• No results found

[PDF] Top 20 Honeypots and honeynets: issues of privacy

Has 10000 "Honeypots and honeynets: issues of privacy" found on our website. Below are the top 20 most common "Honeypots and honeynets: issues of privacy".

Honeypots and honeynets: issues of privacy

Honeypots and honeynets: issues of privacy

... In situations when the data transfer is not prescribed by the law, it is necessary to rely on different provi- sions. In case of data transfer within the borders of the European Union, the European Free Trade Area, and ... See full document

9

HONEYPOTS DEPLOYMENT STRATEGIES AND LEGAL ISSUES

HONEYPOTS DEPLOYMENT STRATEGIES AND LEGAL ISSUES

... Privacy is relative here. As there are several levels of interactions honeypots, the information that is gained is also relative. Higher level of interaction means more security risks but more data we can ... See full document

7

Security and Privacy Issues with IoT in Healthcare

Security and Privacy Issues with IoT in Healthcare

... created honeypots, which are special servers that appears as medical ...these honeypots, they found that attackers managed to authenticate via SSH on these fake medical devices over 55,000 times, they even ... See full document

7

Recommending privacy preferences in location sharing services

Recommending privacy preferences in location sharing services

... The unwillingness to manually configure location-privacy settings is a typical information over- load problem [87]. When being given too many choices, people have difficulty to do it accurately, as their ... See full document

148

An Enhanced Protocol H-Tooth for Opportunistic Computing Followed in Body Sensor Networks

An Enhanced Protocol H-Tooth for Opportunistic Computing Followed in Body Sensor Networks

... (HEALTH TOOTH) framework can achieve the efficient user-centric privacy access control. In addition, through extensive performance evaluation, also demonstrated the proposed H-TOOTH (HEALTH TOOTH) framework can ... See full document

6

A Research on Security, Privacy Issues and Privacy Preserving Techniques   Big Data

A Research on Security, Privacy Issues and Privacy Preserving Techniques Big Data

... Privacy is in arms of the individuals and to ensure about what facts to be shared, and additionally need to have manage on it. If the statistics is in public domain names then it is truly a risk [8] to person ... See full document

6

Health informatics: an intercultural perspective

Health informatics: an intercultural perspective

... may affect their behaviours and attitudes towards health issues and health care, particularly in relation to privacy, confidentiality and data security.. As privacy and confidentiality a[r] ... See full document

7

A survey on privacy issues in digital forensics

A survey on privacy issues in digital forensics

... Table 1 signifies the shift of research focus when it comes to preserving privacy. It is rather evident that the current focus of forensics and security solutions are now more towards databases and networking with ... See full document

14

Issues of Privacy in Social Networking Sites

Issues of Privacy in Social Networking Sites

... Some of the users exhibited that there are some rule security issues in informal organization like Facebook. For example, Users utilized their genuine data to make a record profile to whatever remains of the ... See full document

5

Security And Privacy Issues In Cloud Computing

Security And Privacy Issues In Cloud Computing

... International Journal of Scientific Research in Computer Science, Engineering and Information Technology CSEIT172482 | Received 18 July 2017 | Accepted 29 July 2017 | July August 2017 [(2)4 274 279] I[.] ... See full document

6

Privacy and Confidentiality Issues in Healthcare Databases

Privacy and Confidentiality Issues in Healthcare Databases

... The data in the electronic health records in clinical database can be used for research purpose or by government organizations in the form of consolidated reports for analysis purpose. Such consolidated reports provide ... See full document

6

Drones and the Fourth Amendment: Redefining Expectations of Privacy

Drones and the Fourth Amendment: Redefining Expectations of Privacy

... “drag privacy law into the twenty-first century”); Roberts, supra note 27, at 516 (arguing that the Fourth Amendment provides few protections against the government’s use of drones for surveillance and that ... See full document

44

Challenges, Issues, Security And Privacy Of Big Data

Challenges, Issues, Security And Privacy Of Big Data

... Big data is a huge amount of data which generates heterogeneous data at high speed in usage of social media, weather forecasting, health data, industry data, space, air traffic control, science, nuclear, satellite data, ... See full document

5

Public Awareness of Data Protection and Privacy Issues

Public Awareness of Data Protection and Privacy Issues

... A new question was introduced in 2005 about privacy issues when using the Internet. These questions reflect high levels of don’t know, suggesting that for a proportion of people using the internet is still ... See full document

15

Privacy, security, and trust issues in smart environments

Privacy, security, and trust issues in smart environments

... After we examined some of the influential trust management approaches, it is clear that there are some problems remaining to be addressed. In the systems considered, problems arise due to reliance on a global view of the ... See full document

18

Privacy and Security of Big Data Mining Issues

Privacy and Security of Big Data Mining Issues

... Next, two different use cases were presented. Both of the use-cases present some directions that contribute to solving part of the large Big Data security and privacy puzzle. In the first use-case it was presented ... See full document

9

Big Data Security and Privacy: A Review on Issues, Challenges and Privacy Preserving Methods

Big Data Security and Privacy: A Review on Issues, Challenges and Privacy Preserving Methods

... of privacy protection by preventing re-identification, which makes highly accurate and secured data ...This privacy model is used to prevent linking attacks ... See full document

6

Index Terms - Security challenges, Infrastructure security, Data

Index Terms - Security challenges, Infrastructure security, Data

... security issues were not contemplated when Astronomically Immense Data was initially ...to privacy, but privacy it is not the only security quandary that can be found in a Immensely colossal Data ... See full document

5

Honeypots pdf

Honeypots pdf

... los honeypots es simple: mostrar a los ata- cantes un sistema virtual que parezca el sistema real, de esa manera los ataques se efectuarán sobre ese sistema sin cau- sar ningún daño al sistema ... See full document

6

Privacy and security issues in cloud Computing

Privacy and security issues in cloud Computing

... Cloud computing is a growing area of concern in the IT security community. Basically, cloud computing is storing the data on someone else’s computer and accessing it via a network. Many companies, such as Google.com, ... See full document

5

Show all 10000 documents...