Search results for: integrated security
5430 Design of Cloud Service Brokerage System Intermediating Integrated Services in Multiple Cloud Environment
Authors: Dongjae Kang, Sokho Son, Jinmee Kim
Abstract:
Cloud service brokering is a new service paradigm that provides interoperability and portability of application across multiple Cloud providers. In this paper, we designed cloud service brokerage system, any broker, supporting integrated service provisioning and SLA based service life cycle management. For the system design, we introduce the system concept and whole architecture, details of main components and use cases of primary operations in the system. These features ease the Cloud service provider and customer’s concern and support new Cloud service open market to increase cloud service profit and prompt Cloud service echo system in cloud computing related area.Keywords: cloud service brokerage, multiple Clouds, Integrated service provisioning, SLA, network service
Procedia PDF Downloads 4885429 The Curse of Oil: Unpacking the Challenges to Food Security in the Nigeria's Niger Delta
Authors: Abosede Omowumi Babatunde
Abstract:
While the Niger Delta region satisfies the global thirst for oil, the inhabitants have not been adequately compensated for the use of their ancestral land. Besides, the ruthless exploitation and destruction of the natural environment upon which the inhabitants of the Niger Delta depend for their livelihood and sustenance by the activities of oil multinationals, pose major threats to food security in the region and by implication, Nigeria in general, Africa, and the world, given the present global emphasis on food security. This paper examines the effect of oil exploitation on household food security, identify key gaps in measures put in place to address the changes to livelihoods and food security and explore what should be done to improve the local people access to sufficient, safe and culturally acceptable food in the Niger Delta. Data is derived through interviews with key informants and Focus Group Discussions (FGDs) conducted with respondents in the local communities in the Niger Delta states of Delta, Bayelsa and Rivers as well as relevant extant studies. The threat to food security is one important aspect of the human security challenges in the Niger Delta which has received limited scholarly attention. In addition, successive Nigerian governments have not meaningfully addressed the negative impacts of oil-induced environmental degradation on traditional livelihoods given the significant linkages between environmental sustainability, livelihood security, and food security. The destructive impact of oil pollution on the farmlands, crops, economic trees, creeks, lakes, and fishing equipment is so devastating that the people can no longer engage in productive farming and fishing. Also important is the limited access to modern agricultural methods for fishing and subsistence farming as fishing and farming are done using mostly crude implements and traditional methods. It is imperative and urgent to take stock of the negative implications of the activities of oil multinationals for environmental and livelihood sustainability, and household food security in the Niger Delta.Keywords: challenges, food security, Nigeria's Niger delta, oil
Procedia PDF Downloads 2505428 Modern Conditions and Tendencies of Development of Agro-Industrial Complex of the Republic of Kazakhstan
Authors: А. А. Yessekeyeva, А. S. Moldagaliyeva, G. K. Shulanbekova
Abstract:
The purpose of this article is to describe challenges associated with enhancement of government control over agro industrial sector in order to maintain food security. The need for government control over agricultural industry stems from the fact that the State is accountable to its citizens for establishing their standard living conditions, food and other agricultural product supplies. Agro industrial sector is in a special position within the market place preventing its full and equal participation in an interdisciplinary competition. Low-profit agricultural industry that is dependent on the natural and strongly marked seasonal and cyclical production factors is more underdeveloped in terms of technology and relatively static industry as compared to the manufacturing industry. Therefore, agricultural industry development directly affects food security of the country.Keywords: food security, agro-industry, Kazakhstan, food security
Procedia PDF Downloads 2875427 Labour Migration in Russia in the Context of Russia’s National Security Problem
Authors: A. V. Dolzhikova
Abstract:
The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security
Procedia PDF Downloads 3655426 Climate Smart Agriculture: Nano Technology in Solar Drying
Authors: Figen Kadirgan, M. A. Neset Kadirgan, Gokcen A. Ciftcioglu
Abstract:
Addressing food security and climate change challenges have to be done in an integrated manner. To increase food production and to reduce emissions intensity, thus contributing to mitigate climate change, food systems have to be more efficient in the use of resources. To ensure food security and adapt to climate change they have to become more resilient. The changes required in agricultural and food systems will require the creation of supporting institutions and enterprises to provide services and inputs to smallholders, fishermen and pastoralists, and transform and commercialize their production more efficiently. Thus there is continously growing need to switch to green economy where simultaneously causes reduction in carbon emissions and pollution, enhances energy and resource-use efficiency; and prevents the loss of biodiversity and ecosystem services. Smart Agriculture takes into account the four dimensions of food security, availability, accessibility, utilization, and stability. It is well known that, the increase in world population will strengthen the population-food imbalance. The emphasis on reduction of food losses makes a point on production, on farmers, on increasing productivity and income ensuring food security. Where also small farmers enhance their income and stabilize their budget. The use of solar drying for agricultural, marine or meat products is very important for preservation. Traditional sun drying is a relatively slow process where poor food quality is seen due to an infestation of insects, enzymatic reactions, microorganism growth and micotoxin development. In contrast, solar drying has a sound solution to all these negative effects of natural drying and artificial mechanical drying. The technical directions in the development of solar drying systems for agricultural products are compact collector design with high efficiency and low cost. In this study, using solar selective surface produced in Selektif Teknoloji Co. Inc. Ltd., solar dryers with high efficiency will be developed and a feasibility study will be realized.Keywords: energy, renewable energy, solar collector, solar drying
Procedia PDF Downloads 2255425 Implementation of an Undergraduate Integrated Biology and Chemistry Course
Authors: Jayson G. Balansag
Abstract:
An integrated biology and chemistry (iBC) course for freshmen college students was developed in University of Delaware. This course will prepare students to (1) become interdisciplinary thinkers in the field of biology and (2) collaboratively work with others from multiple disciplines in the future. This paper documents and describes the implementation of the course. The information gathered from reading literature, classroom observations, and interviews were used to carry out the purpose of this paper. The major goal of the iBC course is to align the concepts between Biology and Chemistry, so that students can draw science concepts from both disciplines which they can apply in their interdisciplinary researches. This course is offered every fall and spring semesters of each school year. Students enrolled in Biology are also enrolled in Chemistry during the same semester. The iBC is composed of lectures, laboratories, studio sessions, and workshops and is taught by the faculty from the biology and chemistry departments. In addition, the preceptors, graduate teaching assistants, and studio fellows facilitate the laboratory and studio sessions. These roles are interdependent with each other. The iBC can be used as a model for higher education institutions who wish to implement an integrated biology course.Keywords: integrated biology and chemistry, integration, interdisciplinary research, new biology, undergraduate science education
Procedia PDF Downloads 2455424 Protection of the Object of the Critical Infrastructure in the Czech Republic
Authors: Michaela Vašková
Abstract:
With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit
Procedia PDF Downloads 3455423 Geographical Indication Protection for Agricultural Products: Contribution for Achieving Food Security in Indonesia
Authors: Mas Rahmah
Abstract:
Indonesia is the most populous Southeast Asian nations, as Indonesia`s population is constantly growing, food security has become a crucial trending issue. Although Indonesia has more than enough natural resources and agricultural products to ensure food security for all, Indonesia is still facing the problem of food security because of adverse weather conditions, increasing population, political instability, economic factors (unemployment, rising food prices), and the dependent system of agriculture. This paper will analyze that Geographical Indication (GI) can aid in transforming Indonesian agricultural-dependent system by tapping the unique product attributes of their quality products since Indonesia has a lot of agricultural products with unique quality and special characteristic associated with geographical factors such as Toraja Coffee, Alor Vanili, Banda Nutmeg, Java Tea, Deli Tobacco, Cianjur Rise etc. This paper argues that the reputation and agricultural products and their intrinsic quality should be protected under GI because GI will provide benefit supporting the food security program. Therefore, this paper will expose the benefit of GI protection such as increasing productivity, improving the exports of GI products, creating employment, adding economic value to products, and increasing the diversity of supply of natural and unique quality products, etc. that can contribute to food security. The analysis will finally conclude that the scenario of promoting GI may indirectly contribute to food security through adding value by incorporating territory specific cultural, environmental and social qualities into production, processing and developing of unique local, niche and special agricultural products.Keywords: geographical indication, food security, agricultural product, Indonesia
Procedia PDF Downloads 3695422 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids
Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel
Abstract:
Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.Keywords: cyber security, performance, protocols, security standards, smart grid
Procedia PDF Downloads 3245421 Application of PSK Modulation in ADS-B 1090 Extended Squitter Authentication
Authors: A-Q. Nguyen. A. Amrhar, J. Zambrano, G. Brown, O.A. Yeste-Ojeda, R. Jr. Landry
Abstract:
Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.Keywords: ADS-B authentication, ADS-B security, NextGen ADS-B, PSK signature, secure ADS-B
Procedia PDF Downloads 3195420 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case
Authors: Jordan Deliversky
Abstract:
Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.Keywords: legislation, migrants, refugees, security, terrorism
Procedia PDF Downloads 3445419 A Survey on Smart Security Mechanism Using Graphical Passwords
Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi
Abstract:
Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.Keywords: shoulder-surfing, security, authentication, text-passwords
Procedia PDF Downloads 3635418 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro
Authors: Safwan Mawlood Hussien
Abstract:
Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro
Procedia PDF Downloads 1195417 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 2975416 Advancing Energy Security Through Regional Cooperation in Southern Africa: An Assessment of the Challenges and Opportunities
Authors: Loide Sambo
Abstract:
Achieving energy security has, in the past few decades, become one of the main goals in the security agenda of every country around the world. For Southern African Countries (SAC) the aim is not different, yet these countries face a particular challenge in the pursuit of their energy security. More than just secure enough energy sources to fuel their industrial and societal needs, SAC have as well to ensure that they trade their rich energy resources to the global market in a way that promotes and safeguards their economic development objectives. Considering the relevance of this issue to the SAC, the present paper explores the possibility of these countries to achieve energy security through regional cooperation, under the Southern Africa Development Community (SADC) platform. It discusses the challenges and opportunities for advancing energy security in this region through cooperation. After analyzing the data through the documentary analysis method, it was found that regional cooperation among SAC to improve energy security is not effective since cooperation in the region is still very susceptible to a plethora of challenges, such as political instability, lack of development of infrastructure and expertise, lack of good governance, lack of sense of cohesiveness, and most important lack of political commitment. It was also found that significant commitment on regional cooperation had been centered on the electricity sub-sector due to the region’s huge electricity deficit. Thus less commitment is dedicated to the development and policy harmonization of the other sub-sectors such as the one of natural gas and oil, for instance. Hence, it is recommended that the leadership of the SAC is fully committed to cooperate and harmonize the policies, the strategic plans, as well as the infrastructure concerning to all the natural energy resources and its respective sub-sectors. This would provide the SAC significant leverage to negotiate for the energy market access, ensuring that the region’s energy commodities are traded, while the countries themselves retain enough energy to sustain their economic growth and development, improving, therefore, their energy security.Keywords: regional cooperation, energy security, economic development, political commitment
Procedia PDF Downloads 2505415 Integrated Services Hub for Exploration and Production Industry: An Indian Narrative
Authors: Sunil Arora, Anitya Kumar Jena, S. A. Ravi
Abstract:
India is at the cusp of major reforms in the hydrocarbon sector. Oil and gas sector is highly liberalised to attract private investment and to increase domestic production. Major hydrocarbon Exploration & Production (E&P) activity here have been undertaken by Government owned companies but with easing up and reworking of hydro carbon exploration licensing policies private players have also joined the fray towards achieving energy security for India. Government of India has come up with policy and administrative reforms including Hydrocarbon Exploration and Licensing Policy (HELP), Sagarmala (port-led development with coastal connectivity), and Development of Small Discovered Fields, etc. with the intention to make industry friendly conditions for investment, ease of doing business and reduce gestation period. To harness the potential resources of Deep water and Ultra deep water, High Pressure – High Temperature (HP-HT) regions, Coal Bed Methane (CBM), Shale Hydrocarbons besides Gas Hydrates, participation shall be required from both domestic and international players. Companies engaged in E&P activities in India have traditionally been managing through their captive supply base, but with crude prices under hammer, the need is being felt to outsource non-core activities. This necessitates establishment of a robust support services to cater to E&P Industry, which is currently non-existent to meet the bourgeon challenges. This paper outlines an agenda for creating an Integrated Services Hub (ISH) under Special Economic Zone (SEZ) to facilitate complete gamut of non-core support activities of E&P industry. This responsive and proficient multi-usage facility becomes viable with better resource utilization, economies of scale to offer cost effective services. The concept envisages companies to bring-in their core technical expertise leaving complete hardware peripherals outsourced to this ISH. The Integrated Services Hub, complying with the best in class global standards, shall typically provide following Services under Single Window Solution, but not limited to: a) Logistics including supply base operations, transport of manpower and material, helicopters, offshore supply vessels, warehousing, inventory management, sourcing and procurement activities, international freight forwarding, domestic trucking, customs clearance service etc. b) Trained/Experienced pool of competent Manpower (Technical, Security etc.) will be available for engagement by companies on either short or long term basis depending upon the requirements with provisions of meeting any training requirements. c) Specialized Services through tie-up with global best companies for Crisis Management, Mud/Cement, Fishing, Floating Dry-dock besides provision of Workshop, Repair and Testing facilities, etc. d) Tools and Tackles including drill strings, etc. A pre-established Integrated Services Hub shall facilitate an early start-up of activities with substantial savings in time lines. This model can be replicated at other parts of the world to expedite E&P activities.Keywords: integrated service hub, India, oil gas, offshore supply base
Procedia PDF Downloads 1505414 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security
Authors: Yael Deutsch, Arieh Gavious
Abstract:
The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.Keywords: game theory, profiling, security, nash equilibrium
Procedia PDF Downloads 1105413 Impact of the Fourth Industrial Revolution on Food Security in South Africa
Authors: Fiyinfoluwa Giwa, Nicholas Ngepah
Abstract:
This paper investigates the relationship between the Fourth Industrial Revolution and food security in South Africa. The Ordinary Least Square was adopted from 2012 Q1 to 2021 Q4. The study used artificial intelligence investment and the food production index as the measure for the fourth industrial revolution and food security, respectively. Findings reveal a significant and positive coefficient of 0.2887, signifying a robust statistical relationship between AI adoption and the food production index. As a policy recommendation, this paper recommends the introduction of incentives for farmers and agricultural enterprises to adopt AI technologies -and the expansion of digital connectivity and access to technology in rural areas.Keywords: Fourth Industrial Revolution, food security, artificial intelligence investment, food production index, ordinary least square
Procedia PDF Downloads 755412 Cyber Security Situational Awareness among Students: A Case Study in Malaysia
Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa
Abstract:
This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.Keywords: cyber security awareness, cyber security education, cyber security, school students
Procedia PDF Downloads 3025411 Opportunity Integrated Assessment Facilitating Critical Thinking and Science Process Skills Measurement on Acid Base Matter
Authors: Anggi Ristiyana Puspita Sari, Suyanta
Abstract:
To recognize the importance of the development of critical thinking and science process skills, the instrument should give attention to the characteristics of chemistry. Therefore, constructing an accurate instrument for measuring those skills is important. However, the integrated instrument assessment is limited in number. The purpose of this study is to validate an integrated assessment instrument for measuring students’ critical thinking and science process skills on acid base matter. The development model of the test instrument adapted McIntire model. The sample consisted of 392 second grade high school students in the academic year of 2015/2016 in Yogyakarta. Exploratory factor analysis (EFA) was conducted to explore construct validity, whereas content validity was substantiated by Aiken’s formula. The result shows that the KMO test is 0.714 which indicates sufficient items for each factor and the Bartlett test is significant (a significance value of less than 0.05). Furthermore, content validity coefficient which is based on 8 expert judgments is obtained at 0.85. The findings support the integrated assessment instrument to measure critical thinking and science process skills on acid base matter.Keywords: acid base matter, critical thinking skills, integrated assessment instrument, science process skills, validity
Procedia PDF Downloads 3235410 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Authors: Naveed Ghani, Samreen Javed
Abstract:
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.Keywords: network worms, malware infection propagating malicious code, virus, security, VPN
Procedia PDF Downloads 3585409 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments
Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka
Abstract:
Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance
Procedia PDF Downloads 515408 Optimization of Process Parameters and Modeling of Mass Transport during Hybrid Solar Drying of Paddy
Authors: Aprajeeta Jha, Punyadarshini P. Tripathy
Abstract:
Drying is one of the most critical unit operations for prolonging the shelf-life of food grains in order to ensure global food security. Photovoltaic integrated solar dryers can be a sustainable solution for replacing energy intensive thermal dryers as it is capable of drying in off-sunshine hours and provide better control over drying conditions. But, performance and reliability of PV based solar dryers depend hugely on climatic conditions thereby, drastically affecting process parameters. Therefore, to ensure quality and prolonged shelf-life of paddy, optimization of process parameters for solar dryers is critical. Proper moisture distribution within the grains is most detrimental factor to enhance the shelf-life of paddy therefore; modeling of mass transport can help in providing a better insight of moisture migration. Hence, present work aims at optimizing the process parameters and to develop a 3D finite element model (FEM) for predicting moisture profile in paddy during solar drying. Optimization of process parameters (power level, air velocity and moisture content) was done using box Behnken model in Design expert software. Furthermore, COMSOL Multiphysics was employed to develop a 3D finite element model for predicting moisture profile. Optimized model for drying paddy was found to be 700W, 2.75 m/s and 13% wb with optimum temperature, milling yield and drying time of 42˚C, 62%, 86 min respectively, having desirability of 0.905. Furthermore, 3D finite element model (FEM) for predicting moisture migration in single kernel for every time step has been developed. The mean absolute error (MAE), mean relative error (MRE) and standard error (SE) were found to be 0.003, 0.0531 and 0.0007, respectively, indicating close agreement of model with experimental results. Above optimized conditions can be successfully used to dry paddy in PV integrated solar dryer in order to attain maximum uniformity, quality and yield of product to achieve global food and energy securityKeywords: finite element modeling, hybrid solar drying, mass transport, paddy, process optimization
Procedia PDF Downloads 1395407 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 855406 Safety, Healthy, Intact, and Halal as New Indonesia Policy on Food Security and Safety to Support SDG'S: Sustainable Development Goals
Authors: Ramadhan Febriansyah, Sarah Novianti, Santi Agustini
Abstract:
Indonesia is a big country with Moslem population. The government must fulfill all needs of the people. However, we do not have a good policy yet especially on healthy, safety and halal food. We try to offer a new solution to overcome this with ASUH (Aman, Sehat, Utuh, Halal) or in English is SHIH (Safe, Healthy, Intact, Halal) as alternative Indonesian policy on food security. This policy is Indonesian Government’s commitment to support Sustainability Development Goals program for the zero hunger (end hunger, to achieve food security and improved nutrition for Indonesian people, of course, to promote sustainable agriculture). Hopefully, it not only can increasing quality on food especially on livestock goods (meat, egg, milk) but also to guarantee the halal food. However, this policy can be an example to others country especially Moslem countries to support SDG’s programs. This research conducted means of the descriptive method; the authors find compare the secondary data obtained from journals, textbook and scientific articles in order to determine the factors that influence food safety and food security. Relevant data used and contain a description of SDG’s as well as about the system food safety and food security that SHIH (Safe, Healthy, Intact and Halal) so these ideas can be implemented.Keywords: food safety, food security, food sovereignty, halal SDG's
Procedia PDF Downloads 3845405 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework
Authors: Husnil Khatimah, Fairol Halim
Abstract:
This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper
Procedia PDF Downloads 4545404 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector
Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid
Abstract:
For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.Keywords: electricity, energy policy, energy security, Malaysia
Procedia PDF Downloads 3065403 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3245402 A Study of Evolving Cloud Computing Data Security: A Machine Learning Perspective
Authors: Shinoy Vengaramkode Bhaskaran
Abstract:
The advancement of cloud computing led to a variety of security issues for both consumers and industries. Whereas machine learning (ML) is one approach to securing Cloud-based systems. Various methods have been employed to prevent or detect attacks and security vulnerabilities on the Cloud using ML techniques. In this paper, we present an ML perspective on the methodologies and techniques of cloud security. Initially, an investigative study on cloud computing is conducted with a primary emphasis on the gaps with two research questions that are impeding the adoption of cloud technology, as well as the challenges associated with threat solutions. Next, some ideas are generated based on machine learning methods to mitigate certain types of attacks that are frequently discussed through the application of ML techniques. Finally, we review different machine learning algorithms and their adoption in cloud computing.Keywords: artificial intelligence, machine learning, cloud computing infrastructure as a service, support vector machine, platform as a service
Procedia PDF Downloads 05401 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 33