or a continuous-variable description. Continuous-variable QKD with coherent states uses a technology that is very similar to the one employed in classical coherent communication systems, the backbone of today's Internet connections. Here, we review recent developments in this field in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKD for bridging long distances by building upon existing optical satellite links. This article is part of the themed issue 'Quantum technology for the 21st century'.
Quantum communication with coherent states of light.
Khan, Imran; Elser, Dominique; Dirmeier, Thomas; Marquardt, Christoph; Leuchs, Gerd
2017-08-06
Quantum communication offers long-term security especially, but not only, relevant to government and industrial users. It is worth noting that, for the first time in the history of cryptographic encoding, we are currently in the situation that secure communication can be based on the fundamental laws of physics (information theoretical security) rather than on algorithmic security relying on the complexity of algorithms, which is periodically endangered as standard computer technology advances. On a fundamental level, the security of quantum key distribution (QKD) relies on the non-orthogonality of the quantum states used. So even coherent states are well suited for this task, the quantum states that largely describe the light generated by laser systems. Depending on whether one uses detectors resolving single or multiple photon states or detectors measuring the field quadratures, one speaks of, respectively, a discrete- or a continuous-variable description. Continuous-variable QKD with coherent states uses a technology that is very similar to the one employed in classical coherent communication systems, the backbone of today's Internet connections. Here, we review recent developments in this field in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKD for bridging long distances by building upon existing optical satellite links.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).
Online Safety: Fraud, Security, Phishing, Vishing
... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...
Network and computing infrastructure for scientific applications in Georgia
NASA Astrophysics Data System (ADS)
Kvatadze, R.; Modebadze, Z.
2016-09-01
Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.
Comprehensive Routing Security Development and Deployment for the Internet
2015-02-01
feature enhancement and bug fixes. • MySQL : MySQL is a widely used and popular open source database package. It was chosen for database support in the...RPSTIR depends on several other open source packages. • MySQL : MySQL is used for the the local RPKI database cache. • OpenSSL: OpenSSL is used for...cryptographic libraries for X.509 certificates. • ODBC mySql Connector: ODBC (Open Database Connectivity) is a standard programming interface (API) for
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.
Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
Electronic Patient Data Confidentiality Practices Among Surgical Trainees: Questionnaire Study
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-01-01
INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended. PMID:17059715
Grid and Cloud for Developing Countries
NASA Astrophysics Data System (ADS)
Petitdidier, Monique
2014-05-01
The European Grid e-infrastructure has shown the capacity to connect geographically distributed heterogeneous compute resources in a secure way taking advantages of a robust and fast REN (Research and Education Network). In many countries like in Africa the first step has been to implement a REN and regional organizations like Ubuntunet, WACREN or ASREN to coordinate the development, improvement of the network and its interconnection. The Internet connections are still exploding in those countries. The second step has been to fill up compute needs of the scientists. Even if many of them have their own multi-core or not laptops for more and more applications it is not enough because they have to face intensive computing due to the large amount of data to be processed and/or complex codes. So far one solution has been to go abroad in Europe or in America to run large applications or not to participate to international communities. The Grid is very attractive to connect geographically-distributed heterogeneous resources, aggregate new ones and create new sites on the REN with a secure access. All the users have the same servicers even if they have no resources in their institute. With faster and more robust internet they will be able to take advantage of the European Grid. There are different initiatives to provide resources and training like UNESCO/HP Brain Gain initiative, EUMEDGrid, ..Nowadays Cloud becomes very attractive and they start to be developed in some countries. In this talk challenges for those countries to implement such e-infrastructures, to develop in parallel scientific and technical research and education in the new technologies will be presented illustrated by examples.
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-05-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things
Yeh, Kuo-Hui; Su, Chunhua; Choo, Kim-Kwang Raymond; Chiu, Wayne
2017-01-01
Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons. PMID:28468313
Securing the Internet frontier.
Morrissey, J
1996-10-21
Just as in the Wild West, security strategies are being mobilized for the untamed Internet frontier. Technology developed by settlers from the banking and merchandising industries is being retooled for healthcare, where security-conscious industries see a big market opportunity.
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
Hu, Hequn; Liao, Xuewen
2017-01-01
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
Cyber security challenges in Smart Cities: Safety, security and privacy.
Elmaghraby, Adel S; Losavio, Michael M
2014-07-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.
Handling of the demilitarized zone using service providers in SAP
NASA Astrophysics Data System (ADS)
Iovan, A.; Robu, R.
2016-02-01
External collaboration needs to allow data access from the Internet. In a trusted Internet collaboration scenario where the external user works on the same data like the internal user direct access to the data in the Intranet is required. The paper presents a solution to get access to certain data in the Enterprise Resource Planning system, having the User Interface on a system in the Demilitarized Zone and the database on a system which is located in the trusted area. Using the Service Provider Interface framework, connections between separate systems can be created in different areas of the network. The paper demonstrates how to connect the two systems, one in the Demilitarized Zone and one in the trusted area, using SAP ERP 6.0 with Enhancement Package 7. In order to use the Service Provider Interface SAP Business Suite Foundation component must be installed in both systems. The advantage of using the Service Provider Interface framework is that the external user works on the same data like the internal user (and not on copies). This assures data consistency and less overhead for backup and security systems.
Software Supports Distributed Operations via the Internet
NASA Technical Reports Server (NTRS)
Norris, Jeffrey; Backers, Paul; Steinke, Robert
2003-01-01
Multi-mission Encrypted Communication System (MECS) is a computer program that enables authorized, geographically dispersed users to gain secure access to a common set of data files via the Internet. MECS is compatible with legacy application programs and a variety of operating systems. The MECS architecture is centered around maintaining consistent replicas of data files cached on remote computers. MECS monitors these files and, whenever one is changed, the changed file is committed to a master database as soon as network connectivity makes it possible to do so. MECS provides subscriptions for remote users to automatically receive new data as they are generated. Remote users can be producers as well as consumers of data. Whereas a prior program that provides some of the same services treats disconnection of a user from the network of users as an error from which recovery must be effected, MECS treats disconnection as a nominal state of the network: This leads to a different design that is more efficient for serving many users, each of whom typically connects and disconnects frequently and wants only a small fraction of the data at any given time.
Development of a virtual multidisciplinary lung cancer tumor board in a community setting.
Stevenson, Marvaretta M; Irwin, Tonia; Lowry, Terry; Ahmed, Maleka Z; Walden, Thomas L; Watson, Melanie; Sutton, Linda
2013-05-01
Creating an effective platform for multidisciplinary tumor conferences can be challenging in the rural community setting. The Duke Cancer Network created an Internet-based platform for a multidisciplinary conference to enhance the care of patients with lung cancer. This conference incorporates providers from different physical locations within a rural community and affiliated providers from a university-based cancer center 2 hours away. An electronic Web conferencing tool connects providers aurally and visually. Conferences were set up using a commercially available Web conferencing platform. The video platform provides a secure Web site coupled with a secure teleconference platform to ensure patient confidentiality. Multiple disciplines are invited to participate, including radiology, radiation oncology, thoracic surgery, pathology, and medical oncology. Participants only need telephone access and Internet connection to participate. Patient histories and physicals are presented, and the Web conferencing platform allows radiologic and histologic images to be reviewed. Treatment plans for patients are discussed, allowing providers to coordinate care among the different subspecialties. Patients who need referral to the affiliated university-based cancer center for specialized services are identified. Pertinent treatment guidelines and journal articles are reviewed. On average, there are 10 participants with one to two cases presented per session. The use of a Web conferencing platform allows subspecialty providers throughout the community and hours away to discuss lung cancer patient cases. This platform increases convenience for providers, eliminating travel to a central location. Coordination of care for patients requiring multidisciplinary care is facilitated, shortening evaluation time before definitive treatment plan.
Security Techniques for Sensor Systems and the Internet of Things
ERIC Educational Resources Information Center
Midi, Daniele
2016-01-01
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…
Security in the Cache and Forward Architecture for the Next Generation Internet
NASA Astrophysics Data System (ADS)
Hadjichristofi, G. C.; Hadjicostis, C. N.; Raychaudhuri, D.
The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network functionalities since contemporary communication profiles tend to be data-driven rather than host-based. To address this paradigm shift in data propagation, a next generation architecture has been proposed, the Cache and Forward (CNF) architecture. This research investigates security aspects of this new Internet architecture. More specifically, we discuss content privacy, secure routing, key management and trust management. We identify security weaknesses of this architecture that need to be addressed and we derive security requirements that should guide future research directions. Aspects of the research can be adopted as a step-stone as we build the future Internet.
Decreased Functional Brain Connectivity in Adolescents with Internet Addiction
Hong, Soon-Beom; Zalesky, Andrew; Cocchi, Luca; Fornito, Alex; Choi, Eun-Jung; Kim, Ho-Hyun; Suh, Jeong-Eun; Kim, Chang-Dai; Kim, Jae-Won; Yi, Soon-Hyung
2013-01-01
Background Internet addiction has become increasingly recognized as a mental disorder, though its neurobiological basis is unknown. This study used functional neuroimaging to investigate whole-brain functional connectivity in adolescents diagnosed with internet addiction. Based on neurobiological changes seen in other addiction related disorders, it was predicted that connectivity disruptions in adolescents with internet addiction would be most prominent in cortico-striatal circuitry. Methods Participants were 12 adolescents diagnosed with internet addiction and 11 healthy comparison subjects. Resting-state functional magnetic resonance images were acquired, and group differences in brain functional connectivity were analyzed using the network-based statistic. We also analyzed network topology, testing for between-group differences in key graph-based network measures. Results Adolescents with internet addiction showed reduced functional connectivity spanning a distributed network. The majority of impaired connections involved cortico-subcortical circuits (∼24% with prefrontal and ∼27% with parietal cortex). Bilateral putamen was the most extensively involved subcortical brain region. No between-group difference was observed in network topological measures, including the clustering coefficient, characteristic path length, or the small-worldness ratio. Conclusions Internet addiction is associated with a widespread and significant decrease of functional connectivity in cortico-striatal circuits, in the absence of global changes in brain functional network topology. PMID:23451272
Crisis-management and the Security in the Internet
NASA Astrophysics Data System (ADS)
Harada, Izumi
This paper discusses about the crisis-management and the security in the Internet. The crime that not is so far occurs during widespread to the society of the Internet, and a big social trouble. Moreover, the problem of a new security such as a cyber war and cyber terrorism appeared, too. It is necessary to recognize such a situation, and to do both correspondences corresponding to the environmental transformation by government and the people.
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
Amin, Ruhul; Biswas, G P
2015-08-01
Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.
Security for Multimedia Space Data Distribution over the Internet
NASA Technical Reports Server (NTRS)
Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)
1995-01-01
Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.
Boot Camp for Occupational Health Nurses: Understanding Social Media.
Wolf, Debra M; Olszewski, Kimberly
2015-08-01
Social media is a buzzword frequently referred to in marketing materials, general media, and personal conversations. Although many refer to the term social media, some individuals do not understand its meaning or how it affects their daily lives at work and home. Since the expansion of the Internet to web 2.0, multiple platforms of communication occur virtually through various social media. Understanding and learning how to use these platforms are essential to stay connected with friends, family, and colleagues; advance connections to professional organizations; and extend educational opportunities. This article presents basic information for occupational health nurses to improve their understanding of social media and how to communicate virtually using different platforms safely and securely. © 2015 The Author(s).
Security Issues on the Internet.
ERIC Educational Resources Information Center
Bar-Ilan, Judit
1996-01-01
Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)
GINSU: Guaranteed Internet Stack Utilization
2005-11-01
Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC
The Impact of Information Richness on Information Security Awareness Training Effectiveness
ERIC Educational Resources Information Center
Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou
2009-01-01
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…
Continuously Connected With Mobile IP
NASA Technical Reports Server (NTRS)
2002-01-01
Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.
Alternatives for Monitoring and Limiting Network Access to Students in Network-Connected Classrooms
ERIC Educational Resources Information Center
Almeroth, Kevin; Zhang, Hangjin
2013-01-01
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Information Security and the Internet.
ERIC Educational Resources Information Center
Doddrell, Gregory R.
1996-01-01
As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…
NAFFS: network attached flash file system for cloud storage on portable consumer electronics
NASA Astrophysics Data System (ADS)
Han, Lin; Huang, Hao; Xie, Changsheng
Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.
Security of Mobile Agents on the Internet.
ERIC Educational Resources Information Center
Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare
2001-01-01
Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)
Teaching Internet Security, Safety in Our Classrooms
ERIC Educational Resources Information Center
DeFranco, Joanna F.
2011-01-01
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
How to set up a low cost tele-ultrasound capable videoconferencing system with wide applicability
2012-01-01
Background Worldwide ultrasound equipment accessibility is at an all-time high, as technology improves and costs decrease. Ensuring that patients benefit from more accurate resuscitation and diagnoses from a user-dependent technology, such as ultrasound, requires accurate examination, typically entailing significant training. Remote tele-mentored ultrasound (RTUS) examination is, however, a technique pioneered in space medicine that has increased applicability on earth. We, thus, sought to create and demonstrate a cost-minimal approach and system with potentially global applicability. Methods The cost-minimal RTUS system was constructed by utilizing a standard off-the-shelf laptop computer that connected to the internet through an internal wireless receiver and/or was tethered through a smartphone. A number of portable hand-held ultrasound devices were digitally streamed into the laptop utilizing a video converter. Both the ultrasound video and the output of a head-mounted video camera were transmitted over freely available Voice Over Internet Protocol (VOIP) software to remote experts who could receive and communicate using any mobile device (computer, tablet, or smartphone) that could access secure VOIP transmissions from the internet. Results The RTUS system allowed real-time mentored tele-ultrasound to be conducted from a variety of settings that were inside buildings, outside on mountainsides, and even within aircraft in flight all unified by the simple capability of receiving and transmitting VOIP transmissions. . Numerous types of ultrasound examinations were conducted such as abdominal and thoracic examinations with a variety of users mentored who had previous skills ranging from none to expert. Internet connectivity was rarely a limiting factor, with competing logistical and scheduling demands of the participants predominating. Conclusions RTUS examinations can educate and guide point of care clinical providers to enhance their use of ultrasound. The scope of the examinations conducted is limited only by the time available and the criticality of the subject being examined. As internet connectivity will only improve worldwide, future developments need to focus on the human factors to optimize tele-sonographic interactions. PMID:22871099
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2012 CFR
2012-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2014 CFR
2014-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE U.S. TREASURY SECURITIES...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2013 CFR
2013-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...
Evaluating Common Privacy Vulnerabilities in Internet Service Providers
NASA Astrophysics Data System (ADS)
Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios
Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
Cyber security challenges in Smart Cities: Safety, security and privacy
Elmaghraby, Adel S.; Losavio, Michael M.
2014-01-01
The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517
Can Cyberloafing and Internet Addiction Affect Organizational Information Security?
Hadlington, Lee; Parsons, Kathryn
2017-09-01
Researchers have noted potential links between Internet addiction, the use of work computers for nonwork purposes and an increased risk of threat to the organization from breaches in cybersecurity. However, much of this research appears conjectural in nature and lacks clear empirical evidence to support such claims. To fill this knowledge gap, a questionnaire-based study explored the link between cyberloafing, Internet addiction, and information security awareness (ISA). A total of 338 participants completed an online questionnaire, which comprised of the Online Cognition Scale, Cyberloafing Scale, and the Human Aspects of Information Security Questionnaire. Participants who reported higher Internet addiction and cyberloafing tendencies had lower ISA, and Internet addiction and cyberloafing predicted a significant 45 percent of the variance in ISA. Serious cyberloafing, such as the propensity to visit adult websites and online gambling, was shown to be the significant predictor for poorer ISA. Implications for organizations and recommendations to reduce or manage inappropriate Internet use are discussed.
The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems
NASA Astrophysics Data System (ADS)
Bianco, Louis J.
The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.
On the security of two remote user authentication schemes for telecare medical information systems.
Kim, Kee-Won; Lee, Jae-Dong
2014-05-01
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Internet Availability of Proxy Materials (as described in § 240.14a-16), furnished by the security holder... security holder shall be sent to that address, provided that if multiple copies of the Notice of Internet... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Obligations of registrants to...
Code of Federal Regulations, 2014 CFR
2014-04-01
... Internet Availability of Proxy Materials (as described in § 240.14a-16), furnished by the security holder... security holder shall be sent to that address, provided that if multiple copies of the Notice of Internet... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Obligations of registrants to...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Internet Availability of Proxy Materials (as described in § 240.14a-16), furnished by the security holder... security holder shall be sent to that address, provided that if multiple copies of the Notice of Internet... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Obligations of registrants to...
Code of Federal Regulations, 2012 CFR
2012-04-01
... Internet Availability of Proxy Materials (as described in § 240.14a-16), furnished by the security holder... security holder shall be sent to that address, provided that if multiple copies of the Notice of Internet... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Obligations of registrants to...
A remote data access architecture for home-monitoring health-care applications.
Lin, Chao-Hung; Young, Shuenn-Tsong; Kuo, Te-Son
2007-03-01
With the aging of the population and the increasing patient preference for receiving care in their own homes, remote home care is one of the fastest growing areas of health care in Taiwan and many other countries. Many remote home-monitoring applications have been developed and implemented to enable both formal and informal caregivers to have remote access to patient data so that they can respond instantly to any abnormalities of in-home patients. The aim of this technology is to give both patients and relatives better control of the health care, reduce the burden on informal caregivers and reduce visits to hospitals and thus result in a better quality of life for both the patient and his/her family. To facilitate their widespread adoption, remote home-monitoring systems take advantage of the low-cost features and popularity of the Internet and PCs, but are inherently exposed to several security risks, such as virus and denial-of-service (DoS) attacks. These security threats exist as long as the in-home PC is directly accessible by remote-monitoring users over the Internet. The purpose of the study reported in this paper was to improve the security of such systems, with the proposed architecture aimed at increasing the system availability and confidentiality of patient information. A broker server is introduced between the remote-monitoring devices and the in-home PCs. This topology removes direct access to the in-home PC, and a firewall can be configured to deny all inbound connections while the remote home-monitoring application is operating. This architecture helps to transfer the security risks from the in-home PC to the managed broker server, on which more advanced security measures can be implemented. The pros and cons of this novel architecture design are also discussed and summarized.
17 CFR 240.14c-101 - Schedule 14C. Information required in information statement.
Code of Federal Regulations, 2014 CFR
2014-04-01
... separate copy of the annual report to security holders, information statement, or Notice of Internet... annual reports to security holders, information statements, or Notices of Internet Availability of Proxy... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Schedule 14C. Information...
17 CFR 240.14c-101 - Schedule 14C. Information required in information statement.
Code of Federal Regulations, 2013 CFR
2013-04-01
... separate copy of the annual report to security holders, information statement, or Notice of Internet... annual reports to security holders, information statements, or Notices of Internet Availability of Proxy... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Schedule 14C. Information...
17 CFR 240.14c-101 - Schedule 14C. Information required in information statement.
Code of Federal Regulations, 2012 CFR
2012-04-01
... separate copy of the annual report to security holders, information statement, or Notice of Internet... annual reports to security holders, information statements, or Notices of Internet Availability of Proxy... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Schedule 14C. Information...
Federated Security: The Shibboleth Approach
ERIC Educational Resources Information Center
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken
2004-01-01
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W
2012-08-01
The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.
Månsson, Sven-Axel; Ross, Michael W.
2012-01-01
Abstract The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular. PMID:22823598
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.
Hu, Hequn; Gao, Zhenzhen; Liao, Xuewen; Leung, Victor C M
2017-09-04
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.
Development of a Virtual Multidisciplinary Lung Cancer Tumor Board in a Community Setting
Stevenson, Marvaretta M.; Irwin, Tonia; Lowry, Terry; Ahmed, Maleka Z.; Walden, Thomas L.; Watson, Melanie; Sutton, Linda
2013-01-01
Purpose: Creating an effective platform for multidisciplinary tumor conferences can be challenging in the rural community setting. The Duke Cancer Network created an Internet-based platform for a multidisciplinary conference to enhance the care of patients with lung cancer. This conference incorporates providers from different physical locations within a rural community and affiliated providers from a university-based cancer center 2 hours away. An electronic Web conferencing tool connects providers aurally and visually. Methods: Conferences were set up using a commercially available Web conferencing platform. The video platform provides a secure Web site coupled with a secure teleconference platform to ensure patient confidentiality. Multiple disciplines are invited to participate, including radiology, radiation oncology, thoracic surgery, pathology, and medical oncology. Participants only need telephone access and Internet connection to participate. Results: Patient histories and physicals are presented, and the Web conferencing platform allows radiologic and histologic images to be reviewed. Treatment plans for patients are discussed, allowing providers to coordinate care among the different subspecialties. Patients who need referral to the affiliated university-based cancer center for specialized services are identified. Pertinent treatment guidelines and journal articles are reviewed. On average, there are 10 participants with one to two cases presented per session. Conclusion: The use of a Web conferencing platform allows subspecialty providers throughout the community and hours away to discuss lung cancer patient cases. This platform increases convenience for providers, eliminating travel to a central location. Coordination of care for patients requiring multidisciplinary care is facilitated, shortening evaluation time before definitive treatment plan. PMID:23942505
Security, privacy, and confidentiality issues on the Internet
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559
Security, privacy, and confidentiality issues on the Internet.
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.
17 CFR 240.14c-3 - Annual report to be furnished security holders.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) A registrant will be considered to have delivered a Notice of Internet Availability of Proxy... Notice of Internet Availability of Proxy Materials, annual report to security holders or information...
Research and development targeted at identifying and mitigating Internet security threats require current network data. To fulfill this need... researchers working for the Center for Applied Internet Data Analysis (CAIDA), a program at the San Diego Supercomputer Center (SDSC) which is based at the...vetted network and security researchers using the PREDICT/IMPACT portal and legal framework. We have also contributed to community building efforts that
75 FR 17584 - Schools and Libraries Universal Service Support Mechanism
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-07
... libraries may receive discounts for eligible telecommunications services, Internet access, and internal... service, Internet access, internal connections, basic maintenance of internal connections, and... VoIP be listed in both the telecommunications and Internet access categories of the ESL, despite the...
Jin, Wenquan; Kim, DoHyeun
2018-05-26
The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... over the Internet); Securities Exchange Act Release No. 63197 (October 27, 2010), 75 FR 67791 (November... $200 to $600 per Internet port that is used to deliver market data); Securities Exchange Act Release No... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64964; File No. SR-EDGA-2011-22] Self...
Zhang, Yanzhen; Mei, Wei; Zhang, John X; Wu, Qiulin; Zhang, Wei
2016-09-01
The insula is a region that integrates interoception and drug urges, but little is known about its role in behavioral addiction such as internet addiction. We investigated insula-based functional connectivity in participants with internet gaming disorder (IGD) and healthy controls (HC) using resting-state functional MRI. The right and left insula subregions (posterior, ventroanterior, and dorsoanterior) were used as seed regions in a connectivity analysis. Compared with the HC group, the IGD group showed decreased functional connectivity between left posterior insula and bilateral supplementary motor area and middle cingulated cortex, between right posterior insula and right superior frontal gyrus, and decreased functional integration between insular subregions. The finding of reduced functional connectivity between the interoception and the motor/executive control regions is interpreted to reflect reduced ability to inhibit motor responses to internet gaming or diminished executive control over craving for internet gaming in IGD. The results support the hypothesis that IGD is associated with altered insula-based network, similar to substance addiction such as smoking.
Securing Real-Time Sessions in an IMS-Based Architecture
NASA Astrophysics Data System (ADS)
Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco
The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. PMID:24574863
Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.
BTFS: The Border Trade Facilitation System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, L.R.
The author demonstrates the Border Trade Facilitation System (BTFS), an agent-based bilingual e-commerce system built to expedite the regulation, control, and execution of commercial trans-border shipments during the delivery phase. The system was built to serve maquila industries at the US/Mexican border. The BTFS uses foundation technology developed here at Sandia Laboratories' Advanced Information Systems Lab (AISL), including a distributed object substrate, a general-purpose agent development framework, dynamically generated agent-human interaction via the World-Wide Web, and a collaborative agent architecture. This technology is also the substrate for the Multi-Agent Simulation Management System (MASMAS) proposed for demonstration at this conference. Themore » BTFS executes authenticated transactions among agents performing open trading over the Internet. With the BTFS in place, one could conduct secure international transactions from any site with an Internet connection and a web browser. The BTFS is currently being evaluated for commercialization.« less
Tools for Administration of a UNIX-Based Network
NASA Technical Reports Server (NTRS)
LeClaire, Stephen; Farrar, Edward
2004-01-01
Several computer programs have been developed to enable efficient administration of a large, heterogeneous, UNIX-based computing and communication network that includes a variety of computers connected to a variety of subnetworks. One program provides secure software tools for administrators to create, modify, lock, and delete accounts of specific users. This program also provides tools for users to change their UNIX passwords and log-in shells. These tools check for errors. Another program comprises a client and a server component that, together, provide a secure mechanism to create, modify, and query quota levels on a network file system (NFS) mounted by use of the VERITAS File SystemJ software. The client software resides on an internal secure computer with a secure Web interface; one can gain access to the client software from any authorized computer capable of running web-browser software. The server software resides on a UNIX computer configured with the VERITAS software system. Directories where VERITAS quotas are applied are NFS-mounted. Another program is a Web-based, client/server Internet Protocol (IP) address tool that facilitates maintenance lookup of information about IP addresses for a network of computers.
Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K
2013-08-09
Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.
A Multi-Hop Clustering Mechanism for Scalable IoT Networks.
Sung, Yoonyoung; Lee, Sookyoung; Lee, Meejeong
2018-03-23
It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63-87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6-89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network.
A Multi-Hop Clustering Mechanism for Scalable IoT Networks
2018-01-01
It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63–87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6–89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network. PMID:29570691
Method and apparatus for managing transactions with connected computers
Goldsmith, Steven Y.; Phillips, Laurence R.; Spires, Shannon V.
2003-01-01
The present invention provides a method and apparatus that make use of existing computer and communication resources and that reduce the errors and delays common to complex transactions such as international shipping. The present invention comprises an agent-based collaborative work environment that assists geographically distributed commercial and government users in the management of complex transactions such as the transshipment of goods across the U.S.-Mexico border. Software agents can mediate the creation, validation and secure sharing of shipment information and regulatory documentation over the Internet, using the World-Wide Web to interface with human users.
Ding Dong, You've Got Mail! A Lab Activity for Teaching the Internet of Things
ERIC Educational Resources Information Center
Frydenberg, Mark
2017-01-01
Connecting ordinary devices to the Internet is a defining characteristic of the Internet of Things. In this hands-on lab activity, students will connect a wireless doorbell to the Internet using a Raspberry Pi computer. By modifying and running a program on the Raspberry Pi to send an email or text message notifying a recipient that someone is at…
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions
NASA Astrophysics Data System (ADS)
Gupta, Ankur; Awasthi, Lalit K.
Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.
Secure scalable disaster electronic medical record and tracking system.
Demers, Gerard; Kahn, Christopher; Johansson, Per; Buono, Colleen; Chipara, Octav; Griswold, William; Chan, Theodore
2013-10-01
Electronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability. Report As the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures. A secure prehospital triage EMR improves documentation quality during disaster drills.
NASA Astrophysics Data System (ADS)
Zeitz, Christian; Scheidat, Tobias; Dittmann, Jana; Vielhauer, Claus; González Agulla, Elisardo; Otero Muras, Enrique; García Mateo, Carmen; Alba Castro, José L.
2008-02-01
Beside the optimization of biometric error rates the overall security system performance in respect to intentional security attacks plays an important role for biometric enabled authentication schemes. As traditionally most user authentication schemes are knowledge and/or possession based, firstly in this paper we present a methodology for a security analysis of Internet-based biometric authentication systems by enhancing known methodologies such as the CERT attack-taxonomy with a more detailed view on the OSI-Model. Secondly as proof of concept, the guidelines extracted from this methodology are strictly applied to an open source Internet-based biometric authentication system (BioWebAuth). As case studies, two exemplary attacks, based on the found security leaks, are investigated and the attack performance is presented to show that during the biometric authentication schemes beside biometric error performance tuning also security issues need to be addressed. Finally, some design recommendations are given in order to ensure a minimum security level.
Net Lessons: Education World's Internet Primer.
ERIC Educational Resources Information Center
1997
This booklet presents educators with practical ways to put the Internet to work in the classroom. An introduction provides resources for getting connected to and exploring the Internet. The next section on using the Web in the classroom discusses a student-created Web survey; cooperative challenge; social action; community connection; simulation;…
Internet Connections to Mathematics Education.
ERIC Educational Resources Information Center
Day, Roger
1995-01-01
Presents Internet connections appropriate for mathematics education; provides descriptions of ways that mathematics educators can access electronic resources such as e-mail, discussion groups, gopher servers, and transfer of files; and provides hints and examples from classroom connections and professional applications. (18 references) (Author/MKR)
NASA Astrophysics Data System (ADS)
Gunn, Lachlan J.; Chappell, James M.; Allison, Andrew; Abbott, Derek
2014-09-01
While information-theoretic security is often associated with the one-time pad and quantum key distribution, noisy transport media leave room for classical techniques and even covert operation. Transit times across the public internet exhibit a degree of randomness, and cannot be determined noiselessly by an eavesdropper. We demonstrate the use of these measurements for information-theoretically secure communication over the public internet.
Internet Governance and National Security
2012-01-01
the conflict created by headline- grabbing exploits of ad hoc hacker networks or nation-state-inspired cor porate espionage.5 Malicious actors add...governance of critical Internet re sources and their impact on US national security are often overlooked. Foreign efforts to alter the technical...crime, espio nage, and other forms of cyber conflict rather than on the issues related to governance of critical Internet resources, development of
Designing and application of SAN extension interface based on CWDM
NASA Astrophysics Data System (ADS)
Qin, Leihua; Yu, Shengsheng; Zhou, Jingli
2005-11-01
As Fibre Channel (FC) becomes the protocol of choice within corporate data centers, enterprises are increasingly deploying SANs in their data central. In order to mitigate the risk of losing data and improve the availability of data, more and more enterprises are increasingly adopting storage extension technologies to replicate their business critical data to a secondary site. Transmitting this information over distance requires a carrier grade environment with zero data loss, scalable throughput, low jitter, high security and ability to travel long distance. To address this business requirements, there are three basic architectures for storage extension, they are Storage over Internet Protocol, Storage over Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) and Storage over Dense Wavelength Division Multiplexing (DWDM). Each approach varies in functionality, complexity, cost, scalability, security, availability , predictable behavior (bandwidth, jitter, latency) and multiple carrier limitations. Compared with these connectiviy technologies,Coarse Wavelength Division Multiplexing (CWDM) is a Simplified, Low Cost and High Performance connectivity solutions for enterprises to deploy their storage extension. In this paper, we design a storage extension connectivity over CWDM and test it's electrical characteristic and random read and write performance of disk array through the CWDM connectivity, testing result show us that the performance of the connectivity over CWDM is acceptable. Furthermore, we propose three kinds of network architecture of SAN extension based on CWDM interface. Finally the credit-Based flow control mechanism of FC, and the relationship between credits and extension distance is analyzed.
'White matter connectivity and Internet gaming disorder' and broader considerations in the field.
Tam, Philip G E
2017-01-01
This invited commentary on the paper 'White Matter Connectivity and Internet gaming disorder' by Jeong et al. (unpublished) looks at the implications and importance of the MRI findings in the present study-one of the largest to date-and also considers the broader developments of neuroimaging within the complex, emerging field of 'Internet psychology' and problematic Internet usage. © 2015 Society for the Study of Addiction.
ERIC Educational Resources Information Center
Brandt, D. Scott
1998-01-01
Examines Internet security risks and how users can protect themselves. Discusses inadvertent bugs in software; programming problems with Common Gateway Interface (CGI); viruses; tracking of Web users; and preventing access to selected Web pages and filtering software. A glossary of Internet security-related terms is included. (AEF)
ERIC Educational Resources Information Center
Technology & Learning, 2008
2008-01-01
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
The Chicago Public Schools (CPS)/University of Chicago (UC) Internet Project (CUIP)
NASA Astrophysics Data System (ADS)
Richardson, D.; Rebull, L. M.; Munoz-Franco, L.; Jay, M. J.; Burke, R. D.; Fenstermacher, K. D.; Lenz, D. D.; MacNaught, H.; Marks, M. D.; Murphy, J.; Thomas, C.; York, D. G.; Anderson, D.; Chisom, Y.; Dynis, R.; Letts, J.; Lewis, E.; Harris, E.; Segneri, L.
1998-01-01
The Chicago Public Schools (CPS)/University of Chicago (UC) Internet Project (CUIP) is a collaborative pilot project among the UC, CPS Central Administration, and 24 public schools in the Woodlawn, Hyde Park/ South Kenwood, and North Kenwood/Oakland neighborhoods. Our primary goal is connecting these schools to the Internet, emphasizing the continued support of the schools and their teachers after the computers and connections are in place. We work with principals, department heads, and individual teachers to create and nurture a self-sustaining computer culture that will both maintain the network systems and incorporate the technology into the curriculum. We also encourage the schools to take advantage of ther new connectivity by collaborating and sharing resources among themselves. Formal interactions are fostered with museums and research centers, locally and nationally. CUIP is committed to supporting these schools as they use the Internet to enhance student learning. CUIP's goals include: providing T-1 internet connectivity to 24 local schools, supporting the technology coordinator in each school in order to ensure continuous Internet connectivity, and developing effective technology plans, including technology upgrades; nurturing and supporting teachers interested in incorporating technology in their classroom; fostering an environment in which the students can acquire a wide range of comptuer skills appropriate to the current job market; and fostering similar community-based efforts, around Chicago and the nation. CUIP's milestones include: internet service connected to 12 schools; technology interns placed in some CUIP schools in collaboration with Governors State University; email provided to more than half of the 660 teachers in connected schools; and World Wide Web for Teachers, a summer class on curriculum uses of the Web, taught by CUIP staff to 23 of over 100 public school teacher applicants.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Cryptography and the Internet: lessons and challenges
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCurley, K.S.
1996-12-31
The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising newmore » questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.« less
A sensor monitoring system for telemedicine, safety and security applications
NASA Astrophysics Data System (ADS)
Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka
2017-02-01
A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.
The Policy Implications of Internet Connectivity in Public Libraries
ERIC Educational Resources Information Center
Jaeger, Paul T.; Bertot, John Carlo; McClure, Charles R.; Langa, Lesley A.
2006-01-01
The provision of public Internet access and related networked services by public libraries is affected by a number of information policy issues. This article analyzes the policy dimensions of Internet connectivity in public libraries in light of the data and findings from a national survey of public libraries conducted by the authors of this…
46 CFR 520.9 - Access to tariffs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... networks (“PSTN”); or (2) The Internet (Web) by: (i) Web browser; or (ii) Telnet session. (b) Dial-up...) Internet connection. (1) This connection option requires that systems provide: (i) A universal resource locator (“URL”) Internet address (e.g., http://www.tariffsrus.com or http://1.2.3.4); and/or (ii) A URL...
46 CFR 520.9 - Access to tariffs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... networks (“PSTN”); or (2) The Internet (Web) by: (i) Web browser; or (ii) Telnet session. (b) Dial-up...) Internet connection. (1) This connection option requires that systems provide: (i) A universal resource locator (“URL”) Internet address (e.g., http://www.tariffsrus.com or http://1.2.3.4); and/or (ii) A URL...
46 CFR 520.9 - Access to tariffs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... networks (“PSTN”); or (2) The Internet (Web) by: (i) Web browser; or (ii) Telnet session. (b) Dial-up...) Internet connection. (1) This connection option requires that systems provide: (i) A universal resource locator (“URL”) Internet address (e.g., http://www.tariffsrus.com or http://1.2.3.4); and/or (ii) A URL...
Year 1 Evaluation of Nebraska's Statewide Plan: Connecting Schools to the Internet.
ERIC Educational Resources Information Center
Topp, Neal W.; Grandgenett, Neal
1996-01-01
Reviews activities in the first year of a Nebraska plan to connect K-12 schools to the Internet, including: installing UNIX-based computers; developing a statewide training program; hiring; distributing support materials; and devising a formative evaluation process. Trends in teacher and student Internet use and eight projects in classroom…
46 CFR 520.9 - Access to tariffs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... networks (“PSTN”); or (2) The Internet (Web) by: (i) Web browser; or (ii) Telnet session. (b) Dial-up...) Internet connection. (1) This connection option requires that systems provide: (i) A universal resource locator (“URL”) Internet address (e.g., http://www.tariffsrus.com or http://1.2.3.4); and/or (ii) A URL...
46 CFR 520.9 - Access to tariffs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... networks (“PSTN”); or (2) The Internet (Web) by: (i) Web browser; or (ii) Telnet session. (b) Dial-up...) Internet connection. (1) This connection option requires that systems provide: (i) A universal resource locator (“URL”) Internet address (e.g., http://www.tariffsrus.com or http://1.2.3.4); and/or (ii) A URL...
Trust Management and Accountability for Internet Security
ERIC Educational Resources Information Center
Liu, Wayne W.
2011-01-01
Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…
Hackländer, T; Kleber, K; Schneider, H; Demabre, N; Cramer, B M
2004-08-01
To build an infrastructure that enables radiologists on-call and external users a teleradiological access to the HTML-based image distribution system inside the hospital via internet. In addition, no investment costs should arise on the user side and the image data should be sent renamed using cryptographic techniques. A pure HTML-based system manages the image distribution inside the hospital, with an open source project extending this system through a secure gateway outside the firewall of the hospital. The gateway handles the communication between the external users and the HTML server within the network of the hospital. A second firewall is installed between the gateway and the external users and builds up a virtual private network (VPN). A connection between the gateway and the external user is only acknowledged if the computers involved authenticate each other via certificates and the external users authenticate via a multi-stage password system. All data are transferred encrypted. External users get only access to images that have been renamed to a pseudonym by means of automated processing before. With an ADSL internet access, external users achieve an image load frequency of 0.4 CT images per second. More than 90 % of the delay during image transfer results from security checks within the firewalls. Data passing the gateway induce no measurable delay. Project goals were realized by means of an infrastructure that works vendor independently with any HTML-based image distribution systems. The requirements of data security were realized using state-of-the-art web techniques. Adequate access and transfer speed lead to a widespread acceptance of the system on the part of external users.
A Comparative Study on the Architecture Internet of Things and its’ Implementation method
NASA Astrophysics Data System (ADS)
Xiao, Zhiliang
2017-08-01
With the rapid development of science and technology, Internet-based the Internet of things was born and achieved good results. In order to further build a complete Internet of things system, to achieve the design of the Internet of things, we need to constitute the object of the network structure of the indicators of comparative study, and on this basis, the Internet of things connected to the way and do more in-depth to achieve the unity of the object network architecture and implementation methods. This paper mainly analyzes the two types of Internet of Things system, and makes a brief comparative study of the important indicators, and then introduces the connection method and realization method of Internet of Things based on the concept of Internet of Things and architecture.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.
The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.
Secure Web-based Ground System User Interfaces over the Open Internet
NASA Technical Reports Server (NTRS)
Langston, James H.; Murray, Henry L.; Hunt, Gary R.
1998-01-01
A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.
Pallen, M
1995-11-25
The benefits to medical practitioners of using the Internet are growing rapidly as the Internet becomes easier to use and ever more biomedical resources become available on line. The Internet is the largest computer network in the world; it is also a virtual community, larger than many nation states, with its own rules of behaviour or "netiquette." There are several types of Internet connection and various ways of acquiring a connection. Once connected, you can obtain, free of charge, programs that allow easy use of the Internet's resources and help on how to use these resources; you can access many of these resources through the hypertext references in the on line version of this series (go to http:@www.bmj.com/bmj/ to reach the electronic version). You can then explore the various methods for accessing, manipulating, or disseminating data on the Internet, such as electronic mail, telnet, file transfer protocol, and the world wide web. Results from a search of the world wide web for information on the rare condition of Recklinghausen's neurofibromatosis illustrate the breadth of medical information available on the Internet.
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
Analytical Characterization of Internet Security Attacks
ERIC Educational Resources Information Center
Sellke, Sarah H.
2010-01-01
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
2008 Homeland Security Symposium and Exposition
2008-09-10
Untitled Document 2008 Homeland Security Symposium and Exposition.html[5/19/2016 8:49:43 AM] 2008 Homeland Security Symposium and Exposition "New...national defenSe magazine Advertise in National Defense and increase your company exposure at this symposium! National Defense will be distributed to all...use the Internet Cafe to check their e-mail and search the Internet. Brand your name with maximum exposure at this high traffic area. Benefits
Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows
2013-09-01
bayes classifier,” in Cloud Computing Security , ser. CCSW ’09. New York City, NY: ACM, 2009, pp. 31–42. [30] J. Zhang, R. Perdisci, W. Lee, U. Sarfraz...FSM Finite State Machine HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control...This hidden traffic concept supports network access control, security protection through obfuscation, and performance boosts at the Internet facing
Healthcare teams over the Internet: towards a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2002-01-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Dauz, Emily; Moore, Jan; Smith, Carol E; Puno, Florence; Schaag, Helen
2004-01-01
This article describes the experiences of nurses who, as part of a large clinical trial, brought the Internet into older adults' homes by installing a computer, if needed, and connecting to a patient education Web site. Most of these patients had not previously used the Internet and were taught even basic computer skills when necessary. Because of increasing use of the Internet in patient education, assessment, and home monitoring, nurses in various roles currently connect with patients to monitor their progress, teach about medications, and answer questions about appointments and treatments. Thus, nurses find themselves playing the role of technology managers for patients with home-based Internet connections. This article provides step-by-step procedures for computer installation and training in the form of protocols, checklists, and patient user guides. By following these procedures, nurses can install computers, arrange Internet access, teach and connect to their patients, and prepare themselves to install future generations of technological devices.
Research on key technologies of data processing in internet of things
NASA Astrophysics Data System (ADS)
Zhu, Yangqing; Liang, Peiying
2017-08-01
The data of Internet of things (IOT) has the characteristics of polymorphism, heterogeneous, large amount and processing real-time. The traditional structured and static batch processing method has not met the requirements of data processing of IOT. This paper studied a middleware that can integrate heterogeneous data of IOT, and integrated different data formats into a unified format. Designed a data processing model of IOT based on the Storm flow calculation architecture, integrated the existing Internet security technology to build the Internet security system of IOT data processing, which provided reference for the efficient transmission and processing of IOT data.
Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)
2002-01-01
Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.
20 CFR 404.630 - Use of date of written statement as filing date.
Code of Federal Regulations, 2014 CFR
2014-04-01
... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...
20 CFR 404.630 - Use of date of written statement as filing date.
Code of Federal Regulations, 2010 CFR
2010-04-01
... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...
20 CFR 404.630 - Use of date of written statement as filing date.
Code of Federal Regulations, 2012 CFR
2012-04-01
... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...
20 CFR 404.630 - Use of date of written statement as filing date.
Code of Federal Regulations, 2013 CFR
2013-04-01
... contacts us through the Internet by completing and transmitting the Personal Identification Information data on the Internet Social Security Benefit Application to us, we will use the date of the... date. 404.630 Section 404.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...
77 FR 1971 - Supplemental Security Income and Homeless Individuals
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-12
... these individuals (nearly 80 percent) spent time only in an emergency shelter.\\2\\ \\1\\ United States...-- Internet, fax, or mail. Do not submit the same comments multiple times or by more than one method... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY...
'Second generation' Internet e-health: the gladiator for HIPAA compliance?
Korpman, R A; Rose, J S
2001-01-01
The Health Insurance Portability and Accountability Act (HIPAA) is intended to simplify administrative processes and improve health information security. There are a number of traditional ways to address the expense and complexities of simplification, but none of them are bargains or beauties to behold: (1) Do-it-yourself encryption; (2) new back-end system purchases; (3) legacy system re-programming; or (4) onerous paper documentation. The good news is that 'second generation' e-health solutions are emerging that act as internal "wrappers" for health plan or provider data systems. They provide both an interface for end-users and a layer of security for organizational information and allow detailed patient-related data to remain at the system owner's physical location. These second generation solutions don't just 'connect,' data, they actually 'understand' the information, and can use data elements to invoke necessary rules, processing pathways, or personalization for specific stakeholders as required by HIPAA.
Cyber-Security Issues in Healthcare Information Technology.
Langer, Steve G
2017-02-01
In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.
AEGIS: A Lightweight Firewall for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Hossain, Mohammad Sajjad; Raghunathan, Vijay
Firewalls are an essential component in today's networked computing systems (desktops, laptops, and servers) and provide effective protection against a variety of over-the-network security attacks. With the development of technologies such as IPv6 and 6LoWPAN that pave the way for Internet-connected embedded systems and sensor networks, these devices will soon be subject to (and need to be defended against) similar security threats. As a first step, this paper presents Aegis, a lightweight, rule-based firewall for networked embedded systems such as wireless sensor networks. Aegis is based on a semantically rich, yet simple, rule definition language. In addition, Aegis is highly efficient during operation, runs in a transparent manner from running applications, and is easy to maintain. Experimental results obtained using real sensor nodes and cycle-accurate simulations demonstrate that Aegis successfully performs gatekeeping of a sensor node's communication traffic in a flexible manner with minimal overheads.
Why Broadband Internet Should Not Be the Priority for Developing Countries
NASA Astrophysics Data System (ADS)
Noam, Eli
With broadband Internet connectivity progressing, the focus of attention has shifted to those left behind. The shorthand word for this concern is the classic “digital divide.” Underlying virtually every discussion about a gap in broadband penetrations is the implicit assumption that overcoming such a divide is a priority (Meschi et al., 2004; Crandall et al., 2007). But maybe we first should pause for a moment and understand the implications of ending this divide. If we do that, we might end up changing our perspective on Internet policy in an important way: away from a focus on broadband Internet connectivity, and towards universal connectivity and the creation of E-transactions, E-commerce, and E-content.
Klonoff, David C
2017-07-01
The Internet of Things (IoT) is generating an immense volume of data. With cloud computing, medical sensor and actuator data can be stored and analyzed remotely by distributed servers. The results can then be delivered via the Internet. The number of devices in IoT includes such wireless diabetes devices as blood glucose monitors, continuous glucose monitors, insulin pens, insulin pumps, and closed-loop systems. The cloud model for data storage and analysis is increasingly unable to process the data avalanche, and processing is being pushed out to the edge of the network closer to where the data-generating devices are. Fog computing and edge computing are two architectures for data handling that can offload data from the cloud, process it nearby the patient, and transmit information machine-to-machine or machine-to-human in milliseconds or seconds. Sensor data can be processed near the sensing and actuating devices with fog computing (with local nodes) and with edge computing (within the sensing devices). Compared to cloud computing, fog computing and edge computing offer five advantages: (1) greater data transmission speed, (2) less dependence on limited bandwidths, (3) greater privacy and security, (4) greater control over data generated in foreign countries where laws may limit use or permit unwanted governmental access, and (5) lower costs because more sensor-derived data are used locally and less data are transmitted remotely. Connected diabetes devices almost all use fog computing or edge computing because diabetes patients require a very rapid response to sensor input and cannot tolerate delays for cloud computing.
Frequency Count Attribute Oriented Induction of Corporate Network Data for Mapping Business Activity
NASA Astrophysics Data System (ADS)
Tanutama, Lukas
2014-03-01
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology infrastructure backbone for business activities, corporate network connects the company to Internet and enables its activities globally. It carries data packets generated by the activities of the users performing their business tasks. Traditionally, infrastructure operations mainly maintain data carrying capacity and network devices performance. It would be advantageous if a company knows what activities are running in its network. The research provides a simple method of mapping the business activity reflected by the network data. To map corporate users' activities, a slightly modified Attribute Oriented Induction (AOI) approach to mine the network data was applied. The frequency of each protocol invoked were counted to show what the user intended to do. The collected data was samples taken within a certain sampling period. Samples were taken due to the enormous data packets generated. Protocols of interest are only Internet related while intranet protocols are ignored. It can be concluded that the method could provide the management a general overview of the usage of its infrastructure and lead to efficient, effective and secure ICT infrastructure.
Internet as a Tool for Reference Work Experiences from the IFLA/Danida Trial Project in Ghana.
ERIC Educational Resources Information Center
Kondrup, Ruth
The basic ideas of the project described in this paper are to establish Internet connections to libraries in developing countries, to give access to information and to organize training of staff. Technical solutions with radio and microwave Internet connections have been established. Access to on-line journals has been established by the PERI…
What Is the Internet, Who Is Running It and How Is It Used?
ERIC Educational Resources Information Center
Eschbach, Darel
The Internet, for the purposes of this discussion, refers to the network that has the National Science Foundation Network (NSFNET) as its backbone. For this paper, internet is the larger connection of networks that provides a minimum basic connection for electronic mail. The network is made up of many segments structured in a multitiered hierarchy…
Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations
NASA Technical Reports Server (NTRS)
Donohue, John T.; Critchfield, Anna R.
2000-01-01
We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.
Floros, Georgios; Siomos, Konstantinos; Dafouli, Evaggelia; Fisoun, Virginia; Geroukalis, Dimitrios
2012-01-01
In this paper we present the results of a cross-sectional study of the entire adolescent student population aged 12-18 of the island of Kos and their parents, on Internet safety-related practices and attitudes towards the Internet. Total sample was 2017 students and 1214 parent responders. Research material included extended demographics and an Internet security questionnaire, the Internet Attitudes Scale (IAS) for parents and the Adolescent Computer Addiction Test (ACAT) for children and both parents. Both parents thus provided their views on their children's computer use and an estimate for their degree of computer addiction which was tested against their child's self-report. Results indicated that fathers and mothers who had negative views of the Internet, tended to encourage less their children to engage in online activities and worried more for the possibility that their child is addicted to computer use; their worries weren't correlated with their children's results. Parental views on the Internet had no effect on the level of security precautions they employed at home. Those parents who reported a low level of security knowledge and were unsure as to what their children were doing online, tended to consider their children more likely to be addicted to computer use; those views were confirmed by their children' self-reported results.
Implementation of the Internet of Things on Public Security
NASA Astrophysics Data System (ADS)
Lu, Kesheng; Li, Xichun
The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players. The public security as one of the key players is going to make real-time communications will be possible not only by humans but also by things at anytime and from anywhere. This research will present the advent of the Internet of Things to create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities.
Research on Influence of Cloud Environment on Traditional Network Security
NASA Astrophysics Data System (ADS)
Ming, Xiaobo; Guo, Jinhua
2018-02-01
Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.
NASA Astrophysics Data System (ADS)
Zaharov, A. A.; Nissenbaum, O. V.; Ponomaryov, K. Y.; Nesgovorov, E. S.
2018-01-01
In this paper we study application of Internet of Thing concept and devices to secure automated process control systems. We review different approaches in IoT (Internet of Things) architecture and design and propose them for several applications in security of automated process control systems. We consider an Attribute-based encryption in context of access control mechanism implementation and promote a secret key distribution scheme between attribute authorities and end devices.
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
NASA Astrophysics Data System (ADS)
Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan
2017-08-01
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.
Pangalos, George
2001-01-01
Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented. PMID:11720956
Ilioudis, C; Pangalos, G
2001-01-01
The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented.
Distribute Off-Time Office Internet bandwidth Using Topology Mesh For Sorrounding Neighbour
NASA Astrophysics Data System (ADS)
Zendrato, Niskarto; Sihombing, Oloan; Laia, Yonata; Sabarita Barus, Ertina
2018-04-01
The Internet as one of the very rapidly growing information technology can provide data and information with wide world, complete, and up to date. Users can download and upload data such as the application file, multimedia and text through the Internet network. But for the Internet availability is still less equal access because of the lack of availability of adequate infrastructure, therefore the author make the utilization of bandwidth that can be establish Internet balancing although still on a small scale. By this research the authors use bandwidth from PT. Deltauli Home Teknikarya that where bandwidth necessity on when time off-time unused office, where the office always pay full for Internet connection even though at the time of the off-time. It’s many of the available bandwidth, so that the author is trying to take advantage of the bandwidth at the time of the off-time the office to be used by the community using radio connection link and use the radius server as user management and server to send sms and user and password to the users who want to enjoy free internet connection.
On the security of consumer wearable devices in the Internet of Things.
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.
On the security of consumer wearable devices in the Internet of Things
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756
Internet Roadside Cafe #6. [Videotape.
ERIC Educational Resources Information Center
American Library Association Video/Library Video Network, Towson, MD.
This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…
Gür, Kamer; Yurt, Seher; Bulduk, Serap; Atagöz, Sinem
2015-09-01
The aim of this study was to determine secondary school students' levels of Internet addiction and the physical and psychosocial behavior problems they face while using the Internet. This descriptive study was conducted in three state secondary schools in a rural area in the western part of Turkey. This study's sample consisted of 549 students who agreed to participate, with the consent of their families, and who had an Internet connection at home. The data were evaluated using t-tests and variance analyses. In this study the students' score of Internet addiction was at medium level (mean addiction score 44.51 ± 17.90). There were significant differences between the students' Internet addiction scores and the presence of physical behavior problems (going to bed late, skipping meals, eating meals in front of the computer) and psychosocial behavior problems (suffering from conditions such as restlessness, anger, heart palpitations, or tremors when they could not connect to the Internet, decreased relationships with family and friends, feelings of anger, arguing with parents, and finding life boring and empty without an Internet connection). © 2014 Wiley Publishing Asia Pty Ltd.
Seplovich, Gabriela; Horvath, Keith J; Haughton, Lorlette J; Blackstock, Oni J
2017-03-31
For persons living with chronic medical conditions, the Internet can be a powerful tool for health promotion, and allow for immediate access to medical information and social support. However, women living with human immunodeficiency virus (HIV) in the United States face numerous barriers to computer and Internet use. Health behavior change models suggest that the first step towards adopting a new health behavior is to improve attitudes towards that behavior. To develop and pilot test Get+Connected, an intervention to improve computer and Internet attitudes and Internet use among women living with HIV. To develop Get+Connected, we reviewed the extant literature, adapted an existing curriculum, and conducted a focus group with HIV-positive women (n=20) at a community-based organization in the Bronx, New York. Get+Connected was comprised of five weekly sessions covering the following topics: basic computer knowledge and skills, identifying reliable health-related websites, setting up and using email and Facebook accounts, and a final review session. We recruited 12 women to participate in pilot testing. At baseline, we collected data about participants' sociodemographic information, clinical characteristics, and technology device ownership and use. At baseline, intervention completion, and three months postintervention, we collected data regarding attitudes towards computers and the Internet (Attitudes Towards Computers and the Internet Questionnaire [ATCIQ]; possible scores range from 5-50) as well as frequency of Internet use (composite measure). To examine changes in ATCIQ scores and Internet use over time, we used generalized estimating equations. We also collected qualitative data during intervention delivery. Among women in our sample, the median age was 56 years (interquartile range=52-63). All participants were black/African American and/or Latina. Seven participants (7/12, 58%) had a high school diploma (or equivalent) or higher degree. Ten participants (10/12, 83%) reported owning a mobile phone, while only one (1/12, 8%) reported owning a computer or tablet. Only one participant (1/12, 8%) reported having ever used the Internet or email. Internet nonusers cited lack of computer/Internet knowledge (6/11, 54%) and lack of access to a computer or similar device (4/11, 36%) as the main barriers to use. Over time, we observed an improvement in attitudes towards computers and the Internet (ATCIQ scores: 33.5 at baseline, 35 at intervention completion, and 36 at three months postintervention; P=.008). No significant increase in Internet use was observed (P=.61). Qualitative findings indicated excitement and enthusiasm for the intervention. In our sample of urban, technology-inexperienced HIV-positive women, participation in Get+Connected was associated with an improvement in attitudes towards computers and the Internet, but not Internet use. Changing attitudes is the first step in many health behavior change models, indicating that with improved access to computer and Internet resources, frequency of Internet use may also have increased. Future studies should consider addressing issues of access to technology in conjunction with Get+Connected. ©Gabriela Seplovich, Keith J Horvath, Lorlette J Haughton, Oni J Blackstock. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 31.03.2017.
Seplovich, Gabriela; Horvath, Keith J; Haughton, Lorlette J
2017-01-01
Background For persons living with chronic medical conditions, the Internet can be a powerful tool for health promotion, and allow for immediate access to medical information and social support. However, women living with human immunodeficiency virus (HIV) in the United States face numerous barriers to computer and Internet use. Health behavior change models suggest that the first step towards adopting a new health behavior is to improve attitudes towards that behavior. Objective To develop and pilot test Get+Connected, an intervention to improve computer and Internet attitudes and Internet use among women living with HIV. Methods To develop Get+Connected, we reviewed the extant literature, adapted an existing curriculum, and conducted a focus group with HIV-positive women (n=20) at a community-based organization in the Bronx, New York. Get+Connected was comprised of five weekly sessions covering the following topics: basic computer knowledge and skills, identifying reliable health-related websites, setting up and using email and Facebook accounts, and a final review session. We recruited 12 women to participate in pilot testing. At baseline, we collected data about participants’ sociodemographic information, clinical characteristics, and technology device ownership and use. At baseline, intervention completion, and three months postintervention, we collected data regarding attitudes towards computers and the Internet (Attitudes Towards Computers and the Internet Questionnaire [ATCIQ]; possible scores range from 5-50) as well as frequency of Internet use (composite measure). To examine changes in ATCIQ scores and Internet use over time, we used generalized estimating equations. We also collected qualitative data during intervention delivery. Results Among women in our sample, the median age was 56 years (interquartile range=52-63). All participants were black/African American and/or Latina. Seven participants (7/12, 58%) had a high school diploma (or equivalent) or higher degree. Ten participants (10/12, 83%) reported owning a mobile phone, while only one (1/12, 8%) reported owning a computer or tablet. Only one participant (1/12, 8%) reported having ever used the Internet or email. Internet nonusers cited lack of computer/Internet knowledge (6/11, 54%) and lack of access to a computer or similar device (4/11, 36%) as the main barriers to use. Over time, we observed an improvement in attitudes towards computers and the Internet (ATCIQ scores: 33.5 at baseline, 35 at intervention completion, and 36 at three months postintervention; P=.008). No significant increase in Internet use was observed (P=.61). Qualitative findings indicated excitement and enthusiasm for the intervention. Conclusions In our sample of urban, technology-inexperienced HIV-positive women, participation in Get+Connected was associated with an improvement in attitudes towards computers and the Internet, but not Internet use. Changing attitudes is the first step in many health behavior change models, indicating that with improved access to computer and Internet resources, frequency of Internet use may also have increased. Future studies should consider addressing issues of access to technology in conjunction with Get+Connected. PMID:28363879
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.
Ghanti, Shaila; Naik, G M
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System
Ghanti, Shaila
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350
2013-01-01
Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965
A Comprehensive and Cost-Effective Computer Infrastructure for K-12 Schools
NASA Technical Reports Server (NTRS)
Warren, G. P.; Seaton, J. M.
1996-01-01
Since 1993, NASA Langley Research Center has been developing and implementing a low-cost Internet connection model, including system architecture, training, and support, to provide Internet access for an entire network of computers. This infrastructure allows local area networks which exceed 50 machines per school to independently access the complete functionality of the Internet by connecting to a central site, using state-of-the-art commercial modem technology, through a single standard telephone line. By locating high-cost resources at this central site and sharing these resources and their costs among the school districts throughout a region, a practical, efficient, and affordable infrastructure for providing scale-able Internet connectivity has been developed. As the demand for faster Internet access grows, the model has a simple expansion path that eliminates the need to replace major system components and re-train personnel. Observations of optical Internet usage within an environment, particularly school classrooms, have shown that after an initial period of 'surfing,' the Internet traffic becomes repetitive. By automatically storing requested Internet information on a high-capacity networked disk drive at the local site (network based disk caching), then updating this information only when it changes, well over 80 percent of the Internet traffic that leaves a location can be eliminated by retrieving the information from the local disk cache.
[Liquid modernity and internet addiction].
Doi, Takayoshi
2015-09-01
We are afraid that we are not always connected to somebody. There are such strong feelings to human relations in the background of internet addiction. It is reflection of today's social fluidity, and it is also reflection of the strength of the approval desire to occur from there. The feeling of fear in being off human relations in this society directs us to always-on connection by the internet.
All Aboard the Internet. E to Go: The Internet in Your Pocket
ERIC Educational Resources Information Center
Descy, Don E.
2006-01-01
Some remember when they accessed the Internet through the telephone on a 300-baud modem. It was slow and it was not easy, but it gave them a view of the world. Now there is the web, idiot-proof email, and practically unlimited wireless connectivity. Having gone from desktop computers to laptops, now a major push is moving connectivity into the…
Flexible software architecture for user-interface and machine control in laboratory automation.
Arutunian, E B; Meldrum, D R; Friedman, N A; Moody, S E
1998-10-01
We describe a modular, layered software architecture for automated laboratory instruments. The design consists of a sophisticated user interface, a machine controller and multiple individual hardware subsystems, each interacting through a client-server architecture built entirely on top of open Internet standards. In our implementation, the user-interface components are built as Java applets that are downloaded from a server integrated into the machine controller. The user-interface client can thereby provide laboratory personnel with a familiar environment for experiment design through a standard World Wide Web browser. Data management and security are seamlessly integrated at the machine-controller layer using QNX, a real-time operating system. This layer also controls hardware subsystems through a second client-server interface. This architecture has proven flexible and relatively easy to implement and allows users to operate laboratory automation instruments remotely through an Internet connection. The software architecture was implemented and demonstrated on the Acapella, an automated fluid-sample-processing system that is under development at the University of Washington.
Design and Development of a Flight Route Modification, Logging, and Communication Network
NASA Technical Reports Server (NTRS)
Merlino, Daniel K.; Wilson, C. Logan; Carboneau, Lindsey M.; Wilder, Andrew J.; Underwood, Matthew C.
2016-01-01
There is an overwhelming desire to create and enhance communication mechanisms between entities that operate within the National Airspace System. Furthermore, airlines are always extremely interested in increasing the efficiency of their flights. An innovative system prototype was developed and tested that improves collaborative decision making without modifying existing infrastructure or operational procedures within the current Air Traffic Management System. This system enables collaboration between flight crew and airline dispatchers to share and assess optimized flight routes through an Internet connection. Using a sophisticated medium-fidelity flight simulation environment, a rapid-prototyping development, and a unified modeling language, the software was designed to ensure reliability and scalability for future growth and applications. Ensuring safety and security were primary design goals, therefore the software does not interact or interfere with major flight control or safety systems. The system prototype demonstrated an unprecedented use of in-flight Internet to facilitate effective communication with Airline Operations Centers, which may contribute to increased flight efficiency for airlines.
75 FR 9073 - Amendments to Rules Requiring Internet Availability of Proxy Materials
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-26
... Internet Availability of Proxy Materials; Final Rule #0;#0;Federal Register / Vol. 75 , No. 38 / Friday... to Rules Requiring Internet Availability of Proxy Materials AGENCY: Securities and Exchange... Notice of Internet Availability of Proxy Materials that is sent to shareholders and to permit issuers and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-18
...; Comment Request; Student Aid Internet Gateway (SAIG) Enrollment Document AGENCY: Federal Student Aid (FSA... Internet Gateway (SAIG) Enrollment Document. OMB Control Number: 1845-0002. Type of Review: A revision of... Internet Gateway (SAIG) allows eligible entities to securely exchange Title IV, Higher Education Act (HEA...
Use of a secure Internet Web site for collaborative medical research.
Marshall, W W; Haley, R W
2000-10-11
Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.
Privacy-enhanced electronic mail
NASA Astrophysics Data System (ADS)
Bishop, Matt
1990-06-01
The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.
Ding, Wei-na; Sun, Jin-hua; Sun, Ya-wen; Zhou, Yan; Li, Lei; Xu, Jian-rong; Du, Ya-song
2013-01-01
Excessive use of the Internet has been linked to a variety of negative psychosocial consequences. This study used resting-state functional magnetic resonance imaging (fMRI) to investigate whether functional connectivity is altered in adolescents with Internet gaming addiction (IGA). Seventeen adolescents with IGA and 24 normal control adolescents underwent a 7.3 minute resting-state fMRI scan. Posterior cingulate cortex (PCC) connectivity was determined in all subjects by investigating synchronized low-frequency fMRI signal fluctuations using a temporal correlation method. To assess the relationship between IGA symptom severity and PCC connectivity, contrast images representing areas correlated with PCC connectivity were correlated with the scores of the 17 subjects with IGA on the Chen Internet Addiction Scale (CIAS) and Barratt Impulsiveness Scale-11 (BIS-11) and their hours of Internet use per week. There were no significant differences in the distributions of the age, gender, and years of education between the two groups. The subjects with IGA showed longer Internet use per week (hours) (p<0.0001) and higher CIAS (p<0.0001) and BIS-11 (p = 0.01) scores than the controls. Compared with the control group, subjects with IGA exhibited increased functional connectivity in the bilateral cerebellum posterior lobe and middle temporal gyrus. The bilateral inferior parietal lobule and right inferior temporal gyrus exhibited decreased connectivity. Connectivity with the PCC was positively correlated with CIAS scores in the right precuneus, posterior cingulate gyrus, thalamus, caudate, nucleus accumbens, supplementary motor area, and lingual gyrus. It was negatively correlated with the right cerebellum anterior lobe and left superior parietal lobule. Our results suggest that adolescents with IGA exhibit different resting-state patterns of brain activity. As these alterations are partially consistent with those in patients with substance addiction, they support the hypothesis that IGA as a behavioral addiction that may share similar neurobiological abnormalities with other addictive disorders.
Li, Lei; Xu, Jian-rong
2013-01-01
Purpose Excessive use of the Internet has been linked to a variety of negative psychosocial consequences. This study used resting-state functional magnetic resonance imaging (fMRI) to investigate whether functional connectivity is altered in adolescents with Internet gaming addiction (IGA). Methods Seventeen adolescents with IGA and 24 normal control adolescents underwent a 7.3 minute resting-state fMRI scan. Posterior cingulate cortex (PCC) connectivity was determined in all subjects by investigating synchronized low-frequency fMRI signal fluctuations using a temporal correlation method. To assess the relationship between IGA symptom severity and PCC connectivity, contrast images representing areas correlated with PCC connectivity were correlated with the scores of the 17 subjects with IGA on the Chen Internet Addiction Scale (CIAS) and Barratt Impulsiveness Scale-11 (BIS-11) and their hours of Internet use per week. Results There were no significant differences in the distributions of the age, gender, and years of education between the two groups. The subjects with IGA showed longer Internet use per week (hours) (p<0.0001) and higher CIAS (p<0.0001) and BIS-11 (p = 0.01) scores than the controls. Compared with the control group, subjects with IGA exhibited increased functional connectivity in the bilateral cerebellum posterior lobe and middle temporal gyrus. The bilateral inferior parietal lobule and right inferior temporal gyrus exhibited decreased connectivity. Connectivity with the PCC was positively correlated with CIAS scores in the right precuneus, posterior cingulate gyrus, thalamus, caudate, nucleus accumbens, supplementary motor area, and lingual gyrus. It was negatively correlated with the right cerebellum anterior lobe and left superior parietal lobule. Conclusion Our results suggest that adolescents with IGA exhibit different resting-state patterns of brain activity. As these alterations are partially consistent with those in patients with substance addiction, they support the hypothesis that IGA as a behavioral addiction that may share similar neurobiological abnormalities with other addictive disorders. PMID:23555827
Enhanced Security for Online Exams Using Group Cryptography
ERIC Educational Resources Information Center
Jung, I. Y.; Yeom, H. Y.
2009-01-01
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Connection Development: Web Lessons from Westchester.
ERIC Educational Resources Information Center
Freedman, Maurice J.
1996-01-01
Committed to utilizing information technology, the Westchester Library System (New York) made the World Wide Web publicly accessible. Describes the planning, implementation, and management process; obstacles involving financing; establishing Internet connectivity; and vendor negotiations. Westchester hired a Web manager, created Internet use…
Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W
2004-04-01
We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.
The Northwest Indiana Robotic Telescope
NASA Astrophysics Data System (ADS)
Slavin, Shawn D.; Rengstorf, A. W.; Aros, J. C.; Segally, W. B.
2011-01-01
The Northwest Indiana Robotic (NIRo) Telescope is a remote, automated observing facility recently built by Purdue University Calumet (PUC) at a site in Lowell, IN, approximately 30 miles from the PUC campus. The recently dedicated observatory will be used for broadband and narrowband optical observations by PUC students and faculty, as well as pre-college students through the implementation of standards-based, middle-school modules developed by PUC astronomers and education faculty. The NIRo observatory and its web portal are the central technical elements of a project to improve astronomy education at Purdue Calumet and, more broadly, to improve science education in middle schools of the surrounding region. The NIRo Telescope is a 0.5-meter (20-inch) Ritchey-Chrétien design on a Paramount ME robotic mount, featuring a seven-position filter wheel (UBVRI, Hα, Clear), Peltier (thermoelectrically) cooled CCD camera with 3056 x 3056, square, 12 μm pixels, and off-axis guiding. It provides a coma-free imaging field of 0.5 degrees square, with a plate scale of 0.6 arcseconds per pixel. The observatory has a wireless internet connection, local weather station which publishes data to an internet weather site, and a suite of CCTV security cameras on an IP-based, networked video server. Control of power to every piece of instrumentation is maintained via internet-accessible power distribution units. The telescope can be controlled on-site, or off-site in an attended fashion via an internet connection, but will be used primarily in an unattended mode of automated observation, where queued observations will be scheduled daily from a database of requests. Completed observational data from queued operation will be stored on a campus-based server, which also runs the web portal and observation database. Partial support for this work was provided by the National Science Foundation's Course, Curriculum, and Laboratory Improvement (CCLI) program under Award No. 0736592.
Chavez, Afton; Littman-Quinn, Ryan; Ndlovu, Kagiso; Kovarik, Carrie L
2016-06-01
The following correspondence provides an overview of TV White Space (TVWS) technology, regulations, and potential applications to the health care sector. This report also introduces "Project Kgolagano," a Botswana-based initiative representing the first endeavour to utilize TVWS internet connection for practising telemedicine. TV "white space" refers to the previously unused, wasted spectrum within TV radiofrequency channels that can now be leveraged to obtain broadband internet access. TVWS represents a less costly, faster, and farther-reaching internet connection that is a promising option for connecting the previously unconnected populations of remote and underserved areas. The Botswana-University of Pennsylvania Partnership, Microsoft, Botswana Innovation Hub, Vista Life Sciences, and Global Broadband Solutions have partnered together to bring TVWS wireless broadband access to healthcare facilities in poorly connected regions of Botswana (Lobatse, Francistown, Maun, Gaborone) in order to improve healthcare delivery and facilitate telemedicine in dermatology, cervical cancer screening, and family medicine (HIV/AIDS, TB, general adult and pediatric medicine). © The Author(s) 2015.
A Community-Based IoT Personalized Wireless Healthcare Solution Trial.
Catherwood, Philip A; Steele, David; Little, Mike; Mccomb, Stephen; Mclaughlin, James
2018-01-01
This paper presents an advanced Internet of Things point-of-care bio-fluid analyzer; a LoRa/Bluetooth-enabled electronic reader for biomedical strip-based diagnostics system for personalized monitoring. We undertake test simulations (technology trial without patient subjects) to demonstrate potential of long-range analysis, using a disposable test 'key' and companion Android app to form a diagnostic platform suitable for remote point-of-care screening for urinary tract infection (UTI). The 868 MHz LoRaWAN-enabled personalized monitor demonstrated sound potential with UTI test results being correctly diagnosed and transmitted to a remote secure cloud server in every case. Tests ranged over distances of 1.1-6.0 Km with radio path losses from 119-141 dB. All tests conducted were correctly and robustly received at the base station and relayed to the secure server for inspection. The UTI test strips were visually inspected for correct diagnosis based on color change and verified as 100% accurate. Results from testing across a number of regions indicate that such an Internet of Things medical solution is a robust and simple way to deliver next generation community-based smart diagnostics and disease management to best benefit patients and clinical staff alike. This significant step can be applied to any type of home or region, particularly those lacking suitable mobile signals, broadband connections, or even landlines. It brings subscription-free long-range bio-telemetry to healthcare providers and offers savings on regular clinician home visits or frequent clinic visits by the chronically ill. This paper highlights practical hurdles in establishing an Internet of Medical Things network, assisting informed deployment of similar future systems.
A Community-Based IoT Personalized Wireless Healthcare Solution Trial
Steele, David; Little, Mike; Mccomb, Stephen; Mclaughlin, James
2018-01-01
This paper presents an advanced Internet of Things point-of-care bio-fluid analyzer; a LoRa/Bluetooth-enabled electronic reader for biomedical strip-based diagnostics system for personalized monitoring. We undertake test simulations (technology trial without patient subjects) to demonstrate potential of long-range analysis, using a disposable test ‘key’ and companion Android app to form a diagnostic platform suitable for remote point-of-care screening for urinary tract infection (UTI). The 868 MHz LoRaWAN-enabled personalized monitor demonstrated sound potential with UTI test results being correctly diagnosed and transmitted to a remote secure cloud server in every case. Tests ranged over distances of 1.1–6.0 Km with radio path losses from 119–141 dB. All tests conducted were correctly and robustly received at the base station and relayed to the secure server for inspection. The UTI test strips were visually inspected for correct diagnosis based on color change and verified as 100% accurate. Results from testing across a number of regions indicate that such an Internet of Things medical solution is a robust and simple way to deliver next generation community-based smart diagnostics and disease management to best benefit patients and clinical staff alike. This significant step can be applied to any type of home or region, particularly those lacking suitable mobile signals, broadband connections, or even landlines. It brings subscription-free long-range bio-telemetry to healthcare providers and offers savings on regular clinician home visits or frequent clinic visits by the chronically ill. This paper highlights practical hurdles in establishing an Internet of Medical Things network, assisting informed deployment of similar future systems. PMID:29888145
Retailing and Shopping on the Internet.
ERIC Educational Resources Information Center
Rowley, Jennifer
1996-01-01
Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
Older Adults' Knowledge of Internet Hazards
ERIC Educational Resources Information Center
Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L.
2010-01-01
Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…
Siomos, Konstantinos; Floros, Georgios; Fisoun, Virginia; Evaggelia, Dafouli; Farkonas, Nikiforos; Sergentani, Elena; Lamprou, Maria; Geroukalis, Dimitrios
2012-04-01
We present results from a cross-sectional study of the entire adolescent student population aged 12-18 of the island of Kos and their parents, on Internet abuse, parental bonding and parental online security practices. We also compared the level of over involvement with personal computers of the adolescents to the respective estimates of their parents. Our results indicate that Internet addiction is increased in this population where no preventive attempts were made to combat the phenomenon from the initial survey, 2 years ago. This increase is parallel to an increase in Internet availability. The best predictor variables for Internet and computer addiction were parental bonding variables and not parental security practices. Parents tend to underestimate the level of computer involvement when compared to their own children estimates. Parental safety measures on Internet browsing have only a small preventive role and cannot protect adolescents from Internet addiction. The three online activities most associated with Internet addiction were watching online pornography, online gambling and online gaming. © Springer-Verlag 2012
Real-time Internet connections: implications for surgical decision making in laparoscopy.
Broderick, T J; Harnett, B M; Doarn, C R; Rodas, E B; Merrell, R C
2001-08-01
To determine whether a low-bandwidth Internet connection can provide adequate image quality to support remote real-time surgical consultation. Telemedicine has been used to support care at a distance through the use of expensive equipment and broadband communication links. In the past, the operating room has been an isolated environment that has been relatively inaccessible for real-time consultation. Recent technological advances have permitted videoconferencing over low-bandwidth, inexpensive Internet connections. If these connections are shown to provide adequate video quality for surgical applications, low-bandwidth telemedicine will open the operating room environment to remote real-time surgical consultation. Surgeons performing a laparoscopic cholecystectomy in Ecuador or the Dominican Republic shared real-time laparoscopic images with a panel of surgeons at the parent university through a dial-up Internet account. The connection permitted video and audio teleconferencing to support real-time consultation as well as the transmission of real-time images and store-and-forward images for observation by the consultant panel. A total of six live consultations were analyzed. In addition, paired local and remote images were "grabbed" from the video feed during these laparoscopic cholecystectomies. Nine of these paired images were then placed into a Web-based tool designed to evaluate the effect of transmission on image quality. The authors showed for the first time the ability to identify critical anatomic structures in laparoscopy over a low-bandwidth connection via the Internet. The consultant panel of surgeons correctly remotely identified biliary and arterial anatomy during six laparoscopic cholecystectomies. Within the Web-based questionnaire, 15 surgeons could not blindly distinguish the quality of local and remote laparoscopic images. Low-bandwidth, Internet-based telemedicine is inexpensive, effective, and almost ubiquitous. Use of these inexpensive, portable technologies will allow sharing of surgical procedures and decisions regardless of location. Internet telemedicine consistently supported real-time intraoperative consultation in laparoscopic surgery. The implications are broad with respect to quality improvement and diffusion of knowledge as well as for basic consultation.
Guidelines for Network Security in the Learning Environment.
ERIC Educational Resources Information Center
Littman, Marlyn Kemper
1996-01-01
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
A Survey on Cyber Security awareness among college students in Tamil Nadu
NASA Astrophysics Data System (ADS)
Senthilkumar, K.; Easwaramoorthy, Sathishkumar
2017-11-01
The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.
Onion Routing for Anonymous and Private Internet Connections
1999-01-28
Onion Routing for Anonymous and Private Internet Connections David Goldschlag Michael Reedy Paul Syversony January 28, 1999 1 Introduction...Onion Routing operates by dynamically building anonymous connections within a network of real-time Chaum Mixes [3]. A Mix is a store and forward device...Commerce Workshop , August 1998. [3] D. Chaum . \\Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communications of the ACM , v. 24
Avendaño, Conrado; Mata, Ariela; Sanchez Sarmiento, César A; Doncel, Gustavo F
2012-01-01
To evaluate the effects of laptop computers connected to local area networks wirelessly (Wi-Fi) on human spermatozoa. Prospective in vitro study. Center for reproductive medicine. Semen samples from 29 healthy donors. Motile sperm were selected by swim up. Each sperm suspension was divided into two aliquots. One sperm aliquot (experimental) from each patient was exposed to an internet-connected laptop by Wi-Fi for 4 hours, whereas the second aliquot (unexposed) was used as control, incubated under identical conditions without being exposed to the laptop. Evaluation of sperm motility, viability, and DNA fragmentation. Donor sperm samples, mostly normozoospermic, exposed ex vivo during 4 hours to a wireless internet-connected laptop showed a significant decrease in progressive sperm motility and an increase in sperm DNA fragmentation. Levels of dead sperm showed no significant differences between the two groups. To our knowledge, this is the first study to evaluate the direct impact of laptop use on human spermatozoa. Ex vivo exposure of human spermatozoa to a wireless internet-connected laptop decreased motility and induced DNA fragmentation by a nonthermal effect. We speculate that keeping a laptop connected wirelessly to the internet on the lap near the testes may result in decreased male fertility. Further in vitro and in vivo studies are needed to prove this contention. Copyright © 2012 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.
49 CFR 1503.3 - Reports by the public of security problems, deficiencies, and vulnerabilities.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 1503.3 Reports; 601 South 12th Street; Arlington, VA 20598-6002; (2) Internet at http://www.tsa.gov/contact, selecting “Security Issues”; or (3) Telephone (toll-free) at 1-866-289-9673. (b) Reports submitted by mail will receive a receipt through the mail, reports submitted by the Internet will receive an...
49 CFR 1503.3 - Reports by the public of security problems, deficiencies, and vulnerabilities.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 1503.3 Reports; 601 South 12th Street; Arlington, VA 20598-6002; (2) Internet at http://www.tsa.gov/contact, selecting “Security Issues”; or (3) Telephone (toll-free) at 1-866-289-9673. (b) Reports submitted by mail will receive a receipt through the mail, reports submitted by the Internet will receive an...
49 CFR 1503.3 - Reports by the public of security problems, deficiencies, and vulnerabilities.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 1503.3 Reports; 601 South 12th Street; Arlington, VA 20598-6002; (2) Internet at http://www.tsa.gov/contact, selecting “Security Issues”; or (3) Telephone (toll-free) at 1-866-289-9673. (b) Reports submitted by mail will receive a receipt through the mail, reports submitted by the Internet will receive an...
49 CFR 1503.3 - Reports by the public of security problems, deficiencies, and vulnerabilities.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 1503.3 Reports; 601 South 12th Street; Arlington, VA 20598-6002; (2) Internet at http://www.tsa.gov/contact, selecting “Security Issues”; or (3) Telephone (toll-free) at 1-866-289-9673. (b) Reports submitted by mail will receive a receipt through the mail, reports submitted by the Internet will receive an...
Online Privacy, Security and Ethical Dilemma: A Recent Study.
ERIC Educational Resources Information Center
Karmakar, Nitya L.
The Internet remains as a wonder for the 21st century and its growth is phenomenon. According to a recent survey, the online population is now about 500 million globally and if this trend continues, it should reach 700 million by the end of 2002. This exponential growth of the Internet has given rise to several security, privacy and ethical…
A to Z: The Early Childhood Educator's Guide to the Internet. (Revised Edition).
ERIC Educational Resources Information Center
ERIC Clearinghouse on Elementary and Early Childhood Education, Urbana, IL.
This guide explains features of the Internet and compiles Internet resources useful to those interested in the education, growth, and development of young children. Chapter 1 of the guide, "An Introduction to the Internet," explains what is needed to connect to the Internet. The chapter then discusses the Internet's domain name system,…
Unofficial Technology Marvel of the Millennium.
ERIC Educational Resources Information Center
Ricart, Glenn
2000-01-01
Discusses the impact of the Internet, particularly on higher education. Highlights include a history of the development of the Internet; a leadership plan for higher education; authentication of personal identity; security; information quality; the concept of Internet time; and future possibilities. (LRW)
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
Adolescent online gambling: the impact of parental practices and correlates with online activities.
Floros, Georgios D; Siomos, Konstantinos; Fisoun, Virginia; Geroukalis, Dimitrios
2013-03-01
We present results from a cross-sectional study of the entire adolescent student population aged 12-19 of the island of Kos and their parents, on the relationship between their Internet gambling and respective parental practices, including aspects of psychological bonding and online security measures. The sample consisted of 2,017 students (51.8% boys, 48.2% girls). Our results indicate that gender, parenting practices as perceived by the adolescents and distinct patterns of adolescent Internet activities are among the best predictor variables for Internet gambling. Security practices exercised by the parents failed to make an impact on the extent of Internet gambling, demonstrating the need for specific measures to tackle this phenomenon since the provision of simple education on the dangers of the Internet is not sufficient to this regard.
How to Establish Security Awareness in Schools
NASA Astrophysics Data System (ADS)
Beyer, Anja; Westendorf, Christiane
The internet is a fast changing medium and comprises several websites fraught with risk. In this context especially young age groups are endangered. They have less experience using the media and little knowledge on existing internet risks. There are a number of initiatives, which are engaged in the topic of internet safety. They provide information about measures on how to prevent and to deal with internet risks. However it is not certain if these initiatives do reach their target group (children and adolescents). In this regard schools bear a special relevance, since they have the knowledge about didactic methods and the chance to address measures directly to children and adolescents. The authors of this paper provide an overview of current security education in German schools, problems and open questions. Finally the authors make recommendations on how to establish internet safety in schools.
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki
2011-03-01
We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.
ERIC Educational Resources Information Center
Neubarth, Michael, Ed.
1995-01-01
This special theme issue of "Internet World" contains 10 articles on the role of the Internet in education. The articles are: "Internet Cum Laude" (Eric C. Richardson)--technological developments in college and university services; "Campus Connections" (Michael A. Arnzen)--guidelines for taking full advantage of…
Mechanical Verification of Cryptographic Protocols
NASA Astrophysics Data System (ADS)
Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie
Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.
77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725
78 FR 15797 - Service Delivery Plan
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0048] Service Delivery Plan AGENCY: Social... information, such as Social Security numbers or medical information. 1. Internet: We strongly recommend that... Regulations and Reports Clearance, Social Security Administration, 107 Altmeyer Building, 6401 Security...
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
A Modern Operating System for Near-real-time Environmental Observatories
NASA Astrophysics Data System (ADS)
Orcutt, John; Vernon, Frank
2014-05-01
The NSF Ocean Observatory Initiative (OOI) provided an opportunity for expanding the capabilities for managing open, near-real-time (latencies of seconds) data from ocean observatories. The sensors deployed in this system largely return data from seafloor, cabled fiber optic cables as well as satellite telemetry. Bandwidth demands range from high-definition movies to the transmission of data via Iridium satellite. The extended Internet also provides an opportunity to not only return data, but to also control the sensors and platforms that comprise the observatory. The data themselves are openly available to any users. In order to provide heightened network security and overall reliability, the connections to and from the sensors/platforms are managed without Layer 3 of the Internet, but instead rely upon message passing using an open protocol termed Advanced Queuing Messaging Protocol (AMQP). The highest bandwidths in the system are in the Regional Scale Network (RSN) off Oregon and Washington and on the continent with highly reliable network connections between observatory components at 10 Gbps. The maintenance of metadata and life cycle histories of sensors and platforms is critical for providing data provenance over the years. The integrated cyberinfrastructure is best thought of as an operating system for the observatory - like the data, the software is also open and can be readily applied to new observatories, for example, in the rapidly evolving Arctic.
An Analysis of Fraud on the Internet.
ERIC Educational Resources Information Center
Baker, C. Richard
1999-01-01
Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)
DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  . Looking for other resources? Try the Internet Resources page Search through relevant online newspapers News | FAQs | Internet Resources | Glossary Help | Mailing Services | Contact Us | About Us | Security
Gaining Access to the Internet.
ERIC Educational Resources Information Center
Notess, Greg R.
1992-01-01
Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…
Altered default mode, fronto-parietal and salience networks in adolescents with Internet addiction.
Wang, Lubin; Shen, Hui; Lei, Yu; Zeng, Ling-Li; Cao, Fenglin; Su, Linyan; Yang, Zheng; Yao, Shuqiao; Hu, Dewen
2017-07-01
Internet addiction (IA) is a condition characterized by loss of control over Internet use, leading to a variety of negative psychosocial consequences. Recent neuroimaging studies have begun to identify IA-related changes in specific brain regions and connections. However, whether and how the interactions within and between the large-scale brain networks are disrupted in individuals with IA remain largely unexplored. Using group independent component analysis, we extracted five intrinsic connectivity networks (ICNs) from the resting-state fMRI data of 26 adolescents with IA and 43 controls, including the anterior and posterior default mode network (DMN), left and right fronto-parietal network (FPN), and salience network (SN). We then examined the possible group differences in the functional connectivity within each ICN and between the ICNs. We found that, compared with controls, IA subjects showed: (1) reduced inter-hemispheric functional connectivity of the right FPN, whereas increased intra-hemispheric functional connectivity of the left FPN; (2) reduced functional connectivity in the dorsal medial prefrontal cortex (mPFC) of the anterior DMN; (3) reduced functional connectivity between the SN and anterior DMN. Our findings suggest that IA is associated with imbalanced interactions among the DMN, FPN and SN, which may serve as system-level neural underpinnings for the uncontrollable Internet-using behaviors. Copyright © 2017 Elsevier Ltd. All rights reserved.
Zittrain, Jonathan
2007-06-01
The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.
ERIC Educational Resources Information Center
Yang, Hui-Jen; Lay, Yun-Long
2011-01-01
Nowadays people's lives heavily rely on Internet facilities. Internet users generally have constant Internet connectivity and intermittently click on sites they want to access even amidst studying or working. In this study, we sought to examine the factors affecting intermittent Internet pulling behavior on undergraduate students. Furthermore, the…
A to Z: The Early Childhood Educator's Guide to the Internet.
ERIC Educational Resources Information Center
ERIC Clearinghouse on Elementary and Early Childhood Education, Urbana, IL.
This guide explains features of the Internet and compiles Internet resources useful to those interested in the education, growth, and development of young children. Chapter 1 of the guide, "An Introduction to the Internet," explains what is needed to connect to the Internet. The chapter then discusses electronic mail, mail lists,…
What Causal Forces Shape Internet Connectivity at the AS-level?
2003-01-01
business “peering relationship .” By focusing on the AS subgraph ASPC whose links repre- sent provider- customer relationships , we present an empirical... customer relationships may be determined in the actual Internet, we develop a new optimization-driven model for Internet growth at the ASPC level...among ASs. Two ASs are connected in an AS graph by a link only if they have a “peering relationship ” between them, e.g., provider- customer or peer-to
Internet use, social networking, and HIV/AIDS risk for homeless adolescents.
Rice, Eric; Monro, William; Barman-Adhikari, Anamika; Young, Sean D
2010-12-01
To examine the association between sexual health and internet use, including social networking websites such as MySpace and Facebook, among a sample of homeless adolescents at high risk of contracting HIV/AIDS. In 2009, a survey of internet use among 201 homeless adolescents was carried out. Multivariate logistic regression models assessed how patterns of use were associated with engaging in exchange sex (sex for money, drugs, or housing), recent HIV testing, and online partner-seeking behaviors. Among the surveyed adolescents, 96.5% reported internet use. Most youth accessed the internet at public libraries or youth service agencies. Increased time online and recent engagement in exchange sex were both positively associated with online partner-seeking. Youth connected to family members online were less likely to practice exchange sex and more likely to report a recent HIV test. Youth connected to street-based peers online were more likely to practice exchange sex, whereas youth connected to home-based peers online were more likely to report a recent HIV test. Although these data are preliminary, homeless youth need more access to the internet, as access facilitates connecting with family and home-based peers whose presence may reduce sexual risk-taking. Access, however, must be carefully monitored to prevent youth soliciting sex online. Copyright © 2010 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
The Regulatory Framework for Privacy and Security
NASA Astrophysics Data System (ADS)
Hiller, Janine S.
The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.
The Effect of E-Portal System on Corporate Image of Universities
ERIC Educational Resources Information Center
Tunji, Oyedepo; Nelson, Okorie
2011-01-01
Internet connectivity in tertiary institutions in Africa has been summarized in three characteristics-- too little, too expensive and poorly managed (African Tertiary Institutions Connectivity Survey (ATICS), 2006 report). The Internet portal system offers educational organizations the ability to track students needs and promote their programs and…
ERIC Educational Resources Information Center
Ritz, John; Knaack, Zane
2017-01-01
In the 21st century, electronic connectivity is a major component of everyday life. One expects to have mobile phone coverage and to have access to log a computer or tablet onto the internet. This connectivity enables users to keep track of personal affairs and conduct work from remote locations. Designers and manufacturers are also connecting…
17 CFR 240.14c-3 - Annual report to be furnished security holders.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Notice of Internet Availability of Proxy Materials, annual report to security holders or information... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Annual report to be furnished security holders. 240.14c-3 Section 240.14c-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
17 CFR 240.14c-3 - Annual report to be furnished security holders.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Notice of Internet Availability of Proxy Materials, annual report to security holders or information... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Annual report to be furnished security holders. 240.14c-3 Section 240.14c-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
17 CFR 240.14c-3 - Annual report to be furnished security holders.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Notice of Internet Availability of Proxy Materials, annual report to security holders or information... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Annual report to be furnished security holders. 240.14c-3 Section 240.14c-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
17 CFR 240.14c-3 - Annual report to be furnished security holders.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Notice of Internet Availability of Proxy Materials, annual report to security holders or information... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Annual report to be furnished security holders. 240.14c-3 Section 240.14c-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
Get Linked or Get Lost: Marketing Strategy for the Internet.
ERIC Educational Resources Information Center
Aldridge, Alicia; Forcht, Karen; Pierson, Joan
1997-01-01
To cultivate an online market share, companies must design marketing strategies specifically for the Internet. This article examines the nature of business on the Internet, highlighting demographics, user control, accessibility, communication, authenticity, competition, and security and proposes a marketing strategy, including targeting and…
[The Internet and its security].
Masić, Izet; Ahmetović, Ademir; Jakupović, Safet; Masić, Zlatan; Zunić, Lejla
2002-01-01
Internet, is the greatest world net by by means of which nowadays the planet communicates, rapidly goes forward. The last years of the university in USA the commonly develop the more progressive concept of the net (Internet 2), thanks to the constant growing technologies, with the goal to answer the needs of the scientific and the educational institutions, but also the commercial institutions and the organizations. Almost the there is no more significant institution in the world which has not developed their web pages and data bases with the most actual contents available to the wider circle of the users. In this paper we have given the section of the most actual web pages. However, Internet is not immune to those users who are not benevolent and who have developed the different tools in the goal of the destroying or unabling of the normal use of all the Internet conveniences. The authors is considering the protection problem and the data security which get distributed by Internet.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160
Using the Internet: Concept to Classroom.
ERIC Educational Resources Information Center
Greenhalgh, J. B.
1997-01-01
State, federal, and corporate grants enabled Georgian Court College (New Jersey) to connect to the Internet, establish a multimedia lab, and purchase equipment for interactive distance learning. Describes the implementation of new programs utilizing Internet technology and highlights sample Internet projects in social work, education, aquatic and…
An end-to-end secure patient information access card system.
Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T
2000-03-01
The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Approaches for scalable modeling and emulation of cyber systems : LDRD final report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.
2009-09-01
The goal of this research was to combine theoretical and computational approaches to better understand the potential emergent behaviors of large-scale cyber systems, such as networks of {approx} 10{sup 6} computers. The scale and sophistication of modern computer software, hardware, and deployed networked systems have significantly exceeded the computational research community's ability to understand, model, and predict current and future behaviors. This predictive understanding, however, is critical to the development of new approaches for proactively designing new systems or enhancing existing systems with robustness to current and future cyber threats, including distributed malware such as botnets. We have developed preliminarymore » theoretical and modeling capabilities that can ultimately answer questions such as: How would we reboot the Internet if it were taken down? Can we change network protocols to make them more secure without disrupting existing Internet connectivity and traffic flow? We have begun to address these issues by developing new capabilities for understanding and modeling Internet systems at scale. Specifically, we have addressed the need for scalable network simulation by carrying out emulations of a network with {approx} 10{sup 6} virtualized operating system instances on a high-performance computing cluster - a 'virtual Internet'. We have also explored mappings between previously studied emergent behaviors of complex systems and their potential cyber counterparts. Our results provide foundational capabilities for further research toward understanding the effects of complexity in cyber systems, to allow anticipating and thwarting hackers.« less
A network monitor for HTTPS protocol based on proxy
NASA Astrophysics Data System (ADS)
Liu, Yangxin; Zhang, Lingcui; Zhou, Shuguang; Li, Fenghua
2016-10-01
With the explosive growth of harmful Internet information such as pornography, violence, and hate messages, network monitoring is essential. Traditional network monitors is based mainly on bypass monitoring. However, we can't filter network traffic using bypass monitoring. Meanwhile, only few studies focus on the network monitoring for HTTPS protocol. That is because HTTPS data is in the encrypted traffic, which makes it difficult to monitor. This paper proposes a network monitor for HTTPS protocol based on proxy. We adopt OpenSSL to establish TLS secure tunes between clients and servers. Epoll is used to handle a large number of concurrent client connections. We also adopt Knuth- Morris-Pratt string searching algorithm (or KMP algorithm) to speed up the search process. Besides, we modify request packets to reduce the risk of errors and modify response packets to improve security. Experiments show that our proxy can monitor the content of all tested HTTPS websites efficiently with little loss of network performance.
Control Systems Cyber Security:Defense in Depth Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Kuipers; Mark Fabro
2006-05-01
Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less
Control Systems Cyber Security: Defense-in-Depth Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mark Fabro
2007-10-01
Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecturemore » that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.« less
2009-01-01
early stages of the conflict, and secure an information warfare victory. Extremists’ use of the Internet has developed rapidly since the Chechen...activities Countering Internet Extremism By Mr. Timothy L. Thomas Editorial Abstract: The author examines the modern informational environment, and...spite of all of these resources—plus all of the money the west has thrown into information (read Internet ) security—an individual known as Irhabi
ERIC Educational Resources Information Center
Branzburg, Jeffrey
2005-01-01
Cablevision, Comcast, Verizon, and many other high-speed broadband Internet providers are now also offering telephone services through "Voice over Internet Protocol" (VoIP). This technology sends ordinary telephone calls over the Internet rather than over telephone lines. While impractical without the use of a broadband Internet connection, with…
Basic Internet Software Toolkit.
ERIC Educational Resources Information Center
Buchanan, Larry
1998-01-01
Once schools are connected to the Internet, the next step is getting network workstations configured for Internet access. This article describes a basic toolkit comprising software currently available on the Internet for free or modest cost. Lists URLs for Web browser, Telnet, FTP, file decompression, portable document format (PDF) reader,…
A to Z: The Early Childhood Educator's Guide to the Internet. (Revised).
ERIC Educational Resources Information Center
ERIC Clearinghouse on Elementary and Early Childhood Education, Champaign, IL.
This guide explains features of the Internet and compiles Internet resources useful to those interested in the education and development of young children. Chapter 1 of the guide explains what is needed to connect to the Internet. The chapter then discusses the Internet's domain name system, electronic mail, mail/discussion lists, newsgroups,…
An Internet-Based Accounting Information Systems Project
ERIC Educational Resources Information Center
Miller, Louise
2012-01-01
This paper describes a student project assignment used in an accounting information systems course. We are now truly immersed in the internet age, and while many required accounting information systems courses and textbooks introduce database design, accounting software development, cloud computing, and internet security, projects involving the…
Assurance: the power behind PCASSO security.
Baker, D. B.; Masys, D. R.; Jones, R. L.; Barnhart, R. M.
1999-01-01
The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted. While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care. PMID:10566443
Overview on In-Space Internet Node Testbed (ISINT)
NASA Technical Reports Server (NTRS)
Richard, Alan M.; Kachmar, Brian A.; Fabian, Theodore; Kerczewski, Robert J.
2000-01-01
The Satellite Networks and Architecture Branch has developed the In-Space Internet Node Technology testbed (ISINT) for investigating the use of commercial Internet products for NASA missions. The testbed connects two closed subnets over a tabletop Ka-band transponder by using commercial routers and modems. Since many NASA assets are in low Earth orbits (LEO's), the testbed simulates the varying signal strength, changing propagation delay, and varying connection times that are normally experienced when communicating to the Earth via a geosynchronous orbiting (GEO) communications satellite. Research results from using this testbed will be used to determine which Internet technologies are appropriate for NASA's future communication needs.
Connectivity, interoperability and manageability challenges in internet of things
NASA Astrophysics Data System (ADS)
Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Ismail, Ahmad Faris
2017-09-01
The vision of Internet of Things (IoT) is about interconnectivity between sensors, actuators, people and processes. IoT exploits connectivity between physical objects like fridges, cars, utilities, buildings and cities for enhancing the lives of people through automation and data analytics. However, this sudden increase in connected heterogeneous IoT devices takes a huge toll on the existing Internet infrastructure and introduces new challenges for researchers to embark upon. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployment. The paper finally concludes that IoT architecture and network infrastructure needs to be reengineered ground-up, so that IoT solutions can be safely and efficiently deployed.
Design and Implementation of Secure Area Expansion Scheme for Public Wireless LAN Services
NASA Astrophysics Data System (ADS)
Watanabe, Ryu; Tanaka, Toshiaki
Recently, wireless LAN (WLAN) technology has become a major wireless communication method. The communication bandwidth is increasing and speeds have attained rates exceeding 100 Mbps. Therefore, WLAN technology is regarded as one of the promising communication methods for future networks. In addition, public WLAN connection services can be used in many locations. However, the number of the access points (AP) is insufficient for seamless communication and it cannot be said that users can use the service ubiquitously. An ad-hoc network style connection can be used to expand the coverage area of a public WLAN service. By relaying the user messages among the user nodes, a node can obtain an Internet connection via an AP, even though the node is located outside the AP's direct wireless connection area. Such a coverage area extending technology has many advantages thanks to the feature that no additional infrastructure is required. Therefore, there is a strong demand for this technology as it allows the cost-effective construction of future networks. When a secure ad-hoc routing protocol is used for message exchange in the WLAN service, the message routes are protected from malicious behavior such as route forging and can be maintained appropriately. To do this, however, a new node that wants to join the WLAN service has to obtain information such as the public key certificate and IP address in order to start secure ad-hoc routing. In other words, an initial setup is required for every network node to join the WLAN service properly. Ordinarily, such information should be assigned from the AP. However, new nodes cannot always contact an AP directly. Therefore, there are problems about information delivery in the initial setup of a network node. These problems originate in the multi hop connection based on the ad-hoc routing protocols. In order to realize an expanded area WLAN service, in this paper, the authors propose a secure public key certificate and address provision scheme during the initial setup phase on mobile nodes for the service. The proposed scheme also considers the protection of user privacy. Accordingly, none of the user nodes has to reveal their unique and persistent information to other nodes. Instead of using such information, temporary values are sent by an AP to mobile nodes and used for secure ad-hoc routing operations. Therefore, our proposed scheme prevents tracking by malicious parties by avoiding the use of unique information. Moreover, a test bed was also implemented based on the proposal and an evaluation was carried out in order to confirm performance. In addition, the authors describe a countermeasure against denial of service (DoS) attacks based on the approach to privacy protection described in our proposal.
From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans
2014-06-01
Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any
2014-09-30
fingerprint sensor etc. Secure application execution Trust established outwards With normal world apps With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User
Constructing network scheme of connecting with Internet
NASA Astrophysics Data System (ADS)
Lin, Ganghua
2001-06-01
Nowadays people are more and more imminent for information's gain; time of gaining information is stressed; demand for information quantity is larger and larger. These make us have to scan again our communication pattern. Purpose of this article is comparing a few ways to connect with Internet to find a way that is proper to us.
Connecting to the Internet: The Challenge for Canada's County and Regional Libraries.
ERIC Educational Resources Information Center
Curry, Ann; Curtis, Alison
2000-01-01
Describes survey results that indicate Internet access and connectivity is proceeding rapidly despite the geographical, technical, and financial difficulties faced by Canadian systems with large geographical areas and members from different municipal or county jurisdictions. Discusses funding and using the World Wide Web as a reference tool.…
Using Internet Videoconferencing to Connect Fashion Students with Apparel Industry Professionals
ERIC Educational Resources Information Center
Ashley, Vera Bruce
2010-01-01
The purpose of this study was to explore the efficacy, benefits and student perceptions of using Internet videoconferencing and a web camera to connect college and university fashion students with apparel industry professionals. A total of 70 college and university fashion students, three instructors, and three apparel industry professionals…
Masys, D. R.; Baker, D. B.
1997-01-01
The Internet's World-Wide Web (WWW) provides an appealing medium for the communication of health related information due to its ease of use and growing popularity. But current technologies for communicating data between WWW clients and servers are systematically vulnerable to certain types of security threats. Prominent among these threats are "Trojan horse" programs running on client workstations, which perform some useful and known function for a user, while breaching security via background functions that are not apparent to the user. The Patient-Centered Access to Secure Systems Online (PCASSO) project of SAIC and UCSD is a research, development and evaluation project to exploit state-of-the-art security and WWW technology for health care. PCASSO is designed to provide secure access to clinical data for healthcare providers and their patients using the Internet. PCASSO will be evaluated for both safety and effectiveness, and may provide a model for secure communications via public data networks. PMID:9357644
Della Mea, V; Beltrami, C A
2000-01-01
The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e-mail; (b) teleconsultation via web-based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real-time consultations through Internet-based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real-time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.
Crossing the Internet Threshold: An Instructional Handbook. 2nd Edition.
ERIC Educational Resources Information Center
Tennant, Roy; Ober, John; Lipow, Anne G.
This how-to manual for the beginning Internet user contains sections on: the authors; an overview of computer networking; Internet basics, including a glossary, information on getting connected and keeping current, and a bibliography; electronic mail, including electronic discussions and electronic journals: Internet Remote Login (Telnet); File…
Healthcare teams over the Internet: programming a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2003-07-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Pre-Employment Testing on the Internet: Put Candidates a Click Away and Hire at Modem Speed.
ERIC Educational Resources Information Center
Mooney, John
2002-01-01
The experience of a county government illustrates factors to consider in implementing online employment testing for job candidates: (1) selection of the appropriate Internet-based test; (2) passwords, timing, security, and technical difficulties; and (3) provisions for applicants who lack Internet access. (SK)
ERIC Educational Resources Information Center
Internet Research, 1996
1996-01-01
Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…
Designing for the Elderly User: Internet Safety Training
ERIC Educational Resources Information Center
Appelt, Lianne C.
2016-01-01
The following qualitative study examines the usability of a custom-designed Internet safety tutorial, targeted at elderly individuals who use the Internet regularly, for effectively conveying critical information regarding online fraud, scams, and other cyber security. The elderly population is especially at risk when it comes to fraudulent…
A user authentication scheme using physiological and behavioral biometrics for multitouch devices.
Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.
A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices
Koong, Chorng-Shiuh; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864
Real-Time Internet Connections: Implications for Surgical Decision Making in Laparoscopy
Broderick, Timothy J.; Harnett, Brett M.; Doarn, Charles R.; Rodas, Edgar B.; Merrell, Ronald C.
2001-01-01
Objective To determine whether a low-bandwidth Internet connection can provide adequate image quality to support remote real-time surgical consultation. Summary Background Data Telemedicine has been used to support care at a distance through the use of expensive equipment and broadband communication links. In the past, the operating room has been an isolated environment that has been relatively inaccessible for real-time consultation. Recent technological advances have permitted videoconferencing over low-bandwidth, inexpensive Internet connections. If these connections are shown to provide adequate video quality for surgical applications, low-bandwidth telemedicine will open the operating room environment to remote real-time surgical consultation. Methods Surgeons performing a laparoscopic cholecystectomy in Ecuador or the Dominican Republic shared real-time laparoscopic images with a panel of surgeons at the parent university through a dial-up Internet account. The connection permitted video and audio teleconferencing to support real-time consultation as well as the transmission of real-time images and store-and-forward images for observation by the consultant panel. A total of six live consultations were analyzed. In addition, paired local and remote images were “grabbed” from the video feed during these laparoscopic cholecystectomies. Nine of these paired images were then placed into a Web-based tool designed to evaluate the effect of transmission on image quality. Results The authors showed for the first time the ability to identify critical anatomic structures in laparoscopy over a low-bandwidth connection via the Internet. The consultant panel of surgeons correctly remotely identified biliary and arterial anatomy during six laparoscopic cholecystectomies. Within the Web-based questionnaire, 15 surgeons could not blindly distinguish the quality of local and remote laparoscopic images. Conclusions Low-bandwidth, Internet-based telemedicine is inexpensive, effective, and almost ubiquitous. Use of these inexpensive, portable technologies will allow sharing of surgical procedures and decisions regardless of location. Internet telemedicine consistently supported real-time intraoperative consultation in laparoscopic surgery. The implications are broad with respect to quality improvement and diffusion of knowledge as well as for basic consultation. PMID:11505061
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
Test-bed for the remote health monitoring system for bridge structures using FBG sensors
NASA Astrophysics Data System (ADS)
Lee, Chin-Hyung; Park, Ki-Tae; Joo, Bong-Chul; Hwang, Yoon-Koog
2009-05-01
This paper reports on test-bed for the long-term health monitoring system for bridge structures employing fiber Bragg grating (FBG) sensors, which is remotely accessible via the web, to provide real-time quantitative information on a bridge's response to live loading and environmental changes, and fast prediction of the structure's integrity. The sensors are attached on several locations of the structure and connected to a data acquisition system permanently installed onsite. The system can be accessed through remote communication using an optical cable network, through which the evaluation of the bridge behavior under live loading can be allowed at place far away from the field. Live structural data are transmitted continuously to the server computer at the central office. The server computer is connected securely to the internet, where data can be retrieved, processed and stored for the remote web-based health monitoring. Test-bed revealed that the remote health monitoring technology will enable practical, cost-effective, and reliable condition assessment and maintenance of bridge structures.
Abnormally Malicious Autonomous Systems and their Internet Connectivity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shue, Craig A; Kalafut, Prof. Andrew; Gupta, Prof. Minaxi
While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularlymore » peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.« less
Psiha, Maria M; Vlamos, Panayiotis
2017-01-01
5G is the next generation of mobile communication technology. Current generation of wireless technologies is being evolved toward 5G for better serving end users and transforming our society. Supported by 5G cloud technology, personal devices will extend their capabilities to various applications, supporting smart life. They will have significant role in health, medical tourism, security, safety, and social life applications. The next wave of mobile communication is to mobilize and automate industries and industry processes via Machine-Type Communication (MTC) and Internet of Things (IoT). The current key performance indicators for the 5G infrastructure for the fully connected society are sufficient to satisfy most of the technical requirements in the healthcare sector. Thus, 5G can be considered as a door opener for new possibilities and use cases, many of which are as yet unknown. In this paper we present heterogeneous use cases in medical tourism sector, based on 5G infrastructure technologies and third-party cloud services.
Tribal connections health information outreach: results, evaluation, and challenges
Wood, Fred B.; Sahali, Roy; Press, Nancy; Burroughs, Catherine; Mala, Theodore A.; Siegel, Elliot R.; Fuller, Sherrilynne S.; Rambo, Neil
2003-01-01
In 1997, the National Library of Medicine (NLM), a component of the National Institutes of Health (NIH), initiated a program of intensified outreach to Native Americans, initially focusing on the Pacific Northwest in collaboration with the Pacific Northwest Regional Medical Library (PNRML). This initiative, known as the Tribal Connections Project, emphasized the establishment or strengthening of Internet connections at select Indian reservations and Alaska Native villages and related needs assessment and training. The hope was that these efforts would improve tribal access to health information available via the Internet and the Web. Phase I included sixteen tribal sites—eight in Washington, four in Alaska, two in Montana, and one each in Oregon and Idaho. Phase I results indicate that the project was successful in assessing local needs and building awareness of the Internet, forging new partnerships with and between the participating Indian reservations and Alaska Native villages and other organizations, making real improvements in the information technology (IT) infrastructure and Internet connectivity at fifteen of sixteen sites, and conducting training sessions with several hundred tribal participants across thirteen sites. Most importantly, the project demonstrated the key role of tribal community involvement and empowerment and contributed to development of an outreach evaluation field manual and the evolving concept of community-based outreach. The knowledge gained from Tribal Connections Project Phase I is helping refine and enhance subsequent NLM-sponsored tribal connections and similar community outreach efforts. PMID:12568158
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
Vehicle Theft Identification and Intimation Using GSM & IOT
NASA Astrophysics Data System (ADS)
Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva
2017-11-01
Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
ERIC Educational Resources Information Center
Sahin, Cengiz
2014-01-01
The concept of internet addiction refers to the excessive use of internet which in turn causes various problems in individual, social and professional aspects. The aim of this study is to determine the relationship between depression and internet addiction in terms of grades, sex, the existence of internet connection at home and time spent on…
Science and Technology Resources on the Internet: Computer Security.
ERIC Educational Resources Information Center
Kinkus, Jane F.
2002-01-01
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
32 CFR 156.5 - National security positions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... of Existing Personnel Security Clearances” dated December 12, 2005 (Copies available on the Internet... 32 National Defense 1 2014-07-01 2014-07-01 false National security positions. 156.5 Section 156.5 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE...
Space Internet-Embedded Web Technologies Demonstration
NASA Technical Reports Server (NTRS)
Foltz, David A.
2001-01-01
The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.
Transmission of live laparoscopic surgery over the Internet2.
Damore, L J; Johnson, J A; Dixon, R S; Iverson, M A; Ellison, E C; Melvin, W S
1999-11-01
Video broadcasting of surgical procedures is an important tool for education, training, and consultation. Current video conferencing systems are expensive and time-consuming and require preplanning. Real-time Internet video is known for its poor quality and relies on the equipment and the speed of the connection. The Internet2, a new high-speed (up to 2,048 Mbps), large bandwidth data network presently connects more than 100 universities and corporations. We have successfully used the Internet2 to broadcast the first real-time, high-quality audio/video program from a live laparoscopic operation to distant points. Video output of the laparoscopic camera and audio from a wireless microphone were broadcast to distant sites using a proprietary, PC-based implementation of H.320 video conferencing over a TCP/IP network connected to the Internet2. The receiving sites participated in two-way, real-time video and audio communications and graded the quality of the signal they received. On August 25, 1998, a laparoscopic Nissen fundoplication was transmitted to Internet2 stations in Colorado, Pennsylvania, and to an Internet station in New York. On September 28 and 29, 1998, we broadcast laparoscopic operations throughout both days to the Internet2 Fall Conference in San Francisco, California. Most recently, on February 24, 1999, we transmitted a laparoscopic Heller myotomy to the Abilene Network Launch Event in Washington, DC. The Internet2 is currently able to provide the bandwidth needed for a turn-key video conferencing system with high-resolution, real-time transmission. The system could be used for a variety of teaching and educational programs for experienced surgeons, residents, and medical students.
Secure Recognition of Voice-Less Commands Using Videos
NASA Astrophysics Data System (ADS)
Yau, Wai Chee; Kumar, Dinesh Kant; Weghorn, Hans
Interest in voice recognition technologies for internet applications is growing due to the flexibility of speech-based communication. The major drawback with the use of sound for internet access with computers is that the commands will be audible to other people in the vicinity. This paper examines a secure and voice-less method for recognition of speech-based commands using video without evaluating sound signals. The proposed approach represents mouth movements in the video data using 2D spatio-temporal templates (STT). Zernike moments (ZM) are computed from STT and fed into support vector machines (SVM) to be classified into one of the utterances. The experimental results demonstrate that the proposed technique produces a high accuracy of 98% in a phoneme classification task. The proposed technique is demonstrated to be invariant to global variations of illumination level. Such a system is useful for securely interpreting user commands for internet applications on mobile devices.
Zhang, Jin-Tao; Ma, Shan-Shan; Yip, Sarah W; Wang, Ling-Jiao; Chen, Chao; Yan, Chao-Gan; Liu, Lu; Liu, Ben; Deng, Lin-Yuan; Liu, Qin-Xue; Fang, Xiao-Yi
2015-11-18
Internet gaming disorder (IGD) has become an increasing mental health problem worldwide. Decreased resting-state functional connectivity (rsFC) between the ventral tegmental area (VTA) and the nucleus accumbens (NAcc) has been found in substance use and is thought to play an important role in the development of substance addiction. However, rsFC between the VTA and NAcc in a non-substance addiction, such as IGD, has not been assessed previously. The current study aimed to investigate: (1) if individuals with IGD exhibit alterations in VTA-NAcc functional connectivity; and (2) whether VTA-NAcc functional connectivity is associated with subjective Internet craving. Thirty-five male participants with IGD and 24 healthy control (HC) individuals participated in resting-state functional magnetic resonance imaging. Regions of interest (left NAcc, right NAcc and VTA) were selected based on the literature and were defined by placing spheres centered on Talairach Daemon coordinates. In comparison with HCs, individuals with IGD had significantly decreased rsFC between the VTA and right NAcc. Resting-state functional connectivity strength between the VTA and right NAcc was negatively correlated with self-reported subjective craving for the Internet. These results suggest possible neural functional similarities between individuals with IGD and individuals with substance addictions.
Hidden Connectivity in Networks with Vulnerable Classes of Nodes
NASA Astrophysics Data System (ADS)
Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko
2016-10-01
In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.
Introduction to Data Acquisition 3.Let’s Acquire Data!
NASA Astrophysics Data System (ADS)
Nakanishi, Hideya; Okumura, Haruhiko
In fusion experiments, diagnostic control and logging devices are usually connected through the field bus, e.g. GP-IB. Internet technologies are often applied for their remote operation. All equipment and digitizers are driven by pre-programmed sequences, in which clocks and triggers give the essential timing for data acquisition. Data production rate and amount must be checked in comparison with the transfer and store rates. To store binary raw data safely, journaling file systems are preferably used with redundant disks (RAID) or mirroring mechanism, such as “rsync”. A proper choice of the data compression method not only reduces the storage size but also improves the I/O throughputs. DBMS is even applicable to quick search or security around the table data.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W.J.
1993-11-03
The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systemsmore » and obtain files from them.« less
DIstributed VIRtual System (DIVIRS) Project
NASA Technical Reports Server (NTRS)
Schorr, Herbert; Neuman, B. Clifford; Gaines, Stockton R.; Mizell, David
1996-01-01
The development of Prospero moved from the University of Washington to ISI and several new versions of the software were released from ISI during the contract period. Changes in the first release from ISI included bug fixes and extensions to support the needs of specific users. Among these changes was a new option to directory queries that allows attributes to be returned for all files in a directory together with the directory listing. This change greatly improves the performance of their server and reduces the number of packets sent across their trans-pacific connection to the rest of the internet. Several new access method were added to the Prospero file method. The Prospero Data Access Protocol was designed, to support secure retrieval of data from systems running Prospero.
ERIC Educational Resources Information Center
Wulf, Volker; Schinzel, Britta
This paper reports on a pilot project in which German universities in Freiburg, Constance, Mannheim, Stuttgart, and Ulm connected computer science departments via the Internet for a summer 1997 telelecture and teletutorial on computers and society. The first section provides background on telelearning and introduces the case study. The second…
DUF6 Conversion Facility EIS Schedule
and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home » Conversion News | FAQs | Internet Resources | Glossary Help | Mailing Services | Contact Us | About Us | Security
Educators and the Internet: What's out There, How to Get Some of It.
ERIC Educational Resources Information Center
Rosenbaum, Howard
1994-01-01
Argues that K-12 media educators and librarians should become vocal advocates for Internet connection in their elementary and secondary schools. Topics include K-12 uses of the Internet; Internet resources; FrEdMail (Free Educational Electronic Mail); and a BITNET computer conference. Appendices list computer conferences, networking contracts, and…
ERIC Educational Resources Information Center
LaBonty, Dennis, Ed.
This book contains 15 papers devoted to the following topics of interest to business educators: the Internet's history and management; Internet applications related to the National Standards for Business Education; and the Internet's connection with the business education profession. The following papers are included: "Vignettes in the…
Teaching Social Studies with the Internet. ERIC Digest.
ERIC Educational Resources Information Center
Risinger, C. Frederick
Social studies educators live and teach in the middle of an information revolution as the Internet becomes an integral part of education. The rate of Internet use in the classroom has risen dramatically. From 1994 through 1998, the percentage of public schools with Internet connections jumped from 35 percent to 89 percent. This Digest summarizes…
ERIC Educational Resources Information Center
Paul, Narmada; Glassman, Michael
2017-01-01
The present study makes the case that the individual constituents of internet self-efficacy--search self-efficacy, communication self-efficacy, organisation self-efficacy, differentiation self-efficacy, and reactive/generative self-efficacy--may be of differential importance in predicting internet anxiety within web-assisted learning environments.…
Privacy, security and access with sensitive health information.
Croll, Peter
2010-01-01
This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.
Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio
2015-08-28
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.
Three Essays on Information Security Policies
ERIC Educational Resources Information Center
Yang, Yubao
2011-01-01
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
Security: Progress and Challenges
ERIC Educational Resources Information Center
Luker, Mark A.
2004-01-01
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona
2003-01-01
The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-06-08
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-01-01
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso, Ronald D
2003-01-01
Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... Statement Adopted Under Rule 205 Entitled ``Back-up Communication Channel to Internet Access'' August 29... ``Back-up Communication Channel to Internet Access'' requiring clearing members that use the Internet as their primary means to access OCC's information and data systems to maintain a secure back-up means of...
automatically is: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  , to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system
Code of Federal Regulations, 2011 CFR
2011-04-01
... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...
Code of Federal Regulations, 2013 CFR
2013-04-01
... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...
Della Mea, V.; Beltrami, C. A.
2000-01-01
The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e‐mail; (b) teleconsultation via web‐based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real‐time consultations through Internet‐based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real‐time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way. PMID:11339559
The Internet for Educators: A User's Guide.
ERIC Educational Resources Information Center
Monahan, Brian D.; Dharm, Matthew
1995-01-01
Presents a practical guide to use of the Internet. Topics discussed include getting connected; the UNIX operating system; electronic mail; FTP (File Transfer Protocol); Finger; Telnet; Archie; Veronica; Gopher; teacher education; the Yanoff List; and expansion of the Internet. (three references) (LRW)
Issues in implementing services for a wireless web-enabled digital camera
NASA Astrophysics Data System (ADS)
Venkataraman, Shyam; Sampat, Nitin; Fisher, Yoram; Canosa, John; Noel, Nicholas
2001-05-01
The competition in the exploding digital photography market has caused vendors to explore new ways to increase their return on investment. A common view among industry analysts is that increasingly it will be services provided by these cameras, and not the cameras themselves, that will provide the revenue stream. These services will be coupled to e- Appliance based Communities. In addition, the rapidly increasing need to upload images to the Internet for photo- finishing services as well as the need to download software upgrades to the camera is driving many camera OEMs to evaluate the benefits of using the wireless web to extend their enterprise systems. Currently, creating a viable e- appliance such as a digital camera coupled with a wireless web service requires more than just a competency in product development. This paper will evaluate the system implications in the deployment of recurring revenue services and enterprise connectivity of a wireless, web-enabled digital camera. These include, among other things, an architectural design approach for services such as device management, synchronization, billing, connectivity, security, etc. Such an evaluation will assist, we hope, anyone designing or connecting a digital camera to the enterprise systems.
Implementation of an ASP model offsite backup archive for clinical images utilizing Internet 2
NASA Astrophysics Data System (ADS)
Liu, Brent J.; Chao, Sander S.; Documet, Jorge; Lee, Jasper; Lee, Michael; Topic, Ian; Williams, Lanita
2005-04-01
With the development of PACS technology and an increasing demand by medical facilities to become filmless, there is a need for a fast and efficient method of providing data backup for disaster recovery and downtime scenarios. At the Image Processing Informatics Lab (IPI), an ASP Backup Archive was developed using a fault-tolerant server with a T1 connection to serve the PACS at the St. John's Health Center (SJHC) Santa Monica, California. The ASP archive server has been in clinical operation for more than 18 months, and its performance was presented at this SPIE Conference last year. This paper extends the ASP Backup Archive to serve the PACS at the USC Healthcare Consultation Center II (HCC2) utilizing an Internet2 connection. HCC2 is a new outpatient facility that recently opened in April 2004. The Internet2 connectivity between USC's HCC2 and IPI has been established for over one year. There are two novelties of the current ASP model: 1) Use of Internet2 for daily clinical operation, and 2) Modifying the existing backup archive to handle two sites in the ASP model. This paper presents the evaluation of the ASP Backup Archive based on the following two criteria: 1) Reliability and performance of the Internet2 connection between HCC2 and IPI using DICOM image transfer in a clinical environment, and 2) Ability of the ASP Fault-Tolerant backup archive to support two separate clinical PACS sites simultaneously. The performances of using T1 and Internet2 at the two different sites are also compared.
Connected Kids? K-2 Children's Use and Understanding of the Internet
ERIC Educational Resources Information Center
Dodge, Autumn M.; Husain, Nahid; Duke, Nell K.
2011-01-01
In this article, we report on our own inquiry, and others', into young children's use of, understanding of, and skills related to the Internet. We found that the overwhelming majority of children at this age are already using the Internet, mostly for playing games, and already showing substantial gaps in Internet skill level. Most children we…
The Social Side of Information Networking.
ERIC Educational Resources Information Center
Katz, James E.
1997-01-01
Explores the social issues, including manners, security, crime (fraud), and social control associated with information networking, with emphasis on the Internet. Also addresses the influence of cellular phones, the Internet and other information technologies on society. (GR)
31 CFR 132.1 - Authority, purpose, collection of information, and incorporation by reference.
Code of Federal Regulations, 2011 CFR
2011-07-01
... UNLAWFUL INTERNET GAMBLING § 132.1 Authority, purpose, collection of information, and incorporation by... Unlawful Internet Gambling Enforcement Act of 2006 (Act) (enacted as Title VIII of the Security and...
Network-based reading system for lung cancer screening CT
NASA Astrophysics Data System (ADS)
Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio
2006-03-01
This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
46 CFR 295.23 - Reporting requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OPERATORS MARITIME SECURITY PROGRAM (MSP) Maritime Security Program Operating Agreements § 295.23 Reporting... (such as facsimile and Internet) for transmission of required information to MARAD, if practicable.]: (a...
2008-07-01
also a large Internet service provider and an operator of two of the 13 root zone servers that provide the basic information for locating Internet ...routing and address information to assure continued connectivity and speed? In addition, exchange point technology needs to be improved and there are...alternative technology will come along that will make the Internet outmoded in the same way the Internet has begun to make the Public Switched Telephone
Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types
ERIC Educational Resources Information Center
Grossklags, Jens
2009-01-01
Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…
Exploring Factors that Influence Students' Behaviors in Information Security
ERIC Educational Resources Information Center
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary
2012-01-01
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
77 FR 5734 - New Medical Criteria for Evaluating Language and Speech Disorders
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... Medical Criteria for Evaluating Language and Speech Disorders AGENCY: Social Security Administration... Security numbers or medical information. 1. Internet: We strongly recommend that you submit your comments... INFORMATION CONTACT: Cheryl A. Williams, Office of Medical Listings Improvement, Social Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Dijji Corp., Hydro Environmental Resources, Inc. (n/k/a EXIM Internet Group, Inc.), Hydrogen Power, Inc., and InsynQ, Inc.; Order of Suspension of... Environmental Resources, Inc. (n/k/a EXIM Internet Group, Inc.) because it has not filed any periodic reports...
The future of 3D and video coding in mobile and the internet
NASA Astrophysics Data System (ADS)
Bivolarski, Lazar
2013-09-01
The current Internet success has already changed our social and economic world and is still continuing to revolutionize the information exchange. The exponential increase of amount and types of data that is currently exchanged on the Internet represents significant challenge for the design of future architectures and solutions. This paper reviews the current status and trends in the design of solutions and research activities in the future Internet from point of view of managing the growth of bandwidth requirements and complexity of the multimedia that is being created and shared. Outlines the challenges that are present before the video coding and approaches to the design of standardized media formats and protocols while considering the expected convergence of multimedia formats and exchange interfaces. The rapid growth of connected mobile devices adds to the current and the future challenges in combination with the expected, in near future, arrival of multitude of connected devices. The new Internet technologies connecting the Internet of Things with wireless visual sensor networks and 3D virtual worlds requires conceptually new approaches of media content handling from acquisition to presentation in the 3D Media Internet. Accounting for the entire transmission system properties and enabling adaptation in real-time to context and content throughout the media proceeding path will be paramount in enabling the new media architectures as well as the new applications and services. The common video coding formats will need to be conceptually redesigned to allow for the implementation of the necessary 3D Media Internet features.
Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.
2015-09-23
Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less
Practical Computer Security through Cryptography
NASA Technical Reports Server (NTRS)
McNab, David; Twetev, David (Technical Monitor)
1998-01-01
The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.
Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices
Marin, Leandro; Piotr Pawlowski, Marcin; Jara, Antonio
2015-01-01
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol. PMID:26343677
ERIC Educational Resources Information Center
Dealy, Jacqueline
1994-01-01
Offers instructions and resources for Internet novices wanting to access Internet services. Instructions are offered for connecting to 13 education listservs, 9 electronic journals and newsletters, 3 education databases, 7 Telnet gopher sites, Veronica and Archie search tools, and File Transfer Protocol (FTP). (Contains 16 references.) (SLW)
12 CFR 233.1 - Authority, purpose, collection of information, and incorporation by reference.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PROHIBITION ON FUNDING OF UNLAWFUL INTERNET... Unlawful Internet Gambling Enforcement Act of 2006 (Act) (enacted as Title VIII of the Security and...
12 CFR 233.1 - Authority, purpose, collection of information, and incorporation by reference.
Code of Federal Regulations, 2011 CFR
2011-01-01
... (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PROHIBITION ON FUNDING OF UNLAWFUL INTERNET... Unlawful Internet Gambling Enforcement Act of 2006 (Act) (enacted as Title VIII of the Security and...
Electronic Commerce--Would, Could and Should You Use Current Internet Payment Mechanisms?
ERIC Educational Resources Information Center
Buck, S. Peter
1996-01-01
Discussion of use of the Internet for online payments focuses on payment mechanisms for conducting transactions. Highlights include commercial requirements; security requirements; various proposed and currently used mechanisms; and future possibilities. (LRW)
A Self-Provisioning Mechanism in OpenStack for IoT Devices.
Solano, Antonio; Dormido, Raquel; Duro, Natividad; Sánchez, Juan Miguel
2016-08-17
The aim of this paper is to introduce a plug-and-play mechanism for an Internet of Things (IoT) device to instantiate a Software as a Service (SaaS) application in a private cloud, built up with OpenStack. The SaaS application is the digital avatar of a physical object connected to Internet. As a proof of concept, a Vending Machine is retrofitted and connected to Internet with and Arduino Open Hardware device. Once the self-configuration mechanism is completed, it is possible to order a product from a mobile communication device.
A Self-Provisioning Mechanism in OpenStack for IoT Devices
Solano, Antonio; Dormido, Raquel; Duro, Natividad; Sánchez, Juan Miguel
2016-01-01
The aim of this paper is to introduce a plug-and-play mechanism for an Internet of Things (IoT) device to instantiate a Software as a Service (SaaS) application in a private cloud, built up with OpenStack. The SaaS application is the digital avatar of a physical object connected to Internet. As a proof of concept, a Vending Machine is retrofitted and connected to Internet with and Arduino Open Hardware device. Once the self-configuration mechanism is completed, it is possible to order a product from a mobile communication device. PMID:27548166
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security
NASA Astrophysics Data System (ADS)
Danidou, Yianna; Schafer, Burkhard
This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). It is argued that TC constitutes such a dramatic shift in power away from users to the software providers, that it is necessary for the legal system to respond. A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security.
NASA Astrophysics Data System (ADS)
Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.
2005-04-01
Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.
Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)
2006-12-01
Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a
The Impact of High-Speed Internet Connectivity at Home on Eighth-Grade Student Achievement
ERIC Educational Resources Information Center
Kingston, Kent J.
2013-01-01
In the fall of 2008 Westside Community Schools - District 66, in Omaha, Nebraska implemented a one-to-one notebook computer take home model for all eighth-grade students. The purpose of this study was to determine the effect of a required yearlong one-to-one notebook computer program supported by high-speed Internet connectivity at school on (a)…
Preschool Teachers' Attitudes toward Internet Applications for Professional Development in Taiwan
ERIC Educational Resources Information Center
Chen, Ru-Si
2016-01-01
This study focuses on preschool teachers' attitudes toward integrated Internet applications for professional development by a survey in Taiwan. The researcher developed a survey questionnaire consisting of five factors: usefulness, effectiveness, behavioral intention, Internet connection, and professional competence. This study analyzed the survey…
Internet Fraud: Information for Teachers and Students
ERIC Educational Resources Information Center
Nkotagu, Gabriel Hudson
2011-01-01
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
ERIC Educational Resources Information Center
Cavus, Nadire; Ercag, Erinc
2016-01-01
There has been an increase in the vulnerability in Internet security, and the unconscious usage of the Internet is a very important issue throughout the world as it is in Cyprus today. The best way to solve such an issue would be to make people aware of this situation. Based on this idea, teachers should firstly be trained to use the Internet in a…
Internet research in an international context.
Baernholdt, Marianne; Clarke, Sean P
2006-02-01
Computers and the Internet provide researchers with new options in surveying. When using electronic surveys, several practical and methodological issues need to be considered such as whether the majority of the surveyed population has Internet access and whether an e-mail or a Web-based survey is most appropriate. Other important considerations relate to Internet security issues and, in international research, the possibility of language barriers. Despite these challenges, electronic surveys offer a promising alternative to conventional mail surveys.
Olagunju, Amos O.
2009-01-01
Inadvertent access to website addresses and spam e-mails continue to make pornography rampant on the Internet in schools, homes, and libraries. Collectively, parents, teachers, and members of the community must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet access filtering. Parental involvement is crucial for raising children with healthy Internet habits to access social and educational materials. Although generations have coped with different times and trials, technology is ushering in new trials. Parents and communities cannot ignore the present and future technology ingrained into the lives of children. This paper contends that parents armed with legislation and technological security devices for access to the Internet ought to strengthen the character of online Internet safety. The discussion is focused on the roles that parents, communities, technology, and laws should play in order to protect children from obscene and pornographic threats from cyberspace. It is argued that the roles of education and technology should outweigh the legislative interventions of governments. A critique of significant litigations and laws on obscenity and pornography is presented. The paper offers a variety of security tools and techniques for protecting children from Internet access to obscene and pornographic materials. The impacts of pornographic materials on the welfare of children, adolescents, women, and families are discussed. PMID:19936562
Olagunju, Amos O
2009-11-18
Inadvertent access to website addresses and spam e-mails continue to make pornography rampant on the Internet in schools, homes, and libraries. Collectively, parents, teachers, and members of the community must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet access filtering. Parental involvement is crucial for raising children with healthy Internet habits to access social and educational materials. Although generations have coped with different times and trials, technology is ushering in new trials. Parents and communities cannot ignore the present and future technology ingrained into the lives of children. This paper contends that parents armed with legislation and technological security devices for access to the Internet ought to strengthen the character of online Internet safety. The discussion is focused on the roles that parents, communities, technology, and laws should play in order to protect children from obscene and pornographic threats from cyberspace. It is argued that the roles of education and technology should outweigh the legislative interventions of governments. A critique of significant litigations and laws on obscenity and pornography is presented. The paper offers a variety of security tools and techniques for protecting children from Internet access to obscene and pornographic materials. The impacts of pornographic materials on the welfare of children, adolescents, women, and families are discussed.
Security on the Internet: is your system vulnerable?
Neray, P
1997-07-01
Internet technology does not discriminate. Whether or not your system is an intentional target really doesn't matter; you have a duty to ensure its safekeeping. Ten simple steps are given to protect your system from viruses, hackers, etc.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-02
... communications. In addition, we will record and stream each public forum live on the Internet. Accordingly, each... the recording will be streamed live on the internet during the event and available thereafter for...-772-1213 or TTY 1-800-325- 0778, or visit our Internet site, Social Security Online at http://www...
Privacy & Security Notice | Argonne National Laboratory
server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The
ERIC Educational Resources Information Center
Hancock, Val
2010-01-01
The Open University, an open distance learning institution, is increasingly using a Virtual Learning Environment (VLE) that requires internet access. This paper investigates how the move to a VLE has affected one group of students who do not have internet access--offender learners studying in prison. Members of the armed forces and secure hospital…
The Internet: friend or foe when providing patient education?
Anderson, Amy Shelton; Klemm, Paula
2008-02-01
The Internet has changed how patients with cancer learn about and cope with their disease. Newly diagnosed patients with cancer often have complex educational and informational needs related to diagnosis and treatment. Nurses frequently encounter time and work-related constraints that can interfere with the provision of patient education. They are challenged to educate patients in an environment of rapidly expanding and innovative computer technology. Barriers that hinder nurses in integrating educational Internet resources into patient care include lack of training, time constraints, and inadequate administrative support. Advantages of Internet use for patient education and support include wide-ranging and current information, a variety of teaching formats, patient empowerment, new communication options, and support 24 hours a day, seven days a week. Pitfalls associated with Internet use for patients with cancer include inaccurate information, lack of access, poor quality of online resources, and security and privacy issues. Nurses routinely use computer technology in the workplace and follow rigorous security and privacy standards to protect patient information. Those skills can provide the foundation for the use of online sources for patient teaching. Nurses play an important role in helping patients evaluate the veracity of online information and introducing them to reliable Internet resources.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Communications in connection with certain registered offerings of asset-backed securities. 230.167 Section 230.167 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933...
ERIC Educational Resources Information Center
Lindroth, Linda K.
1996-01-01
Lists Internet sites related to articles in this issue. Topics include a first-grade unit on voting, student-created theme binders, techniques for student motivation, and involving parents in the middle school. (KDFB)
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
32 CFR Appendix A to Part 806 - References
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Information Security Program Management AFI 31-501, Personnel Security Program Management AFI 31-601, Industrial Security Program Management AFI 33-129, Transmission of Information Via the Internet AFI 35-205... Management (will convert to AFPD 33-3) AFI 37-124, The Information Collections and Reports Management Program...
Implementation of the Web-based laboratory
NASA Astrophysics Data System (ADS)
Ying, Liu; Li, Xunbo
2005-12-01
With the rapid developments of Internet technologies, remote access and control via Internet is becoming a reality. A realization of the web-based laboratory (the W-LAB) was presented. The main target of the W-LAB was to allow users to easily access and conduct experiments via the Internet. While realizing the remote communication, a system, which adopted the double client-server architecture, was introduced. It ensures the system better security and higher functionality. The experimental environment implemented in the W-Lab was integrated by both virtual lab and remote lab. The embedded technology in the W-LAB system as an economical and efficient way to build the distributed infrastructural network was introduced. Furthermore, by introducing the user authentication mechanism in the system, it effectively secures the remote communication.
RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code
NASA Astrophysics Data System (ADS)
Gonggrijp, Rop; Hengeveld, Willem-Jan; Hotting, Eelco; Schmidt, Sebastian; Weidemann, Frederik
The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the internet. A rather cursory scan of the source code to RIES showed a significant lack of security-awareness among the programmers which - among other things - appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, possibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down-to-earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.
Adoption of information technology by resident physicians.
Parekh, Selene G; Nazarian, David G; Lim, Charles K
2004-04-01
The Internet represents a technological revolution that is transforming our society. In the healthcare industry, physicians have been typified as slow adopters of information technology. However, young physicians, having been raised in a computer-prevalent society, may be more likely to embrace technology. We attempt to characterize the use and acceptance of the Internet and information technology among resident physicians in a large academic medical center and to assess concerns regarding privacy, security, and credibility of information on the Internet. A 41-question survey was distributed to 150 pediatric, medical, and surgical residents at an urban, academic medical center. One hundred thirty-five residents completed the survey (response rate of 90%). Responses were evaluated and statistical analysis was done. The majority of resident physicians in our survey have adopted the tools of information technology. Ninety-eight percent used the Internet and 96% use e-mail. Two-thirds of the respondents used the Internet for healthcare-related purposes and a similar percentage thought that the Internet has affected their practice of medicine positively. The majority of residents thought that Internet healthcare services such as electronic medical records, peer-support websites, and remote patient monitoring would be beneficial for the healthcare industry. However, they are concerned about the credibility, privacy, and security of health and medical information online. The majority of resident physicians in our institution use Internet and information technology in their practice of medicine. Most think that the Internet will continue to have a beneficial role in the healthcare industry.
18 CFR 284.12 - Standards for pipeline business operations and communications.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Standards for pipeline business operations and communications. 284.12 Section 284.12 Conservation of Power and Water Resources..., private network connections using internet tools, internet directory services, and internet communication...
ERIC Educational Resources Information Center
Frazier, Deneen; And Others
This book seeks to direct children to Internet resources that are educational and fun, that spark ideas for projects, or that connect them to people of similar interests. The foreword is by United States Senator Bob Kerrey. The chapters are: (1) "The World of the Internet," which presents brief explanations of a wide range of services…
The Telecom Act, the Internet, and Higher Education.
ERIC Educational Resources Information Center
Hundt, Reed
1999-01-01
Explains political factors in the development of the 1966 Telecommunications Act and how it helped elementary and secondary education in acquiring computers to connect to the Internet; describes the communications revolution; considers the role of government; and discusses how the Internet is changing the entire system of higher education. (LRW)
ERIC Educational Resources Information Center
Tennant, Roy
The Internet is a worldwide network of computer networks. In the United States, the National Science Foundation Network (NSFNet) serves as the Internet "backbone" (a very high speed network that connects key regions across the country). The NSFNet will likely evolve into the National Research and Education Network (NREN) as defined in…
Creating Pupils' Internet Magazine
ERIC Educational Resources Information Center
Bognar, Branko; Šimic, Vesna
2014-01-01
This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…
Incognito Online: Why and How People Hide Their Information
ERIC Educational Resources Information Center
Kang, Ruogu
2015-01-01
The online communication landscape has changed significantly from the early days of the Internet. In most developed countries, people are constantly connected through the Internet to almost everyone else in their lives, everywhere they go. The Internet makes their lives more convenient, but unintentional exposure of personal information to…
ERIC Educational Resources Information Center
Oblinger, Diana
The Internet is an international network linking hundreds of smaller computer networks in North America, Europe, and Asia. Using the Internet, computer users can connect to a variety of computers with little effort or expense. The potential for use by college faculty is enormous. The largest problem faced by most users is understanding what such…
78 FR 38227 - Connect America Fund
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-26
... different per- location support amounts based on the existing level of Internet access ($550 for homes with low-speed Internet access and $775, as in the first round, for homes with only dial-up access), and... Internet access. We adopt a process for challenges to the eligibility of specific areas where price cap...
Werbach, Kevin
2005-09-01
Internet telephony, or VoIP, is rapidly replacing the conventional kind. This year, for the first time, U.S. companies bought more new Internet-phone connections than standard lines. The major driver behind this change is cost. But VoIP isn't just a new technology for making old-fashioned calls cheaper, says consultant Kevin Werbach. It is fundamentally changing how companies use voice communications. What makes VoIP so powerful is that it turns voice into digital data packets that can be stored, copied, combined with other data, and distributed to virtually any device that connects to the Internet. And it makes it simple to provide all the functionality of a corporate phone-call features, directories, security-to anyone anywhere there's broadband access. That fosters new kinds of businesses such as virtual call centers, where widely dispersed agents work at all hours from their homes. The most successful early adopters, says Werbach, will focus more on achieving business objectives than on saving money. They will also consider how to push VoIP capabilities out to the extended organization, making use of everyone as a resource. Deployment may be incremental, but companies should be thinking about where VoIP could take them. Executives should ask what they could do if, on demand, they could bring all their employees, customers, suppliers, and partners together in a virtual room, with shared access to every modern communications and computing channel. They should take a fresh look at their business processes to find points at which richer and more customizable communications could eliminate bottlenecks and enhance quality. The important dividing line won't be between those who deploy Vol P and those who don't, or even between early adopters and laggards. It will be between those who see Vol P as just a new way to do the same old things and those who use itto rethink their entire businesses.
47 CFR 54.503 - Other supported special services.
Code of Federal Regulations, 2010 CFR
2010-10-01
... telecommunications carriers include voice mail, interconnected voice over Internet protocol (VoIP), text messaging, Internet access, and installation and maintenance of internal connections in addition to all reasonable...
The prevalence of computer and Internet addiction among pupils.
Zboralski, Krzysztof; Orzechowska, Agata; Talarowska, Monika; Darmosz, Anna; Janiak, Aneta; Janiak, Marcin; Florkowski, Antoni; Gałecki, Piotr
2009-02-02
Media have an influence on the human psyche similar to the addictive actions of psychoactive substances or gambling. Computer overuse is claimed to be a cause of psychiatric disturbances such as computer and Internet addiction. It has not yet been recognized as a disease, but it evokes increasing controversy and results in mental disorders commonly defined as computer and Internet addiction. This study was based on a diagnostic survey in which 120 subjects participated. The participants were pupils of three kinds of schools: primary, middle, and secondary school (high school). Information for this study was obtained from a questionnaire prepared by the authors as well as the State-Trait Anxiety Inventory (STAI) and the Psychological Inventory of Aggression Syndrome (IPSA-II). he results confirmed that every fourth pupil was addicted to the Internet. Internet addiction was very common among the youngest users of computers and the Internet, especially those who had no brothers and sisters or came from families with some kind of problems. Moreover, more frequent use of the computer and the Internet was connected with higher levels of aggression and anxiety. Because computer and Internet addiction already constitute a real danger, it is worth considering preventive activities to treat this phenomenon. It is also necessary to make the youth and their parents aware of the dangers of uncontrolled Internet use and pay attention to behavior connected with Internet addiction.
ERIC Educational Resources Information Center
Proctor, L. F.; Allen, A. J.
This report examines the context and impact on the classroom of teacher and student access to the Internet in K-12 education in Saskatchewan (Canada) public schools. It begins with a description of the Internet, including funding and connectivity concerns. The following four basic services of the Internet are introduced with examples of K-12…
Issues in protection of human subjects in internet research.
Im, Eun-Ok; Chee, Wonshik
2002-01-01
Despite the increasing use of the Internet among nurses, the use of the Internet in nursing research has been rarely discussed and critiqued in terms of issues in protection of human subjects. In this article, issues in protection of human subjects in Internet research are explored by analyzing an Internet study to propose directions for human protection in Internet research. Issues raised through the study include those related to (a) anonymity and confidentiality, (b) security, (c) self-determination and authenticity, (d) full disclosure, and (e) fair treatment. Based on discussion of the five issues, development of standardized guidelines, investigator triangulation, and information sharing are proposed as directions for protection of human subjects in Internet research.
An innovative privacy preserving technique for incremental datasets on cloud computing.
Aldeen, Yousra Abdul Alsahib S; Salleh, Mazleena; Aljeroudi, Yazan
2016-08-01
Cloud computing (CC) is a magnificent service-based delivery with gigantic computer processing power and data storage across connected communications channels. It imparted overwhelming technological impetus in the internet (web) mediated IT industry, where users can easily share private data for further analysis and mining. Furthermore, user affable CC services enable to deploy sundry applications economically. Meanwhile, simple data sharing impelled various phishing attacks and malware assisted security threats. Some privacy sensitive applications like health services on cloud that are built with several economic and operational benefits necessitate enhanced security. Thus, absolute cyberspace security and mitigation against phishing blitz became mandatory to protect overall data privacy. Typically, diverse applications datasets are anonymized with better privacy to owners without providing all secrecy requirements to the newly added records. Some proposed techniques emphasized this issue by re-anonymizing the datasets from the scratch. The utmost privacy protection over incremental datasets on CC is far from being achieved. Certainly, the distribution of huge datasets volume across multiple storage nodes limits the privacy preservation. In this view, we propose a new anonymization technique to attain better privacy protection with high data utility over distributed and incremental datasets on CC. The proficiency of data privacy preservation and improved confidentiality requirements is demonstrated through performance evaluation. Copyright © 2016 Elsevier Inc. All rights reserved.
In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions
NASA Astrophysics Data System (ADS)
Chen, Jie; Huang, Yan
In the process of realization Internet-based visualization system of the protein molecules, system needs to allow users to use the system to observe the molecular structure of the local computer, that is, customers can generate the three-dimensional graphics from PDB file on the client computer. This requires Applet access to local file, related to the Applet security restrictions question. In this paper include two realization methods: 1.Use such as signature tools, key management tools and Policy Editor tools provided by the JDK to digital signature and authentication for Java Applet, breakthrough certain security restrictions in the browser. 2. Through the use of Servlet agent implement indirect access data methods, breakthrough the traditional Java Virtual Machine sandbox model restriction of Applet ability. The two ways can break through the Applet's security restrictions, but each has its own strengths.
Including Internet insurance as part of a hospital computer network security plan.
Riccardi, Ken
2002-01-01
Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities.