Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
345,194
result(s) for
"SECURITY CONTROL"
Sort by:
Cybersecurity for Industrial Control Systems
2016,2012,2011
As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are required.
Becoming the hacker : the playbook for getting inside the mind of an attacker
\"Things you will learn : study the mindset of an attacker, adopt defensive strategies, classify and plan for standard web application security threats, prepare to combat standard system security problems, defend WordPress and mobile applications, use security tools and plan for defense against remote execution.\"--Back cover.
Influence of the Configuration of Airport Security Control Systems on the Implementation of Assumptions of the Sustainable Development Policy
by
Ryczyński, Jacek
,
Kisiel, Tomasz
,
Kierzkowski, Artur
in
Aeronautics
,
Airline security
,
Airport security
2024
Research by scientists dealing with sustainable development issues in the aviation industry security focuses on finding solutions that constitute the so-called ‘golden mean’ between appropriate efficiency and high levels of system safety and reliability (including human reliability). The features mentioned above have been repeatedly investigated in various studies, but always individually—to date, no one has proposed a solution indicating the balance point of all the abovementioned features. Here we propose a solution to this research gap: a model for assessing the configuration of airport security control systems. The model allows for the optimal configuration of airport security control systems. The multi-level model validation presented in the article was performed, among others, based on one of the airports in Poland, and showed that the correct configuration of the system can bring energy savings of 913,500 kWh/year in the case of large international airports. Additionally, the article discusses all solutions and modern technologies equipped with devices supporting the passenger and baggage screening process.
Journal Article
Security and sport mega events : a complex relation
by
Mastrogiannakis, Diamantis editor
,
Dorvillâe, Christian, editor
in
Hosting of sporting events Security measures.
,
Spectator control.
,
Arenas Security measures.
2015
Sport competitions at the national, European and global levels have evolved in terms of economic investment, social importance and media coverage. However, this evolution has brought with it major political concerns. There is a need of construction of an environment of life where sport events and the multiple activities and interests related to them can be kept safe from any risk and potentially harmful occurrence. The aim of this volume is to highlight the complex set of legal provisions, surveillance and policing practices, discourses, bureaucratic procedures and spatial and architectural forms underpin the security governance of sport events and their effects in the contemporary era of widespread uncertainty.
SCADA Security
by
Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Xun Yi
in
Automatic control
,
Automatic control-Security measures
,
Data mining
2020,2021
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems
Cyber-attacks on SCADA systems—the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management—can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning.
Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book:
* Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems
* Describes the relationship between main components and three generations of SCADA systems
* Explains the classification of a SCADA IDS based on its architecture and implementation
* Surveys the current literature in the field and suggests possible directions for future research
SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by
Anderson, Chad
,
Baskerville, Richard L.
,
Kaul, Mala
in
ethical control
,
health care
,
health information exchange
2017
Contemporary organizations operate in highly interconnected environments where they are frequently confronted by the challenge of balancing the protection of information resources with the need for sharing information. This tension between the expected benefits and the potential security risks inherent in the information sharing process, exists in many domains, including business, health care, law enforcement, and military-yet it is not well-understood. We propose an information security control theory to explain and manage this tension. We evaluate this theory through a longitudinal case study of the iterative development of the information security policies for a health information exchange in the western United States. Our study shows that the theory offers a good framework through which to understand the information security policy development process, and a way to reconcile the tension between information sharing and information protection. The theory has practical applicability to many business domains.
Journal Article
Network security : private communication in a public world
by
Kaufman, Charlie, author
,
Perlman, Radia, author
,
Speciner, Michael, author
in
Computer security.
,
Computer networks Security measures.
,
Computers Access control.
2023
The classic guide to cryptography and network security -- now fully updated! \"Alice and Bob are back!\" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) - back of cover.
The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce
2003
The number of Internet users has increased dramatically,but many are reluctant to provide sensitive personal information to Web sites because they do not trust e-commerce security.This paper investigates the impact of customer perceptions of security control on e-commerce acceptance. Trust is examined as the mediating factor of the relationship, using Internet banking as the research domain because bank customers are generally concerned about processing sensitive information like financial information. A Web survey of Internet banking users collected 502 cases. Statistical analyses, using structural equation modeling, indicated that perceptions of nonrepudiation, privacy protection, and data integrity have a significant impact on trust in e-commerce. Trust also has a significant impact on e-commerce acceptance. Implications and further research directions are presented.
Journal Article