• No results found

Security Challenges and the problems of internal security

CHALLENGES TO BORDER MANAGEMENT: FOCUSING ON GEOGRAPHIC, DEMOGRAPHIC INFRASTRUCTURAL AND DEMARCATION CHALLENGES

CHALLENGES TO BORDER MANAGEMENT: FOCUSING ON GEOGRAPHIC, DEMOGRAPHIC INFRASTRUCTURAL AND DEMARCATION CHALLENGES

... The internal security environment is prone to swift changes which suggest that merely policing the border will not solve the problems which are faced in the management of International ...

10

Security in cognitive wireless sensor networks  Challenges and open problems

Security in cognitive wireless sensor networks Challenges and open problems

... Node-targeted attacks need more attention that in a normal WSN because of the propagation of information is more important for the correct working of CWSN. A node can be captured [32,33] and attackers use reverse- ...

8

CPEC Investment Opportunities and Challenges in Pakistan

CPEC Investment Opportunities and Challenges in Pakistan

... infrastructural problems in Khyber Pakhtunkhwa and Baluchistan, which can hider development of ...CPEC. Internal security situation is also an issue, whereby terrorism has caused serious damage to ...

6

Title: A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Government Cloud Environment

Title: A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Government Cloud Environment

... Abstract: Cloud computing is next generation technology. It takes the technology, services, and applications that are akin to the raised mentioned on the Internet and swings them into a buffet utility. It is the ...

5

Analysis of 5G Mobile Technologies and DDOS Defense

Analysis of 5G Mobile Technologies and DDOS Defense

... the challenges of huge property, flexibility, and ...most security challenges which will become additional threatening in 5G, unless properly ...the security mechanisms and solutions for those ...

7

A Brief Review on Cloud Security Scenarios

A Brief Review on Cloud Security Scenarios

... basic security concepts are breifly explained in this research ...various security mechanisms used for the data protection, in cloud computing done by various researchers all over the ...

5

Meeting the challenge of food and energy security

Meeting the challenge of food and energy security

... Since the early 1990s, several initiatives, such as the Energy Crops Scheme (ECS), have encouraged the planting of a range of energy crops around the UK and other European countries, while in the USA traditional forage ...

9

Maritime Security Challenges in the Indo-Pacific Region

Maritime Security Challenges in the Indo-Pacific Region

... regional security system in ...and security structure including natural resources and environmental changes in the Indo-Pacific ...maritime security challenges in the Indo-Pacific relations in ...

6

Hack Proofing Your Network pdf

Hack Proofing Your Network pdf

... IT problems, secu- rity or otherwise, can you use this type of technique for? I’ve used it for password recovery/bypass, licensing/copy protection bypass, fixing cor- rupt files or drives, and change ...

495

Trigger for Monitoring, Tracking & Database Security – From Theory to Practice

Trigger for Monitoring, Tracking & Database Security – From Theory to Practice

... database security and transactional Security ...Database Security that prevent users to logon after business ...Transactional Security process prevent users to perform invalid transaction into ...

6

A Security Analysis of GSM Security Using ECC Technique

A Security Analysis of GSM Security Using ECC Technique

... these security flaws are not completely effective. To address these security issues the Elliptic Curve Cryptology which is characterized by efficiency both in key sizes and speed performance, are favored ...

8

SOCIAL MEDIA AND THE CHALLENGES OF SECURITY INFORMATION MANAGEMENT AMONG COMPANIES IN LAGOS STATE, NIGERIA

SOCIAL MEDIA AND THE CHALLENGES OF SECURITY INFORMATION MANAGEMENT AMONG COMPANIES IN LAGOS STATE, NIGERIA

... on challenges social media represents for companies identified internal and external challenges similar to those identified by the above presented authors’ ...findings. Internal ...

13

OVERVIEW OF CLOUD COMPUTING, SECURITY AND RESEARCH CHALLENGES

OVERVIEW OF CLOUD COMPUTING, SECURITY AND RESEARCH CHALLENGES

... limitations such high energy expense and high initial investment for constructing data centers. Recent work [53, 51] suggests that small size data centers can be more advantageous than big data centers in many cases: a ...

22

Security Policy and Developments in Central Asia: Security Documents Compared with Security Challenges

Security Policy and Developments in Central Asia: Security Documents Compared with Security Challenges

... CA security policy and or corresponding organization does not ...current security settings of CSTO and SCO, which saves them from organizing their own collective security ...multilateral ...

19

Index Terms - Security challenges, Infrastructure security, Data

Index Terms - Security challenges, Infrastructure security, Data

... Extra security equipment or software such as firewalls and proxy servers can sentinel against downtime and unreachable data due to maleficent actions such as denial-of-accommodation (DoS) attacks and network ...

5

INDIA’S CHALLENGES TO ENERGY SECURITY: THE GROWING INTERNATIONAL IN SECURITY?

INDIA’S CHALLENGES TO ENERGY SECURITY: THE GROWING INTERNATIONAL IN SECURITY?

... efficiency in energy extraction, conversion, transportation, and distribution and second one, being end-use (or demand side) energy efficiency i.e. more efficient use of [r] ...

22

SECURITY PROBLEMS AND POSSIBLE SECURITY APPROACHES IN CLOUD COMPUTING

SECURITY PROBLEMS AND POSSIBLE SECURITY APPROACHES IN CLOUD COMPUTING

... several security challenges including security ...end-to-end security. So security issues for cloud are ...storage security, data security, network security and ...

7

REVIEW ON THREATS IN IOT SECURITY.								
								
								     
								     
								   

REVIEW ON THREATS IN IOT SECURITY.      

... contains security issues assert and ...factor, security issues and challenges in Indian ...privacy, security, authentication, backup and recovery from ...IOT security threats and ...

5

REMOTE MIRRORING: A DISASTER RECOVERY TECHNIQUE IN CLOUD COMPUTING

REMOTE MIRRORING: A DISASTER RECOVERY TECHNIQUE IN CLOUD COMPUTING

... Over time, your organization will evolve. Applications will be added, enhanced or abandoned; offices will open and close; new technologies and formats will emerge. Moving forward, many cloud providers will likely be on ...

10

Towards Achieving Data Security with the Cloud Computing Adoption Framework

Towards Achieving Data Security with the Cloud Computing Adoption Framework

... Cloud security under the CCAF ...Computer security has been classified into a number of general concepts and processes such as identification, which identifies objects, functions, and ac- tions, ...

15

Show all 10000 documents...

Related subjects