Today’s automobile contains a myriad of computers. While this advancement allows automobile to be more efficient and safer, that comes with new potentials risks. It is not clear if, by making car safer while using computers, automobile manufacturers thought about those computers becoming a threat if used maliciously. In this landmark research, Karl Kosher et …
Rowhammer attacks are really interesting. They uses some of the physical properties of how computer memory is designed to overcome the logical control of how it is used. The bits of information are stored so close together in modern memory that if you ‘wiggle’ one bit fast enough, sometimes the ones next to it flip …
Presented by Dr. Israat Haque at the 2018 Atlantic Security Conference Software Defined Network (SDN) is a new approach of designing networks. In SDN architecture network control function is decoupled from hardware like routers and switches. This decoupled control function is executed in a logically centralized controller with a global network view. Furthermore, SDN brings …
Shaheen Shariff et Karen Eltis se sont intéressées à la violence sexuelle en ligne sur les campus. La violence sexuelle en ligne est une forme de violence sexuelle. En incluant la violence sexuelle en ligne dans la définition de la violence sexuelle, on rend compte des caractéristiques de la violence sexuelle qui s’étendent au-delà de …
Luigi Logrippo at the Université du Québec en Outaouais presents the importance of multi-level access control methods for access control, data secrecy and data privacy. They suggest that an access control system that intends to provide secrecy and privacy must implement a multi-level access control method. In a system with data that is secret and …
At the upper end of security practices there is isolation. Disconnecting a computer from the network and of course the Internet provides a layer of physical control to system access. This air-gap is used to provide a barrier to information theft on individual computers and networks that contain very sensitive data by militaries and organisations. …
Presented by Dr. Ashraf Matrawy at the SERENE-RISC workshop 2017, April. For economic, technical, and environmental reasons, there is a very strong trend towards virtualizing computing infrastructures and relying less on private computing infrastructures. This trend utilizes information infrastructures that are built using virtualization techniques while taking advantage of very rapid advances in networking technologies. In …
Power Projection in the Digital Age: The Only Winning Move is to Play General Darren W. McDew, USAF, is the Commander of U.S. Transportation Command (USTRANSCOM), the Command responsible for the transportation for the US Department of Defence. He provides an interesting insight into the importance of cybersecurity to the capabilities of the modern military. Information …
Privacy, security and policies: A review of problems and solutions with semantic web technologies Sabrina Kirrane from The Vienna University of Economics, Serena Villata from Université Côte d’Azur, and Mathieu d’Acquin from the National University of Ireland Galway provide a look at how Semantic Web technologies research is progressing with relation to privacy and security concerns. They …
When Pennsylviania State University decided to change their two factor authentication system Jake Weidman and Jens Grossklags took advantage of the situation to look at the transition from an organisational perspective. Their paper “I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication” provides some interesting insights. They …