Search results for: hardware security evaluation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9497

Search results for: hardware security evaluation

8867 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 198
8866 Emotional Security in Relation to Students' Emotional Efficiency

Authors: Ibtisam Mahmoud Mohammed Sultan

Abstract:

The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.

Keywords: relation, emotional security, students, efficiency

Procedia PDF Downloads 120
8865 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 305
8864 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges

Authors: Alvite Singh Ningthoujam

Abstract:

The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.

Keywords: India, Islamic State, Muslim, Security

Procedia PDF Downloads 376
8863 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 185
8862 Formal Verification for Ethereum Smart Contract Using Coq

Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song

Abstract:

The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.

Keywords: smart contract, formal verification, Ethereum, Coq

Procedia PDF Downloads 691
8861 The Evaluation and Performance of SSRU Employee’s that Influence the Attitude towards Work, Job Satisfaction and Organization Commitment

Authors: Bella Llego

Abstract:

The purpose of this study was to explain and empirically test the influence of attitude towards work, job satisfaction and organizational commitment of SSRU employee’s evaluation and performance. Data used in this study was primary data which were collected through Organizational Commitment Questionnaire with 1-5 Likert Scale. The respondent of this study was 200 managerial and non-managerial staff of SSRU. The statistics to analyze the data provide the descriptive by the mean, standard deviation and test hypothesis by the use of multiple regression. The result of this study is showed that attitude towards work have positive but not significant effect to job satisfaction and employees evaluation and performance. Different with attitude towards work, the organizations commitment has positive and significant influence on job satisfaction and employee performance at SSRU. It means every improvement in organization’s commitment has a positive effect toward job satisfaction and employee evaluation and performance at SSRU.

Keywords: attitude towards work, employee’s evaluation and performance, jobs satisfaction, organization commitment

Procedia PDF Downloads 454
8860 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 232
8859 Securing Land Rights for Food Security in Africa: An Appraisal of Links Between Smallholders’ Land Rights and the Right to Adequate Food in Ethiopia

Authors: Husen Ahmed Tura

Abstract:

There are strong links between secure land rights and food security in Africa. However, as land is owned by governments, land users do not have adequate legislative protection. This article explores normative and implementation gaps in relation to small-scale farmers’ land rights under the Ethiopia’s law. It finds that the law facilitates eviction of small-scale farmers and indigenous peoples from their land without adequate alternative means of livelihood. It argues that as access to land and other natural resources is strongly linked to the right to adequate food, Ethiopia should reform its land laws in the light of its legal obligations under international human rights law to respect, protect and fulfill the right to adequate food and ensure freedom from hunger.

Keywords: smallholder, secure land rights , food security, right to food, land grabbing, forced evictions

Procedia PDF Downloads 308
8858 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria

Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue

Abstract:

The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.

Keywords: personal variables, students, perception, school security

Procedia PDF Downloads 77
8857 Central American Security Issue: Civil War Legacy and Contemporary Challenges

Authors: Olga Andrianova, Lazar Jeifets

Abstract:

The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.

Keywords: Central America, insecurity, instability, post-war countries, violence

Procedia PDF Downloads 473
8856 Design of Low-Maintenance Sewer Pump Stations with High-Security Measures for Municipal Applications

Authors: H. V. Smit, V. H. J. de Wet

Abstract:

South African municipalities are dealing with aging and dilapidated infrastructure while faced with challenges in the form of expanding informal settlements, vandalism, theft, and a lack of maintenance which place even more pressure on existing infrastructure. The existing infrastructure was never designed to cater to these challenges, and this becomes evident when evaluating the current state of many municipal sewer pump stations. A need has thus arisen to develop a sewer pump station design concept that will address these challenges and allow for a long-term sustainable solution. This article deals with the design concepts which have been developed for sewer pump stations for an effective reduction in maintenance, improved grit handling, improvement to the operation and maintenance working conditions, and the adoption of high-security design philosophy.

Keywords: high security, low maintenance, municipal application, sewer pump station

Procedia PDF Downloads 109
8855 Some Issues with Extension of an HPC Cluster

Authors: Pil Seong Park

Abstract:

Homemade HPC clusters are widely used in many small labs, because they are easy to build and cost-effective. Even though incremental growth is an advantage of clusters, it results in heterogeneous systems anyhow. Instead of adding new nodes to the cluster, we can extend clusters to include some other Internet servers working independently on the same LAN, so that we can make use of their idle times, especially during the night. However extension across a firewall raises some security problems with NFS. In this paper, we propose a method to solve such a problem using SSH tunneling, and suggest a modified structure of the cluster that implements it.

Keywords: extension of HPC clusters, security, NFS, SSH tunneling

Procedia PDF Downloads 426
8854 Indonesia's War on Terror and the Consequences on Indonesian Political System

Authors: Salieg L. Munestri

Abstract:

War on Terror became a principal war after the 9/11 attacks on U.S. homeland. Instead of helping to build up worldwide efforts to condemn terror and suicide bombings, the U.S.-led war on terror has given opportunities for the vast spread of terror. In much of Muslim world recently, the Bush’s Doctrine pushing all nations to choose sides in a war that is not truly a war has resulted worse effects. In the world’s most populous Muslim nation, Indonesia, more terror occurred since then. Instead of reinforcing the well-trained anti-terror military forces, Indonesian government established US-funded Special Detachment 88 to guarantee the accomplishment of war on terror in Indonesia and significantly to bring impact on regional security atmosphere. Indonesia is a potential power in Asia but it lacked off sophisticated military equipments. Consequently, Indonesia agrees to become a U.S. mutual partner in combating terrorism managed by Defense Security Cooperation Agency. The formation of elite anti-terror forces and U.S. partnerships perform Indonesia’s commitment to take a position beside the U.S. in coping with terrorism issue. However, this undeniably brings consequences on Indonesian political athmosphere, which encourages the writer to dig deep the consequences on the domestic environment of Indonesian political system. The establishment of the elite forces has aroused fluctuations within government, chiefly Indonesian House, concerning the establishment urgency, the large amount of funding, and the unpleasant performances, particularly the treatment toward suspected terrorists. Hence, evaluation process upon the Detachment 88 is highly demanding.

Keywords: anti-terror forces, Indonesia, political system, war on terror

Procedia PDF Downloads 346
8853 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 140
8852 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 218
8851 The Contribution of the Livestock Marketing Programme in Improving Household Food Security in Communal Areas of Umzimkhulu Local Municipality, Kwa-Zulu Natal

Authors: Sibongiseni Peacock, Denver Naidoo, Sikhalazo Dube

Abstract:

The study investigates the impact of the National Red Meat Development Programme on household food security in rural areas of uMzimkhulu. Self-administered questionnaires were employed to gather data from 77 smallholder beef farmers participating in the St. Paul feedlot project. Data analysis utilized the Household Food Insecurity Access Scale (HFIAS) developed by USAID to assess the household food security status of St. Paul feedlot beneficiaries, with descriptive statistics employed for result analysis. Findings indicate that the majority (80.50%) of beneficiaries experienced food insecurity, while (19.50%) were classified as food secure, with most participants falling within the category of moderate food insecurity. Food insecurity predominantly stemmed from challenges faced by farmers unable to sell their cattle or whose cattle were not market-ready due to bureaucratic obstacles hindering the programme. Farmers identified feed shortages as the primary constraint, resulting in missed income opportunities. These findings underscore the critical need to address feed challenges and bureaucratic barriers to enhance the efficacy of the National Red Meat Development Programme in promoting household food security in rural areas.

Keywords: National Red Meat Development, household food security, St. Paul feedlot, livestock, HFIAS

Procedia PDF Downloads 55
8850 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 364
8849 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 195
8848 Assessing the Role of Water Research and Development Investment towards Water Security in South Africa: During the Five Years Period (2009/10 - 2013/14)

Authors: Hlamulo Makelane

Abstract:

The study aims at providing new insights regarding research and development (R&D) public and private activities based on the national R&D survey of the past five years. The main question of the study is what role does water R&D plays on water security; to then analyze what lessons could be extracted to improve the security of water through R&D. In particular, this work concentrates on three main aspects of R&D investments: (i) the level of expenditures, (ii) the sources of funding related to water R&D, and (iii) the personnel working in the field, both for the public and private sectors. The nonlinear regression approached will be used for data analysis based on secondary data gathered from the South African nation R&D survey conducted annually by the Centre for science, technology and innovation indicators (CeSTII).

Keywords: water, R&D, investment, public sector, private sector

Procedia PDF Downloads 237
8847 Hotel Guests’ Service Fulfillment: Bangkok, Thailand

Authors: Numtana Ladplee, Cherif Haberih

Abstract:

The value of service evaluation depends critically on guests’ understanding of the evaluation objectives and their roles. The present research presents a three-phase investigation of the impact of evaluating participants’ theories about their roles: (a) identifying the theories, (b) testing the process consequences of participants’ role theories, and (c) gaining insights into the impact of participants’ role theories by testing key moderator/s. The findings of this study will hopefully indicate that (a) when forewarned of an upcoming evaluation task, consumers tend to believe that the evaluation objective is to identify aspects that need improvement, (b) this expectation produces a conscious attempt to identify negative aspects, although the encoding of attribute information is not affected, and (c) cognitive load during the evaluation experience greatly decreases the negativity of expected evaluations. The present study can be applied to other market research techniques and thereby improve our understanding of consumer inputs derived from market research. Such insights can help diminish biases produced by participants’ correct or incorrect theories regarding their roles.

Keywords: fulfillment, hotel guests, service, Thailand

Procedia PDF Downloads 276
8846 Multi-Agent TeleRobotic Security Control System: Requirements Definitions of Multi-Agent System Using The Behavioral Patterns Analysis (BPA) Approach

Authors: Assem El-Ansary

Abstract:

This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Multi-Agent TeleRobotic Security Control System (MTSCS). The event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are the Behavioral Pattern Analysis (BPA) modeling methodology, and the development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.

Keywords: analysis, multi-agent, TeleRobotics control, security, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases

Procedia PDF Downloads 438
8845 Central American Security Issue: Civil Wars Legacy and Contemporary Challenges

Authors: Olga Andrianova, Lazar Jeifets

Abstract:

The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.

Keywords: Central America, insecurity, instability, violence

Procedia PDF Downloads 395
8844 Insurance of Agricultural Activities as the Basis for Food Security

Authors: J. B. Akshataeva, G. T. Aigarinova, A. Amankulova, D. S. Kalkanova

Abstract:

This article examines some aspects of the insurance of agricultural activities, strategic documents on deepening investment opportunities. Insurance market development is before the society and the state. It also examines problems of agricultural insurance development in the market economy of Kazakhstan as the basis for food security.

Keywords: agriculture, food safety, insurance, privacy issues

Procedia PDF Downloads 503
8843 Weapon Collection Initiatives and the Threat of Small Arms and Light Weapons Proliferation in Volatile Areas of North-Eastern Nigeria as a Way Forward for National Security and Development

Authors: Halilu Babaji, Adamu Buba

Abstract:

The proliferation of small arms and light weapons (SALW) and its illicit trafficking in West Africa and Nigeria in particular, pose a major threat to peace, security and development in the Sub-region. The high circulation of these weapons in the region is a product of the interplay of several factors, which derives principally from the internal socio-economic and political dynamics compounded by globalization. The process of globalization has congealed both time and space making it easier for ideas, goods, persons, services, information, products and money to move across borders with fewer restrictions. And this has a negative effect in the entire region making it easier for arms, ammunition, insurgents, criminal and drugs to flow within national boundaries. The failure of public security in most parts of Nigeria has lead communities to indulge in different forms of ‘self-help ‘security measures, ranging from vigilante groups to community-owned arms stockpiling. Having lost confidence in the Nigerian state, parties to some of these conflicts have become entangled in a security dilemma. The quest to procure more arms to guarantee personal and community protection from perceived and real enemies is fuelling the ‘domestic arms race ‘. Therefore, as small arms remain-and proliferate – development is impeded. The impact of SALW on economic well being and national development in Nigeria is of vast significant. Therefore the need to collect these arms in circulation in Nigeria particularly the volatile area of North-east is of very important. This will hopefully contribute to government effort in building a free, secured and peaceful society.

Keywords: arms, development, proliferation, security

Procedia PDF Downloads 325
8842 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 88
8841 A Low-Latency Quadratic Extended Domain Modular Multiplier for Bilinear Pairing Based on Non-Least Positive Multiplication

Authors: Yulong Jia, Xiang Zhang, Ziyuan Wu, Shiji Hu

Abstract:

The calculation of bilinear pairing is the core of the SM9 algorithm, which relies on the underlying prime domain algorithm and the quadratic extension domain algorithm. Among the field algorithms, modular multiplication operation is the most time-consuming part. Therefore, the underlying modular multiplication algorithm is optimized to maximize the operation speed of bilinear pairings. This paper uses a modular multiplication method based on non-least positive (NLP) combined with Karatsuba and schoolbook multiplication to improve the Montgomery algorithm. At the same time, according to the characteristics of multiplication operation in the quadratic extension domain, a quadratic extension domain FP2-NLP modular multiplication algorithm for bilinear pairings is proposed, which effectively reduces the operation time of modular multiplication in the quadratic extension domain. The sub-expanded domain Fp₂ -NLP modular multiplication algorithm effectively reduces the operation time of modular multiplication under the second-expanded domain. The multiplication unit in the quadratic extension domain is implemented using SMIC55nm process, and two different implementation architectures are designed to cope with different application scenarios. Compared with the existing related literature, The output latency of this design can reach a minimum of 15 cycles. The shortest time for calculating the (AB+CD)r⁻¹ mod form is 37.5ns, and the comprehensive area-time product (AT) is 11400. The final R-ate pairing algorithm hardware accelerator consumes 2670k equivalent logic gates and 1.8ms computing time in 55nm process.

Keywords: sm9, hardware, NLP, Montgomery

Procedia PDF Downloads 5
8840 Comparison of Medical Students Evaluation by Serious Games and Clinical Case-Multiple Choice Questions

Authors: Chamtouri I., Kechida M.

Abstract:

Background: Evaluation has a prominent role in medical education and graduation. This evaluation has usually done in face-to-face, by written or oral questions. Simulation is increasingly taking a part as a method of evaluation. Due to the Covid-19 pandemic, which disrupted face-to-face evaluation, simulation using serious games (SG) is emerging in the field of training and assessment of medical students. The aim of our study is to compare the results of the evaluation of medical students by virtual simulation by online serious games versus clinical case-multiple choice questions (MCQ) and to assess the degree of satisfaction from these two evaluation methods. Methods: Medical students from the same study level were voluntarily participated in this study. Groupe 1 had an evaluation by SG dealing with “diagnosis and management of ST-segment elevationmyocardialinfarction (STEMI)alreadyprepared on the website www.Mediactiv.com. Groupe 2 were evaluated by clinical case-MCQ having thes same topic as SG. Results of the two groups were compared. Satisfaction questionnaire was filled by the two groups. Satisfaction degree was compared between the two groups. Results. In this study, 64 medical students (G1:31 and G2: 33) were enrolled. Obtaining complete notes in the "questioning" and "clinical examination" parts is significantly more important in-group 1 compared to group 2. No significant difference detected between the two groups in terms of “ECG interpretation” and “diagnosis of STEMI” parts. A greater number of students of group 1 obtained the full note compared to group 2 in “the initial treatment part” (54.8% vs. 39.4%; p = 0.04). Thirty learners (96.8%) in-group 1 obtained a total score ≥ 50% versus 69.7% in-group 2 (p = 0.004). The full score of 100% was obtained in three learners in-group1, while no student scored 100% in-group2 (p = 0.027). Medical evaluation using SG was reported as more innovative, fun, and realistic compared to evaluation by clinical case-MCQ. No significant difference detected between the two methods in terms of stress. Conclusion: Simulation by SG can be considered as an innovative and effective method in evaluating medical students with a higher degree of satisfaction.

Keywords: evaluation, serious games, medical students, satisfaction

Procedia PDF Downloads 142
8839 Impact of HIV/AIDS on Food Security in Pala Sub-Location, Bondo District, Kenya

Authors: S. B. Otieno, Were Fred, E. W. Kabiru, K. Waza

Abstract:

Background: HIV/AIDS is leading to the loss of labor through sickness and subsequent death, this is leading to the neglect of farm and off-farm activities, with the subsequent loss of potential income and food security. The situation is sensitive to seasonal labour peaks in agriculture. This study was done to determine the impact of high HIV prevalence in farming systems and food security in Pala Bondo District, Kenya. Methods: In this study, 386 respondents were randomly chosen in Pala Sub-Location. The respondents and key informants were interviewed using structured questionnaire. The data were entered and analyzed using SPSS version 16. Results: It was established that majority of respondents (67%) were between 18 and 35 years {χ2 = (1, N = 386) = 13.430, p = 0.000} (chimney effect). The study also established that 83.5% of respondents were married {χ2 = (1, N= 370) = 166.277 p = 0.000} and predominant occupation being farming and fishing (61%), while 52.8% of farm labour was by hand, 26% by oxen, and 4.9% mechanized. 73.2% of respondents only farm 0.25 to 2 acres, 48% mentioned lack of labour in land preparation {χ2 ((1,N = 321) = 113.146, p = 0.000), in planting {χ2 (1, N = 321) = 29.28, p = 0.000}. Majority of respondents lack food from January to June, during which 93% buy food. Conclusion: The high HIV prevalence in Pala has affected the farm labour leading to food insecurity.

Keywords: food security, HIV, AIDS, labour

Procedia PDF Downloads 269
8838 Protecting Right to Life and Combating Terrorism through the Instrument of Law in Nigeria

Authors: Oyekan Kolawole Jamiu

Abstract:

The right to life is a moral principle based on the belief that a human being has the right to life and, in particular, should not be unjustly killed by another human being. However, the most worrisome security challenge in Nigeria which has cut short the lives of innocent Nigerians is the activities of the dreaded terrorist group known as Boko Haram (which means Western Education is a sin). Between 2004 till date, over 15000 people have been gruesomely murdered by this terrorist group. However, despite the facts that suspected terrorists are arrested and paraded almost on a daily basis, cases of terrorism in our courts in Nigeria today have not been expeditiously dealt with by the judiciary. This paper examines the concept of right to life. The right to life is an inherent right for each and every person. From his or her birth; the individual is considered a living being that must be protected. The right to life connotes also right to live and grow in a healthy environment where there is appropriate health care, qualitative education and adequate security of lives and property. The paper also examines the fight against terrorism and the duty of the government to protect right to life of every individual even in the midst of the fight against terrorism. The paper further reviews the Terrorism Act 2011(as amended) and the clogs in the wheel of prosecution of suspected terrorists. The paper concludes that since terrorism is a new security challenge, to prevent conflict of interest, only one security agency should be trained and saddled with the responsibility of prosecuting suspected terrorist, Law should be enacted to compel intelligent gathering and sharing of information among security agencies and in addition, a special court should be established to deal expeditiously with cases of terrorism in Nigeria.

Keywords: terrorism, intelligent gathering, right to life, prosecution

Procedia PDF Downloads 349