Measures of Safety and Security Number of incidents per day in patient room, ward, or hospital. Non-emergency calls to nurses and doctors due to malfunctions, failures, or intrusions. False fire alarms, smoke detectors, pagers activation. Wrong information, data values, lost or delayed messages. Timeliness, Accuracy, Precision.
9 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1385 | Lượt tải: 0
DRM in the Enterprise Protect certain types of private information. Example The Health Insurance Portability and Accountability Act(HIPAA) requires that companies protect personal medical records. The Sarbanes-Oxley Act(SOA) requires that companies must preserve certain documents, such as information that might be relevant to “insider trading” ...
45 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1675 | Lượt tải: 0
Oracle Objects are databases, tables, views, etc. Operations: Select, Insert, Update, Delete, Alter, Index and Reference on tables. Select, Insert, Update and Delete on views. Execute privilege on procedures. Grant option is available.
41 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1450 | Lượt tải: 0
Social engineering is the name given to a category of security attacks in which someone manipulates others into revealing information that can be used to steal data, access to systems, access to cellular phones, money,or even your own identity. Social engineering is the acquisition of sensitive information or inappropriate access privileges by an ...
67 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1458 | Lượt tải: 0
Summary Cryptography-related concepts (symmetric/asymmetric techniques, digital signatures, PKI, ) Key channel establishment for symmetric cryptosystems Perfect encryption Dolev-Yao threat model Protocol “message authentication” Protocol “challenge-response“ Public-key cryptosystems
57 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1483 | Lượt tải: 0
User Access A user can only access data within the range of his or her own label authorizations A user has: maximum and minimum levels a set of authorized compartments a set of authorized groups a specification of read-only access (or read/write) access for each compartment and group How to map user label and data label?
51 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1616 | Lượt tải: 0
DAC & INFORMATION FLOW CONTROLS Inherent weakness of DAC: Unrestricted DAC allows information from an object which can be read by a subject to be written to any other object Bob is denied access to file A, so he asks cohort Alice to copy A to B that he can access Suppose our users are trusted not to do this deliberately. It is still po...
40 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1405 | Lượt tải: 0
Bird’s Eye View of Research Research integrates ideas from: Cooperative information systems Collaborations Privacy, trust, and information theory General privacy solutions provided Example applications studied: Location-based routing and services for wireless networks Electronic supply chain management systems Applicability to: Ad hoc net...
67 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1291 | Lượt tải: 0
Bài báo đề xuất 5 thuật toán mật mã khóa công khai được phát triển dựa trên hệ mật ElGamal, các thuật toán này có thể bảo đảm đồng thời 2 khả năng bảo mật và xác thực nguồn gốc thông tin. Hơn nữa, mức độ an toàn của các thuật toán được đề xuất ở đây không nhỏ hơn mức độ an toàn của thuật toán El Gamal xét theo khả năng chống thám mã khi tấn công tr...
7 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1437 | Lượt tải: 0
This paper proposes the method of developing digital signature scheme based on the discrete logarithm problem by developing a generalized schema, thereby developing some schema that can be applied in practice. The safety level of the new proposed schema is evaluated by the difficulty level of the discrete logarithm problem. However, it is important...
8 trang | Chia sẻ: vutrong32 | Ngày: 17/10/2018 | Lượt xem: 1454 | Lượt tải: 0