Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
E-Commerce Systems Security for Small Businesses  [PDF]
Syed (Shawon) M. Rahman,Robert Lackey
International Journal of Network Security & Its Applications , 2013,
Abstract: Small business e-commerce websites make an excellent target for maliciousattacks. Smallbusinesses donot have the resources needed to effectively deal with attacks.Large and somemid-size organization have teams that are dedicated to dealing with security incidents andpreventing future attacks. Most small businessesdonot have the capabilities of dealing withincidents the way large organizations do. Security of e-commerce websites is essential forcompliance with laws and regulations as well as gaining and maintaining the trust of consumers,partners and stakeholders.Many security standards have been established by variousorganizations to help guide security of small business servers, however, many of those standardsor guidelines are too costly or time consuming.This paper1will discuss how attacks are carried-outand how a small business can effectively secure their networkswithminimumcost
Quality Innovation Prosperity , 2009,
Abstract: Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS) the organization can identify and reduce risks in this area. This the area of information security management covers a numbers of ISO / IEC 27000 standards, which are based on best practice solutions. However, smaller organizations are often discourages with the implementation of these systems, because of fear of high cost and complexity. Especially due to the fact that the standards does not strictly require implementation of all security controls it is possible to implement these systems in small-size organizations. In this article, we want to point on this fact through describing practical experience with ISMS implementation in small-size organization.
Enhanced Security Strategies for MPLS Signaling  [cached]
Francesco Palmieri,Ugo Fiore
Journal of Networks , 2007, DOI: 10.4304/jnw.2.5.1-13
Abstract: In an increasingly hostile environment, the need for security in network infrastructure is stronger than ever, especially for Multi-Protocol Label Switching (MPLS), widely used to provide most of the new-generation network infrastructure-level services in the Internet. Unfortunately, the MPLS control plane lacks scalable verification for the authenticity and legitimacy of signaling messages and communication between peer routers is subject to active and passive forgery, hijacking and wiretapping activities. In this paper, we propose a robust framework for MPLS-based network survivability against security threats. The security of MPLS control plane protocols can be greatly enhanced by requiring digital signature of all the signaling messages, in accordance with a common security paradigm valid for all the protocols. Our design goals include integrity safeguarding, protection against replay attacks, and gradual deployment, with routers not supporting authentication breaking the trust chain but operating undisturbed under any other respect.
Modified Small Business Network Security  [PDF]
Md. Belayet Ali,Oveget Das,Md. Shamim Hossain
International Journal of Computer Science and Network , 2012,
Abstract: This paper covers some likely threats and effectivesteps for a secure small business. It also involves a flowchart tocomprehend the overall small business network security easilyand we identify a set of security issues and applyappropriate techniques to satisfy the correspondingsecurity requirements. In respect of all, this document isstrong enough for any small business network security.
Effects of Family Size on Household Food Security in Osun State, Nigeria  [cached]
Adebayo Oyefunke Olayemi
Asian Journal of Agriculture and Rural Development , 2012,
Abstract: The study investigated effects of family size on household food security in Osun state, Nigeria. Multistage sampling technique was employed to select 110 respondents for the study. A well structured questionnaire was used in collecting information from the respondents. The data were subjected to descriptive and Tobit regression analysis. The results of the study indicated that about 60.9% had family size of 5and 8 members. Only 24.5% were food secure. Coping strategies employed include borrowing money, relying on less preferred and expensive food. The constraints faced includes, poor access to credit (84.5%), and lack of input (81.8%). The study concludes that family size has negative impact on house food security. The study recommended that government and non government agency should intensified effort on importance of family planning and advocate small family size in rural area.
Enhanced ATM Security System using Biometrics  [PDF]
Selina Oko,Jane Oruh
International Journal of Computer Science Issues , 2012,
Abstract: Because biometrics-based authentication offers several advantages over other authentication methods, there hasbeen a significant surge in the use of biometrics for user authentication in recent years. In this paper the existing security of the ATM (Automated Teller Machine) system has been improved by integrating the fingerprint of the user into the banks database as to further authenticate it. This was achieved by modelling and building an ATM simulator that will mimic a typical ATM system. The end result is an enhanced biometric authenticated ATM system that ensures greater security and increased customers confidence in the banking sector.
Small size sampling?  [cached]
Rakesh R. Pathak
International Journal of Basic & Clinical Pharmacology , 2012, DOI: 10.5455/2319-2003.ijbcp002612
Abstract: Though small size samples can be planned and justified based on scarcity of time, money and manpower, there are situations making more accuracy a must and needing larger samples sizes. That's why rare adverse drug reactions are identified only after a drug comes into the market and a large population is exposed to it. There are many more reasons for increasing the sample size and requirement of the study decides which criteria of accuracy should be tightened the most (e.g. avoiding type I error is more important or type II error). [Int J Basic Clin Pharmacol 2012; 1(2.000): 118-119]
Enhanced public key security for the McEliece cryptosystem  [PDF]
Marco Baldi,Marco Bianchi,Franco Chiaraluce,Joachim Rosenthal,Davide Schipani
Mathematics , 2011,
Abstract: This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code. This increases the security level of the public key, thus opening the way for reconsidering the adoption of classical families of codes, like Reed-Solomon codes, that have been longly excluded from the McEliece cryptosystem for security reasons. It is well known that codes of these classes are able to yield a reduction in the key size or, equivalently, an increased level of security against information set decoding; so, these are the main advantages of the proposed solution. We also describe possible vulnerabilities and attacks related to the considered system, and show what design choices are best suited to avoid them.
Fast Scramblers Of Small Size  [PDF]
J. L. F. Barbon,J. M. Magan
Physics , 2011, DOI: 10.1007/JHEP10(2011)035
Abstract: We investigate various geometrical aspects of the notion of `optical depth' in the thermal atmosphere of black hole horizons. Optical depth has been proposed as a measure of fast-crambling times in such black hole systems, and the associated optical metric suggests that classical chaos plays a leading role in the actual scrambling mechanism. We study the behavior of the optical depth with the size of the system and find that AdS/CFT phase transitions with topology change occur naturally as the scrambler becomes smaller than its thermal length. In the context of detailed AdS/CFT models based on D-branes, T-duality implies that small scramblers are described in terms of matrix quantum mechanics.
Security Enhanced Adaptive TCP for Wireless Ad Hoc Networks  [PDF]
Waleed S. Alnumay
Journal of Information Security (JIS) , 2014, DOI: 10.4236/jis.2014.54019
Abstract: TCP is a reliable transport protocol designed to perform well in wired networks where packet losses are due congestion. However in wireless ad hoc networks, where packet losses are due to channel errors or link failures between mobile nodes, TCP degrades its performance. Further, it lacks certain protection mechanisms from internal and external malicious nodes. In this paper, a security enhanced and adaptive TCP, namely SA-TCP, has been proposed for wireless ad hoc networks. SA-TCP uses network layer information to detect various types of packet losses and adjusts the value of congestion window dynamically according to the conditions of the dynamic network. It works normally to collect the samples of congestion window and calculates the mean from these samples to set the value of future congestion window. SA-TCP also adjusts the value of congestion window limit according to network conditions. In order to make SA-TCP suitable in highly vulnerable wireless ad hoc networks, a less complex identity-based public key cryptography has been integrated with the proposed protocol. The three-way handshaking process of SA-TCP is made secure by generating a secret session key on-fly between source-destination. Simulation results show that SA-TCP gives higher throughput compared to the popular New Reno and ATCP in different wireless ad hoc network scenarios.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.