共查询到20条相似文献,搜索用时 15 毫秒
1.
一种针对嵌入式远程升级安全的存储解决方案 总被引:2,自引:0,他引:2
针对嵌入式远程升级面临的boot功能以及存储器的限制,重点分析了ARM7工控设备在远程升级过程中面临的升级失败问题,提出一种基于分散加载技术的“双系统”存储体系结构,并详细阐述了“双系统”存储结构解决升级失败问题的原理。最后通过一组实验数据证明了其保证远程升级安全的效果。 相似文献
2.
Fred Cohen 《Network Security》1998,1998(10):10-14
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
3.
4.
陈鹏 《网络安全技术与应用》2014,(7):120-120
随着科学技术和网络信息技术的飞速发展,越来越多的网络信息安全问题逐渐出现.本文主要研究了网络信息安全和网络安全之间的关系,并且对如何创造安全的网络环境提出了几点建议. 相似文献
5.
6.
Fred Cohen 《Network Security》1999,1999(4):6-13
Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
7.
8.
9.
Syed Rizvi Jungwoo Ryoo John Kissell William Aiken Yuhong Liu 《The Journal of supercomputing》2018,74(11):5774-5796
Cloud computing is clearly one of today’s most enticing technologies due to its scalable, flexible, and cost-efficient access to infrastructure and application services. Despite these benefits, cloud service users (CSUs) have serious concerns about the data security and privacy. Currently, there are several cloud service providers (CSPs) offering a wide range of services to their customers with varying levels of security strengths. Due to the vast diversity in the available cloud services, from the customer’s perspective, it has become difficult to decide which CSP they should use and what should be the selection criteria. Presently, there is no framework that can allow CSUs to evaluate CSPs based on their ability to meet the customer’s security requirements. We propose a framework and a mechanism that evaluate the security strength of CSPs based on the customer’s security preferences. We have shown the applicability of our security evaluation framework using a case study. 相似文献
10.
Bill Hancock 《Computer Fraud & Security》1998,1998(8):18-19
I am sitting on a plane, listening to two executives outline their strategy for a major buyout of a bridge/router vendor. Since I am a geek and understand what they are talking about, it's an interesting set of tactics that they are considering to get the price of the company down to something they want. What's even more interesting is how open they are with what they are talking about and, even more, I know the president of the company which they are planning to acquire. It would be very easy for me to make a phone call when we land and completely trash all their plans. 相似文献
11.
RFID security 总被引:2,自引:0,他引:2
Radio Frequency Identification (RFID) systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. Finally we discuss the role of this technology in Ubiquitous Computing. 相似文献
12.
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information. 相似文献
13.
14.
15.
《Data Processing》1986,28(4):191-194
Security in computer networks is often viewed as too expensive, but it is important. A first step in protecting a computer network is to restrict access. A product has been designed to provide secure identification of a user for access to a network, computer and data system. A system has also been developed which handles user verification, message protection and message privacy. This system is application-dependent. 相似文献
16.
17.
18.
Computer security 总被引:2,自引:0,他引:2
A strong factor in the early development of computers was security – the computations that motivated their development, such
as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the
computers themselves were so big and so few that they were relatively easy to protect simply by limiting physical access to
them to their programmers and operators. Today, computers have shrunk so that a web server can be hidden in a matchbox and
have become so common that few people can give an accurate count of the number they have in their homes and automobiles, much
less the number they use in the course of a day. Computers constantly communicate with one another; an isolated computer is
crippled. The meaning and implications of “computer security” have changed over the years as well. This paper reviews major
concepts and principles of computer security as it stands today. It strives not to delve deeply into specific technical areas
such as operating system security, access control, network security, intrusion detection, and so on, but to paint the topic
with a broad brush.
Published online: 27 July 2001 相似文献
19.
《Security & Privacy, IEEE》2004,2(2):80-83
Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. The article aims to provide that help by exploring software security best practices. A central and critical aspect of the computer security problem is a software problem. Software defects with security ramifications, including implementation bugs such as buffer overflows and design flaws such as inconsistent error handling, promise to be with us for years. All too often, malicious intruders can hack into systems by exploiting software defects. Internet-enabled software applications present the most common security risk encountered today, with software's ever-expanding complexity and extensibility adding further fuel to the fire. By any measure, security holes in software are common, and the problem is growing. 相似文献
20.
Heinrich Holst 《Datenschutz und Datensicherheit - DuD》2007,31(7):515-518
Mit einer weltweiten Security Awareness-Kampagne wurden bei T-Systems das Sicherheitsbewusstsein und das Wissen um den Umgang
mit sensiblen Informationen von 56.000 Mitarbeiter gesteigert. Als Vorbild diente dabei der fiktive Kollege „James Bit“. 相似文献