Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 7 )

2019 ( 50 )

2018 ( 140 )

2017 ( 126 )

Custom range...

Search Results: 1 - 10 of 6297 matches for " Security "
All listed articles are free for downloading (OA Articles)
Page 1 /6297
Display every page Item
Inclusion or Exclusion? Local Ownership and Security Sector Reform
Timothy Donais
Studies in Social Justice , 2009,
Abstract: This paper explores the dynamics of security sector reform (SSR), a term used to refer to efforts made to reform the security structures of states emerging from conflict or authoritarianism. While "local ownership" is increasingly viewed as a necessary element of any sustainable SSR strategy, there remains a significant gap between international policy and practice in this area. In practice, the SSR agenda continues to be driven largely by international actors, with minimal input, let alone ownership, on the part of either governments or civil society within reforming states. Indeed, the notion of local ownership has come to serve as much as a disciplining mechanism as a tool to overcome exclusion in the making and execution of security policy, and the effectiveness and sustainability of SSR programming have suffered as a result. In light of this, the paper will explore both the potential for, and the limits of, rehabilitating the notion of local ownership to enable more participatory forms of SSR, and argues that any practical local ownership strategy requires a dual policy of negotiating with state actors and engaging with non-state actors.
Cloud Security Based On Oracle Storage Using Transparent Table Encryption Technique
Ankita Prakash Baheti,Surendra Vasantrao Patil
International Journal of Computer & Electronics Research , 2013,
Abstract: Cloud computing has been visualized as the effective solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. In cloud storage user’s data is migrated to large data centers, which are remotely located, to which user does not have any access. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. One of the important concerns that need to be addressed is to assure the customer of the reliability i.e. defense of his data in the cloud. As the data is physically not accessible to the user the cloud should provide a way for the user to check if the reliability of his data is maintained or is compromised. In this paper we provide a scheme which gives a proof of data reliability in the cloud which the customer can employ to check the accuracy of his data in the cloud. This proof can be approved upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA). This scheme encompasses the main issues related to security and confidentiality of user’s data with respect to its location, relocation and availability. This paper outlines brief knowledge about cloud, its services, data storage mechanism, security threats to it and the proposed method to secure the data that is oracle transparent encryption technique. This scheme includes some memory management concepts like partitioning the memory in the regions, segmentation concepts etc.
Proactive Security Mechanism and Design for Firewall  [PDF]
Saleem-Ullah Lar, Xiaofeng Liao, Aqeel ur Rehman, MA Qinglu
Journal of Information Security (JIS) , 2011, DOI: 10.4236/jis.2011.23012
Abstract: In this paper we have present the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security algorithm, we have figured out security level of each packet and adjust according to packets dynamic states. Internet firewall can respond to these dynamics and take respective actions accordingly. Therefore, proactive firewall solves the conflict between speed and security by providing high performance and high security. Simulation shows that if the response value is in between 0.7 and 1 it belongs to high security.
Research on the Contents and Indexes of Reservoir Operational Security  [PDF]
Jingchun Feng, Zhongnan Duan
Journal of Water Resource and Protection (JWARP) , 2010, DOI: 10.4236/jwarp.2010.211115
Abstract: Reservoirs play an important role in the development of economy and society, as well as the maintenance of ecological balance. The reservoir operational security can make every function of reservoirs fully played. This paper makes a systematic analysis on the meaning of reservoir operational security and builds up a framework system of it from the perspective of organization and system. On this3 basis, the paper researches the contents and indexes of reservoir operational security from the microscopic, intermediate and macroscopic aspects. The results of this paper provide a foundation for further research on reservoir operational security management.
Food Is Security: The Nexus of Health Security in Fragile and Failed States  [PDF]
John Quinn, Tomas Zeleny, Vladimir Bencko
Food and Nutrition Sciences (FNS) , 2014, DOI: 10.4236/fns.2014.519197
Abstract: Global food security is a major development challenge dictated by state stability, resilience to geopolitical and economic shocks and is linked to health security. Fragile and failed nation-states are at risk of extreme poverty and lead to war and conflict. Fragile states experience, corrupt financial regimes and are influenced by skewed global market systems and reduced equitable market access that decrease food and health security. This qualitative review describes the critical cross sections of food security, the influence of global market systems and state stability and institutions that form the nexus of global health security. We outline how the manipulation of free market systems and decreased state capacity not only decrease food and health security but also contribute to state fragility and failure. Improved public health policy mechanisms, decreased dependence on foreign financial structures and extractive mechanisms are crucial to improving food and health security at present, and to further increase state stability in the future.
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach  [PDF]
Joseph E. Mbowe, Simon S. Msanjila, George S. Oreku, Khamisi Kalegele
Journal of Software Engineering and Applications (JSEA) , 2016, DOI: 10.4236/jsea.2016.912041
Abstract: The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes.
The Necessity of Information Security in the Vulnerable Pharmaceutical Industry  [PDF]
Shawn Josette Roberts
Journal of Information Security (JIS) , 2014, DOI: 10.4236/jis.2014.54014
Abstract: The pharmaceutical industry produces billions of dollars in sales each year. The industry is evolving and relying on using technology more and more to conduct day-to-day business. The pharmaceutical industry generates enormous amounts of sensitive and private information such as medical records, employee information, financial data and research data. This makes the pharmaceutical industry vulnerable to cybercrime. The pharmaceutical industry has a big responsibility to stakeholders, patients, employees and customers all over the world to ensure this information is secure. It is imperative for organizations to budget adequate amounts of money and resources to have effective Information Security Management. Information Security Management is critical in the pharmaceutical industry and the alternative of not having it would be devastating to a pharmaceutical company. Cyber criminals can tarnish company reputations and the effects can take years to overcome. The main contributions of this paper will be to describe the concerns about the security of information in the pharmaceutical industry, provide examples of organizations that are victims of cybercrime, describe regulations in place to help reduce information security breaches and illustrate why information security is necessary in the pharmaceutical industry.
Externalities and the Magnitude of Cyber Security Underinvestment by Private Sector Firms: A Modification of the Gordon-Loeb Model  [PDF]
Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, Lei Zhou
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.61003
Abstract: Cyber security breaches inflict costs to consumers and businesses. The possibility also exists that a cyber security breach may shut down an entire critical infrastructure industry, putting a nation’s whole economy and national defense at risk. Hence, the issue of cyber security investment has risen to the top of the agenda of business and government executives. This paper examines how the existence of well-recognized externalities changes the maximum a firm should, from a social welfare perspective, invest in cyber security activities. By extending the cyber security investment model of Gordon and Loeb [1] to incorporate externalities, we show that the firm’s social optimal investment in cyber security increases by no more than 37% of the expected externality loss.
Computer – Based Infrastructure Sector Interdependencies and Security Implications  [PDF]
Aghware Fidelis Obukohwo
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2011, DOI: 10.4236/ijcns.2011.411090
Abstract: Traditionally, the analysis of sector interdependencies has involved the characterization of all infrastructure-to-infrastructure interconnections and some of the main infrastructure integrals that, once lost or be tampered with, will compromise the performance and security issues with the other interconnected infrastructures. Therefore, the paper dwells much on the security implications which may be associated with these infrastructure sector interdependencies. This paper also discusses some of the major risk considerations, analytical approaches, researches and the necessary developments needed as well as the interdisciplinary ranges through which the necessary skills are required in the construction of comprehensive sector interdependencies.
Food insecurity: How to orchestrate a global health crisis  [PDF]
John Quinn, Vladimir Bencko
Health (Health) , 2013, DOI: 10.4236/health.2013.56141

In 2007-2008, the world experienced over 1 billion people going hungry. This complex food security and public health crisis have many levels, actors and stakeholders. There lacks equity in access food markets, unbalanced consumption of nutrients and poor state institutions that, all negatively impact food security. Global financial products and regimes can greatly influence food prices, and if not properly regulated, this can lead to whole market manipulation and starvation. This paper discusses the basics of food security in a public health framework and describes the legal and financial mechanisms that lead to food insecurity.

Page 1 /6297
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.