Monday, December 30, 2019

The Security Threats And Security Architecture Design

ABSTRACT Among civilian communication systems, vehicular communications emerge as one of the most convincing effort made to enhance safety and improve the efficiency of transportation systems, to meet ever-increasing traffic demands. Security is one of the critical factors that need to be addressed towards the deployment of vehicular communication systems. The efficiency of the transportation systems, as well as the physical safety of vehicles, drivers, and passengers depend on the security factor. Vehicular communications has to pass through the analysis of potential security threats and the design of a robust security architecture able to cope with these threats. In this paper we deal with the security threats and security architecture design. INTRODUCTION: Vehicular communications (VC) will play a vital role in enabling safer, smarter and greener transportation, with envisioned applications providing, for example, warnings on environmental hazards (e.g., ice on the pavement), traffic and road conditions (e.g., emergency braking, congestion, or construction sites), and local (e.g., tourist) information. To empower such applications, vehicles and road-side infrastructure units (RSUs), namely network nodes, will be furnished with on-board processing and wireless communication modules, to communicate with each other over single or multiple hops. Then, communication between vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) (bi-directional) will be possible directlyShow MoreRelatedThe Health Information Portability And Accountability Act Of 1996943 Words   |  4 PagesHealth Insurance Reform: Security Standards of 2003, part of the overall Security Rule contained in the Health Information Portability and Accountability Act of 1996. Although the federal rules detail the need for the protection of health information, Professor Fue and Professor Blum in 2013 extended the need to ensure that security is built into other systems that affect individual’s health (Fue Blum, 2013). Although there is no explicit requirement for architecture called out in Fue Blum’sRe ad MoreA Security Expert For A Large Insurance Company1423 Words   |  6 Pagesconfidentiality, privacy, threats and increased use of information system have prompted organizations to start protecting their systems to ensure electronic, physical and network information security. To ensure information security for this organization, a review of the company’s network, information systems and security policies must be conducted. In this report, I will be a security expert for a large insurance company. My job here is to assess the company, revise and reproduce the security policies, identifyRead MoreManaging Information Security Risks: The Octave Approach1635 Words   |  6 PagesAlberts, C. Dorofee, A.(2003) Managing Information Security Risks: The OCTAVE Approach. New York: Addison Wesley. This work is a descriptive and yet process-oriented book on the concept of security risk assessment with a specific focus on new risk evaluation methodology, OCTAVE. The term OCTAVE is used to denote f Operationally Critical Threat, Asset, and Vulnerability Evaluation SM.It is important that organizations conduct a security risk evaluation in order for them to effectively evaluateRead MoreSecureTek Security Design1243 Words   |  5 PagesSecureTek Security Design Security architecture is a major component and part of a system’s architecture and is usually designed to provide important guidance during the development of the system. It usually outlines the assurance level required and in the process outlines the possible impacts that this level of security might have on the development process of the actual system. Since security is a major component for the success of any given business unit, it is necessary to have a fully functionalRead MoreNetwork Analysis : The Core Layer1277 Words   |  6 Pagescore is primarily responsible for transmitting data, processing instructions, and managing the network as a whole. The network architecture used for the GFI network allows for interconnection and communication between all devices on the network. The only evidence of network segmentation is the access layer 2 VLAN switch connected to the finance department. This flat design allowed GFI to reduce cost and save on network maintenance and administration. However, as the company has grown beyond a smallRead MoreInternal Threats From Hackers And Malicious Software853 Words   |  4 Pagesincreasing number of threats, privacy issues, etc. information security is now a necessity for all organizations. This has alerted businesses globally to take steps in ensuring the security of their information and other assets. While most security measures focus on the external threats from hackers and malicious software, internal threats account for twice the impact of loss as external threats. These internal threats could be Intentional or accidental. But mostly internal threats are caused by poorRead MoreTraining For Building Secure Software Security Activities853 Words   |  4 Pagescarry out software security activities throughout your organization (2015). The collection of security knowledge included in the intelligence domain are policy, standards, design and attack patterns in reference to a secure architecture and secure development framework within the SSF (McGraw, 2006). This domain provides the essential resources to equip the staff with the necessary training for development and delivery. McGraw (2006) traced that the topics included are security knowledge and assuranceRead MoreSection{Secure Cloud Computation: Threats, Requirements905 Words   |  4 Pagessection{Secure Cloud Computation: Threats, Requirements and Efficiency} In this section, one common system architecture of outsourcing computation is firstly proposed. Then, we demonstrate typical security threats and corresponding security requirements. After that, some functionally work related to secure outsourcing are discussed. The concept of the balance between security and efficiency is briefly talked at the end of the section. subsection{System Architectures for Outsourcing Computation } ARead MorePreventing Attacks on New Network-Based Systems862 Words   |  3 Pagessystem also comes with a host of new threats and challenges, both internal and externally based. There are a number of external threats that now put the organization in danger based on its new IT structure. For one, introduction of viruses, spyware, and malware can now be much easily spread throughout the organization at a much faster speed (Cisco 2012). Network-based structures increase the autonomic nature of much of the security involved; when the security is not good enough to recognize hiddenRead MoreImplementing Enterprise Architecture For A Private Bank917 Words   |  4 PagesProject Environment: This paper presents a project on implementing Enterprise Architecture for a Private bank to introduce a Mobile Application. The idea of creating an application is taken from United State banks and their applications which helps their customers to access their accounts on their mobile devices and manage their accounts, activity on it. This project deals with bank’s IT department and management to implement this idea of creating an application. This bank has been selected on the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.