security challenges

Top PDF security challenges:

Index Terms - Security challenges, Infrastructure security, Data

Index Terms - Security challenges, Infrastructure security, Data

The tendency towards increasing the volume and detail of the data that is collected by companies in any sector will not change in the near future , as the rise of social networks, multimedia, and the Internet of Things (IoT) is producing an massive amount of data. We are living in the era of Big Data. Furthermore, this data is mostly unstructured, which signifies that traditional analyzing techniques are not capable of analyzing it. Companies are working to extract more beneficial information from this high volume and variety of data. A new analysis paradigm with which to analyze and better understand this data was needed, hence, emerged Big Data. It was introduced in order to obtain not only private, but also public benefits. But in the process of extracting more and more beneficial data, Big Data have also originated security challenges.

5 Read more

Security Challenges Facing IoT Layers and its Protective Measures

Security Challenges Facing IoT Layers and its Protective Measures

Like other revolutionary technologies, IoT has got popularity in every lifestyle and attention of researchers from the last few years. However, it also faces various security and privacy issues. This paper articulates the four basic layers architecture of IoT and different types of attacks on these layers with instances. Protective measures to safeguard these layers are also suggested to prevent and secure the IoT system from the security terrorization. A comparative analysis of security challenges between a traditional network and IoT environment is made and came on the conclusion that IoT system facing a lot of security challenges due to limited resources, elevated risk factors, and heterogeneous data formats.

5 Read more

Maritime Security Challenges in the Indo-Pacific Region

Maritime Security Challenges in the Indo-Pacific Region

importance for China to claim on the region. Japan also sees in India and Australia strategic partner of considerable potentials including the Japan’s maritime security concerns with China. Some of the most innovative and consequential of Japan’s move in security diplomacy has strengthened security ties with its Indo-Pacific partners. Security Challenges: Recently it has been observed that Indo-Pacific region is expanding regional and global trade in goods and resources that has raised a new set of maritime security challenges in the region. Some security concern such as internal political upheaval, insurgency, interstate tensions, sea lane security and territorial dispute are new growing security threats in the region, likewise there are some other growing security risks from non-state actors such as terrorism, trafficking, piracy, environmental degradation, climate change, natural disaster and depletion of natural resources. These security challenges confront equally to all nations bordering this region.

6 Read more

Security Challenges in Cloud Storage

Security Challenges in Cloud Storage

By analyzing of HDFS [1], data security needs of cloud computing can be divided into the following points, the client authentication requirements in login, the vast majority of cloud computing through a browser client, such as IE, and the user’s identity as a cloud computing applications demand for the primary needs. The existence of a single point of failure in Namenode: if namenode is attacked or failure, there will be disastrous consequences on the system. So the effectiveness of Namenode in cloud computing and its efficiency is key to the success of data protection, so to enhance Namenode’s security is very important. The rapid recovery of data blocks and r/w rights control: Datanode is a data storage node, there is the Possibility of failure and cannot guarantee the availability of data. Currently each data storage block in HDFS has at least 3 replicas, which is HDFS’s backup strategy. When comes to how to ensure the safety of reading and writing data, HDFS has not made any detailed explanation, so the needs to ensure rapid recovery and to make reading and writing data operation fully controllable cannot be ignored.

6 Read more

Analysis of 5G Mobile Technologies and DDOS Defense

Analysis of 5G Mobile Technologies and DDOS Defense

In this paper we've planned 5G System architecture that is that the main contribution of the paper. There are many enhancements from 1G, 2G, 3G, and 4G to 5G within the world of telecommunications. Photonics is that the basic technology for several of the photonic parts and modules mentioned during this paper: integrated transceivers, photonic switches for transport and for data centers. NOMA in this article the superior spectral potency of noma is very promising for 5G radio access. The application of noma is additionally penetrable into different communication systems, as well as mmWave and visual light-weight systems. The potential of noma isn't restricted to only SISO systems; its capability will be additional increased by applying noma in MIMO systems. 5G can use mobile clouds, SDN and NFV to fulfill the challenges of huge property, flexibility, and costs. With all the benefits, these technologies even have inherent security challenges. Therefore, during this paper we've got highlighted the most security challenges which will become additional threatening in 5G, unless properly addressed. We've got additionally given the security mechanisms and solutions for those challenges

7 Read more

Military Role in the Nigerian Constitution: An Exposé of law and Security Impact on Development

Military Role in the Nigerian Constitution: An Exposé of law and Security Impact on Development

To overcome insecurity, there is need for intelligence gathering and surveillance so that law enforcement agents could become proactive and reasonably predict potential crime with near accuracy rather than being reactive. According to Achumba et al (2013), the menace of insecurity calls for a new approach founded on creditable intelligence gathering. There is the need to modernize the security agencies through capacity building in advanced training, intelligence sharing, advanced technology, logistics, motivation and change of orientation (Figure 12). This will enhance the operational capabilities of the security agencies by identifying avenues that would enable them respond appropriately to internal security challenges and other threats. There should equally be complete overhaul of the security institutions in Nigeria to reflect international standards of best practices in order to pre-empt security breaches .There is need to reorder priorities and seek better understanding of the underlying causes and dynamic of the insecurity in the country, with the aim to provide effective conflict prevention and management strategies. According to Akpabibibo (2003), the formulation and effective implementation of policies and programmes to address the root causes of insecurity in Nigeria particularly with regards to poverty, unemployment, environmental degradation, injustice, corruption, porous borders and small arms proliferation have become crucial. In Nigeria, the law has ceased to act as a deterrent since corruption and insecurity have largely been compromised.

30 Read more

REVIEW ON THREATS IN IOT SECURITY.								
								
								     
								     
								   

REVIEW ON THREATS IN IOT SECURITY.      

In the successional coming years, IOT will have leading effects on business models, infrastructure, security, and, trade standards, all while the complete IT computing and networking organization. IOT here is enlighten of technology advancement from the previous phases of market growth. IOT has the power and capability to accelerate the “Contributing economy.” So, as contributing new techniques to manage and track minor things, it will also grant the sharing of new, minor and economical items insights the communities, cars, aircrafts, and motorbikes. As, the trends go on, it will contribute entirely novel applications, that will drive new business prototypes and profit prospects and possibilities. It drives sensors and devices to more granular levels and permits the creation of new uses, new services new applications, and new business models that were earlier not economically feasible. It will also risky and threatening for lots of current industries. As, Internet of Thing is a complicated, Heterogeneous linked and complementary system of Smart devices, communication of such devices is associated among the shared Infrastructure and common standard. Privacy Protection application is the main challenge for any of the IOT operations. A lot of security principles should be permitted at each layer for proper and productive working of these applications. This paper mainly analysis the critiques of Security challenges, and Security Threats, Security principles, at the application zone and it is improvement to overcome those challenges. With all this broad spectrum of IOT applications comes the point of security and privacy. Without a trusted and inseparable IOT ecosystem, turn up with IOT applications cannot reach high demand and may give up all their potential. This paper mainly focuses at the IOT Security threats and various applications on it. The IOT architecture is pretended to be made up of three layers, especially are perception, Network and application layers. Also, the perspective is to focus on the Application layer protocols. As, the application layer protocol plays a role decisive in all the IOT application, security at this layer is very important and essential. There are many greater numbers of application layers protocols for different IOT applications.

5 Read more

Analysis of 5G Mobile Technologies and DDOS Defense

Analysis of 5G Mobile Technologies and DDOS Defense

In this paper we've planned 5G System architecture that is that the main contribution of the paper. There are many enhancements from 1G, 2G, 3G, and 4G to 5G within the world of telecommunications. Photonics is that the basic technology for several of the photonic parts and modules mentioned during this paper: integrated transceivers, photonic switches for transport and for data centers. NOMA in this article the superior spectral potency of noma is very promising for 5G radio access. The application of noma is additionally penetrable into different communication systems, as well as mmWave and visual light-weight systems. The potential of noma isn't restricted to only SISO systems; its capability will be additional increased by applying noma in MIMO systems. 5G can use mobile clouds, SDN and NFV to fulfill the challenges of huge property, flexibility, and costs. With all the benefits, these technologies even have inherent security challenges. Therefore, during this paper we've got highlighted the most security challenges which will become additional threatening in 5G, unless properly addressed. We've got additionally given the security mechanisms and solutions for those challenges

7 Read more

The challenges of balancing safety and security in implantable medical devices

The challenges of balancing safety and security in implantable medical devices

Implantable medical devices, or IMDs, are widely used to improve patient outcomes in presence of numerous conditions as well as contribute to the quality of life. They also enable authorised medical staff to extract useful data regarding the health of the patient for a given period of time. Modern versions of IMDs increasingly offer many of their functions, based on software implementation (e.g. software control of pacemakers). Use of software has also enabled medical device manufacturers to offer more complex functions, as well as features that increase the usability of the device. For example, wireless control of the device, mobile based interfaces, bluetooth enabled data collection, as well as automated update of the software, without the need for a special procedure. IMDs pose numerous challenges to developers with regard to their safety (i.e. harm to patient) as well as security (i.e. breach of privacy, device malfunction due to malicious attacks etc.). Safety of the devices is an intuitive attribute, as an IMD operating in an unintended way, may cause direct harm to the patient. Furthermore, security attacks to the patient can result in loss of privacy of the patient (e.g. loss of their data) or loss of control of the device, which could effectively lead to unintended operation of the IMD. There are numerous reports from researchers, who have managed to breach the security of an IMD [1]. Although the benefits from using IMDs currently far outweigh security risks the ever-increasing connectivity of IMDs will make them vulnerable to potentially more subtle security attacks. There are still security challenges to be overcome to address contemporary security risks [2] with one of the more complex issues being where the design of security measures might be in conflict with safety requirements to the possible detriment of patient health [3].

5 Read more

1.
													An analytical approach to enhance the intrusion detection in internet of things network

1. An analytical approach to enhance the intrusion detection in internet of things network

possible to connect and access every device through the Internet. Billions of devices are connecting and the count is increasing. IoT essentially constitutes several smart devices that widely vary in size, complexity, and usage. IoT is driving the world towards a new era and it is changing the way of our lives. Even though this superior connectivity will certainly improve our quality of life, it also nurtures severe security and fidelity problems. IoT objects have limited resources which complicates in applying conventional security practices and they are more vulnerable to critical attacks like Denial-of-Service attack, eavesdropping, sinkhole attack, etc. This paper surveys on latest security features and solutions of IoT and also analyses several security challenges that are to be taken into consideration while enhancing the security of IoT. In the coming future, IoT will be the key hub to connect several smart objects that are with different technologies and allowing various applications to interact with them in a safe manner is the main focus of researchers. To enhance the security and to provide efficient intrusion detection in IoT network, we propose an architecture with a possible usage of single board computer like Raspberry Pi and Snort, an open-source intrusion detection tool. We also discuss some potential directions to deploy the enhanced Snort on Raspberry Pi device.

10 Read more

A Brief Review on Cloud Security Scenarios

A Brief Review on Cloud Security Scenarios

Today cloud computing is the most promising technology that allows the users to access the data from anywhere despite of storage issue. It is a public environment for sharing resources, as services via the internet. It provides a high security, virtualization, abstraction, online storage and scalability. Its applications were widely employed both in business and academics. Cloud computing focus mainly on three types of services viz SaaS, PaaS and IaaS. Security issues are with increase in use of cloud. Some security aspects such as multi- tenancy, flexibility, loss of control, loss of data, hacker attacks like irtual threats predominantly gets attention. This paper will picturize a brief view of the current cloud security challenges and risks and also imparting the existing methodologies done by the researchers for cloud security. It is specially suggested as suitable for beginners pursuing their research in cloud security domain to find the basic research problems regarding security and issues found in cloud security.

5 Read more

INFLUENCE OF GLOBAL SECURITY ENVIRONMENT
ON COLLECTIVE SECURITY AND DEFENCE SCIENCE

INFLUENCE OF GLOBAL SECURITY ENVIRONMENT ON COLLECTIVE SECURITY AND DEFENCE SCIENCE

A globalised world requires an adequate response to contemporary security threats. The position of small post-communist countries is obsolete, economically and geopolitically approved, with mandatory developed legitimacy and legality procedures. Safety assessments are not limited to the identification of potential military threats in the future but are also focused on the comprehensive analysis of trends in the areas of importance for the global, regional and national security. Contemporary understanding of security put in front of the armed forces requires the development of additional abilities for adequately responding to asymmetric and hybrid threats. Defence sciences are expected to indicate ways of responding to the contemporary forms of the identified threats to national and global interdependence caused by the transnational and supranational approach to all segments of society and global security threats. This approach also includes the provision of an adequate scientific base to support the contemporary struggle against new threats. The harmonisation of classical and contemporary approaches to defence science should promote the development of a new theoretical view of globalisation, as well as the applicability of a response to the fight against contemporary security challenges, risks, and threats. In the development and reaffirmation of defence science, it is necessary to generate ideas, stimulate an analytical approach, encourage critical thinking and conduct expert discussions on all aspects of adapting to new security challenges and security and defence aspects of foreign policy, international relations, military cooperation, military technology transfer, etc.

16 Read more

CYBER SECURITY -Trends and Challenges

CYBER SECURITY -Trends and Challenges

Abstract : Cybersecurity is a necessary consideration for information technology as well as Internet services. We need to recognize the importance of different types of risks that exist in the online world Enhancing cyber security and protecting critical information are essential to nation's security and economic being. Whenever we think about the cyber security we think of „cyber-crime‟ which is increasing day by day. Various Governments and companies are taking many measures to prevent the cyber-crime. This paper mainly focuses on trends, challenges and cyber ethics in the field of cyber security. Cyber incidents emphasize the importance of staying up-to-date on global cybercrime trends, especially concerning the use of mobile and personal computing devices.

5 Read more

Towards Achieving Data Security with the Cloud Computing Adoption Framework

Towards Achieving Data Security with the Cloud Computing Adoption Framework

Descriptions in Section 3 present how to deal with mali- cious files and unauthorized access in each layer of CCAF security. Our CCAF proposal can also illustrate the inte- grated approach which checks all layers in one go. This is an important step due to the following reasons. First, the insider threat is an issue if the leaving employees or someone with a good knowledge of the security system can find ways to sneak through the security check [25]. Second, each layer has its own “gatekeeper” for security. There is a possibility that well-written malicious code, either disguised as safe files or disguised as part of the system files, can impose a security risk if there is no final check of the entire system. Third, often the Data Center Cloud systems serve hundreds and thousands of users and have a large number and volume of data possibly at petabytes. The security system needs to check all the sta- tus of the data and check that whether the real-time secu- rity can be offered for Data services if that includes petabytes of data, and when the data is in use. In other words, we need an intelligent way to find out how to manage such a huge amount of data has been in used and in client-server requests at all times. More details will be presented in the following section.

15 Read more

Issues and Challenges in Mobile Security

Issues and Challenges in Mobile Security

Mobile technologies have evolved beyond recognition since the first radio signals were transmitted by pioneers including Nikola Tesla and Guglielmo Marconi in the late nineteenth century. The advent of mobile phones and similar devices has transformed business and social interactions. Today, many of us use mobile access to the internet to communicate in real time across the globe, to access business and government services online, to shop, view, read, search, explore and even simulate physical activities. Internet access no longer depends on a wired system such as a modem connected to a telephone landline rather, it can be achieved using a mobile enabled device whenever and wherever a mobile access point is available. Wireless communication has become the breath and soul of technologies in today’s fast emerging world. The strong demand of mobile applications and services raised increasing concerns on the security for mobile accesses, user privacy, and mobile applications. This leads an increasing demand on emerging mobile security technologies and solutions for mobile accesses.

6 Read more

The Challenges of Food Security in Nigeria

The Challenges of Food Security in Nigeria

The Nigerian government has come up with various strategies to improve the situation. Efforts are now been made to restore agriculture back to its original status before the oil boom and stamping out food insecurity [29]. Several policies and initiatives are now being developed with the aim of providing efficient framework to address food insecurity and malnutrition in Nigeria [9]. In the early 70s, during the military regime, Gen. Yakubu Gowon government out of desperation embarked on a gargantuan importation of rice to alleviate hunger. Unfortunately, the Nigerian ports did not have sufficient facilities to manage such elaborate importation project that later came to be known as the Rice Amada . The ports became choked with rice so much that a committee had to be set up to enable the decongestion of the Port. Despite this effort by the govern- ment, the massive amount of imported rice could not solve the long term food insecurity challenges; rather, a comprehensive and inclusive agricultural policy was needed [29].

22 Read more

Title: Study of Security Issues in Cloud Computing

Title: Study of Security Issues in Cloud Computing

Cloud computing is an immense prospect both for the businesses and the attackers – both parties be able to have their own reward from cloud computing. An infinite possibilities of cloud computing cannot be unseen only for the security issues reason – the unending analysis and research for robust, regular and integrated security models for cloud computing might be the only path of inspiration. Based on this fact that the impact of security issues in cloud computing can be decrease by multi-tenancy architecture.

5 Read more

Significantly Extending the Network Lifetime by Using Secure and Energy Efficient Protocol

Significantly Extending the Network Lifetime by Using Secure and Energy Efficient Protocol

In wireless sensor networks, we have lots of problems during data transmission. We focused in this thesis security and sensor node energy consumption challenges which are major challenges in current wireless networks. But, uniform power deployment approach isn't always suitable to the prevailing wi-fi sensor nodes and on this paper we're providing a secure and power efficient protocol which is called Cost-Aware Secure Routing Protocol. By implementing this protocol, we can achieve the high message delivery ratio along with security. This proposed protocol will utilize two parameters such as 1) Energy Balance Control & 2) Secure random Walk. These two are used to beat the existing disputes such as security and network life span optimization.

6 Read more

The tuning of error signal for back-propagation algorithms

The tuning of error signal for back-propagation algorithms

Grid computing means a multiple independent computing, because it is composed of resource nodes not located within a single administrative domain. The goal of grid is to only provide secure grid service resources to legal users. Even though grid computing is more than just a technology to abet high performance computing, it is still have some issues to concerns and cares. One of the issues is security issues. Authentication is important part in grid security. Other process in grid are depends on authentication. The aim of this project is to enhance the method of password based authentication scheme and to get better password based authentication scheme in grid computing environment through its time complexity. In this project, the study is done on the existing grid security infrastructure and existing password based authentication scheme. Password Enable Certificate Free Grid Security Infrastructure (PECF-GSI) and A Simple User

13 Read more

Implementing and Verifying a Secure M2m Mutual Authentication Protocol Based on Hash Functions

Implementing and Verifying a Secure M2m Mutual Authentication Protocol Based on Hash Functions

The rapid advancement of network technology has increased the access to superfast communication networks, engendering a range of services and businesses and enabling large amounts of information processing [3,4]. Currently, M2M(Machine To Machine) communication networks are intelligent enough to allow automatic inter-device communication without a direct human intervention, accumulate information and accordingly respond to situations by, say, sounding an alarm. Still, many researchers have dealt with security issues arising in diverse settings of M2M systems in practice [5,6,7]. In M2M environment, wireless communication is needed with devices located in remote areas or where humans cannot access. When infiltrators eavesdrop on any vulnerable and insecure wireless communication, they are highly likely to gather and analyze the communication data for replay attacks and other malicious attempts [8,9]. To address such challenges, the hash lock protocol has been proposed. Yet, tag data may be exposed to spoofing and replay attacks and location tracking Revised Manuscript Received on May 22, 2019.

5 Read more

Show all 10000 documents...

Related subjects