首页 > 最新文献

2010 Information Security for South Africa最新文献

英文 中文
Privacy: Aspects, definitions and a multi-faceted privacy preservation approach 隐私:方面,定义和多方面的隐私保护方法
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588297
K. Renaud, Dora Galvez-Cruz
There are many different definitions and understandings of the concept of privacy. Here we bring all the different aspects of privacy together and propose a comprehensive definition thereof. We also introduce the three different approaches to privacy preservation, and propose a comprehensive and multi-faceted approach in order to gain from the benefits of each and maximise privacy protection. We report on the evaluation of a prototype of such a privacy protective shopping environment.
对隐私的概念有许多不同的定义和理解。在这里,我们将隐私的所有不同方面结合在一起,并提出一个全面的定义。我们亦会介绍三种不同的保障私隐方法,并建议一种全面和多方面的方法,以便从每一种方法的好处中获益,并最大限度地保障私隐。我们报告了对这种隐私保护购物环境原型的评估。
{"title":"Privacy: Aspects, definitions and a multi-faceted privacy preservation approach","authors":"K. Renaud, Dora Galvez-Cruz","doi":"10.1109/ISSA.2010.5588297","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588297","url":null,"abstract":"There are many different definitions and understandings of the concept of privacy. Here we bring all the different aspects of privacy together and propose a comprehensive definition thereof. We also introduce the three different approaches to privacy preservation, and propose a comprehensive and multi-faceted approach in order to gain from the benefits of each and maximise privacy protection. We report on the evaluation of a prototype of such a privacy protective shopping environment.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Towards a framework to guide compliance with IS security policies and regulations in a university 建立一个指导大学遵守信息系统安全政策和法规的框架
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588651
M. Kyobe
Compliance with computer security policies and legislation is critical to educational institutions today. Universities offer Internet services to users, store personal information of learners, staff, conference and attendees. which exposes them to potential risks and legal liabilities. Failure to ensure compliance with information security laws poses significant financial and reputation risk and may invite serious scrutiny of university activities by law enforcement bodies [24]. While universities have sought various measures to achieve compliance (e.g. self-regulations, security policies, staff/student handbooks, public relation campaigns, Web and email reminders and audits.), these have had limited success in influencing user behaviours. The rate of electronic abuse and lack of compliance with policies is simply on the rise. The August 2009 EDUCAUSE Review indicates that security remains one of the top strategic issues facing higher education institutions [2]. [20] claims that half of all personal identity breaches occur in higher education. The recording industry and motion picture associations are increasingly holding institutions liable for illegal downloading of copyright materials [11] and students have also been accused of privacy violations [8]. So, what makes compliance with policies and regulations in universities difficult and how can compliance be measured and achieved effectively? This study examines the factors that influence compliance with security policies and regulations in universities. First, some key regulations governing information security in South Africa are introduced, followed by a review of the security environment and compliance behaviours in universities. A framework aligning regulatory requirements with control standards is developed to guide compliance behaviours in universities.
遵守计算机安全政策和法规对当今的教育机构至关重要。大学为用户提供互联网服务,存储学习者、员工、会议和与会者的个人信息。这使他们面临潜在的风险和法律责任。未能确保遵守信息安全法律将带来重大的财务和声誉风险,并可能招致执法机构对大学活动的严格审查[24]。虽然大学已经寻求各种措施来实现遵守(例如,自我规范、安全政策、教职员工/学生手册、公共关系运动、网络和电子邮件提醒和审计),但这些措施在影响用户行为方面取得的成功有限。滥用电子产品和不遵守政策的比率正在上升。2009年8月的EDUCAUSE审查表明,安全仍然是高等教育机构面临的首要战略问题之一[2]。[20]声称有一半的个人身份泄露发生在高等教育中。唱片业和电影协会越来越多地要求机构对非法下载版权材料负责[11],学生也被指控侵犯隐私[8]。那么,是什么使得高校很难遵守政策法规?如何有效地衡量和实现这些政策法规?本研究探讨了影响高校遵守安全政策法规的因素。首先,介绍了管理南非信息安全的一些关键法规,然后对大学的安全环境和合规行为进行了审查。制定了将监管要求与控制标准结合起来的框架,以指导大学的合规行为。
{"title":"Towards a framework to guide compliance with IS security policies and regulations in a university","authors":"M. Kyobe","doi":"10.1109/ISSA.2010.5588651","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588651","url":null,"abstract":"Compliance with computer security policies and legislation is critical to educational institutions today. Universities offer Internet services to users, store personal information of learners, staff, conference and attendees. which exposes them to potential risks and legal liabilities. Failure to ensure compliance with information security laws poses significant financial and reputation risk and may invite serious scrutiny of university activities by law enforcement bodies [24]. While universities have sought various measures to achieve compliance (e.g. self-regulations, security policies, staff/student handbooks, public relation campaigns, Web and email reminders and audits.), these have had limited success in influencing user behaviours. The rate of electronic abuse and lack of compliance with policies is simply on the rise. The August 2009 EDUCAUSE Review indicates that security remains one of the top strategic issues facing higher education institutions [2]. [20] claims that half of all personal identity breaches occur in higher education. The recording industry and motion picture associations are increasingly holding institutions liable for illegal downloading of copyright materials [11] and students have also been accused of privacy violations [8]. So, what makes compliance with policies and regulations in universities difficult and how can compliance be measured and achieved effectively? This study examines the factors that influence compliance with security policies and regulations in universities. First, some key regulations governing information security in South Africa are introduced, followed by a review of the security environment and compliance behaviours in universities. A framework aligning regulatory requirements with control standards is developed to guide compliance behaviours in universities.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128872259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards security effectiveness measurement utilizing risk-based security assurance 利用基于风险的安全保障实现安全有效性度量
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588322
R. Savola, Heimo Pentikäinen, Moussa Ouedraogo
Systematic and practical approaches to risk-driven operational security evidence help ensure the effectiveness and efficiency of security controls in business-critical applications and services. This paper introduces an enhanced methodology to develop security effectiveness metrics that can be used in connection with correctness assurance of security controls. This methodology is then applied to an example system: a Push E-mail service. The methodology is based on threat and vulnerability analysis, and parallel security requirement and system architecture decomposition.
风险驱动的操作安全证据的系统和实用方法有助于确保关键业务应用程序和服务中的安全控制的有效性和效率。本文介绍了一种增强的方法来开发安全有效性度量,该度量可用于安全控制的正确性保证。然后将此方法应用于示例系统:推送电子邮件服务。该方法基于威胁和漏洞分析,以及并行的安全需求和系统架构分解。
{"title":"Towards security effectiveness measurement utilizing risk-based security assurance","authors":"R. Savola, Heimo Pentikäinen, Moussa Ouedraogo","doi":"10.1109/ISSA.2010.5588322","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588322","url":null,"abstract":"Systematic and practical approaches to risk-driven operational security evidence help ensure the effectiveness and efficiency of security controls in business-critical applications and services. This paper introduces an enhanced methodology to develop security effectiveness metrics that can be used in connection with correctness assurance of security controls. This methodology is then applied to an example system: a Push E-mail service. The methodology is based on threat and vulnerability analysis, and parallel security requirement and system architecture decomposition.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125505779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The cost of observation for intrusion detection: Performance impact of concurrent host observation 入侵检测的观察代价:并发主机观察对性能的影响
Pub Date : 2010-09-30 DOI: 10.1109/ISSA.2010.5588311
Mark M. Seeger, S. Wolthusen, C. Busch, Harald Baier
Intrusion detection relies on the ability to obtain reliable and trustworthy measurements, while adversaries will inevitably target such monitoring and security systems to prevent their detection. This has led to a number of proposals for using coprocessors as protected monitoring instances. However, such coprocessors suffer from two problems, namely the ability to perform measurements without relying on the host system and the speed at which such measurements can be performed. The availability of smart, high-performance subsystems in commodity computer systems such as graphics processing units (GPU) strongly motivates an investigation into novel ways of achieving the twin objectives of self-protected observation and monitoring systems and sufficient measurement frequency. This, however, gives rise to performance penalties imposed by memory synchronization particularly in non-uniform memory architectures (NUMA) even for the case of direct memory access (DMA) transfers. Based on prior work detailing a cost model for synchronization of memory access in such advanced architectures, we report an experimental validation of the cost model using an IEEE 1394 DMA bus mastering environment, which provides full access to the measurement target's main memory and involves multiple bus bridges and concomitant synchronization mechanisms. We observed up to 25% performance degradation, highlighting the need for efficient sampling strategies for both, memory size and a preference for quiescent data structures for monitoring executed by off-host devices.
入侵检测依赖于获得可靠和可信测量的能力,而攻击者将不可避免地针对此类监控和安全系统来阻止他们的检测。这导致了许多使用协处理器作为受保护监视实例的建议。然而,这种协处理器有两个问题,即在不依赖于主机系统的情况下执行测量的能力,以及执行这些测量的速度。商用计算机系统中智能、高性能子系统的可用性,如图形处理单元(GPU),强烈激发了对实现自我保护观察和监控系统以及足够测量频率的双重目标的新方法的研究。然而,这导致了内存同步带来的性能损失,特别是在非统一内存体系结构(NUMA)中,甚至对于直接内存访问(DMA)传输也是如此。基于先前的工作,详细介绍了在这种先进架构中存储器访问同步的成本模型,我们报告了使用IEEE 1394 DMA总线控制环境对成本模型的实验验证,该环境提供了对测量目标主存储器的完全访问,并涉及多个总线桥接和伴随的同步机制。我们观察到高达25%的性能下降,强调需要有效的采样策略,内存大小和对非主机设备执行的监视的静态数据结构的偏好。
{"title":"The cost of observation for intrusion detection: Performance impact of concurrent host observation","authors":"Mark M. Seeger, S. Wolthusen, C. Busch, Harald Baier","doi":"10.1109/ISSA.2010.5588311","DOIUrl":"https://doi.org/10.1109/ISSA.2010.5588311","url":null,"abstract":"Intrusion detection relies on the ability to obtain reliable and trustworthy measurements, while adversaries will inevitably target such monitoring and security systems to prevent their detection. This has led to a number of proposals for using coprocessors as protected monitoring instances. However, such coprocessors suffer from two problems, namely the ability to perform measurements without relying on the host system and the speed at which such measurements can be performed. The availability of smart, high-performance subsystems in commodity computer systems such as graphics processing units (GPU) strongly motivates an investigation into novel ways of achieving the twin objectives of self-protected observation and monitoring systems and sufficient measurement frequency. This, however, gives rise to performance penalties imposed by memory synchronization particularly in non-uniform memory architectures (NUMA) even for the case of direct memory access (DMA) transfers. Based on prior work detailing a cost model for synchronization of memory access in such advanced architectures, we report an experimental validation of the cost model using an IEEE 1394 DMA bus mastering environment, which provides full access to the measurement target's main memory and involves multiple bus bridges and concomitant synchronization mechanisms. We observed up to 25% performance degradation, highlighting the need for efficient sampling strategies for both, memory size and a preference for quiescent data structures for monitoring executed by off-host devices.","PeriodicalId":423118,"journal":{"name":"2010 Information Security for South Africa","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2010 Information Security for South Africa
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1