Contexts in source publication

Context 1
... some configurations, the border router itself may act as a basic firewall. Figure 7.1 illustrates an example of this simple DMZ using a router with access control lists (ACL) to restrict certain types of network traffic to and from the DMZ. A single-firewall DMZ is a low-cost approach, since the organization needs only to add a single firewall and use its existing border router to provide protection to the DMZ. ...
Context 2
... addition, a router cannot provide any virus scanning of incoming email. A superior approach is to add a second firewall between the Internet and the DMZ, as shown in Figure 7.2. ...
Context 3
... this configuration, a firewall is constructed with three (or more) network interfaces. One network interface attaches to the border router, another interface attaches to the internal network, and a third interface connects to the DMZ (see Figure 7.3). This configuration subjects the firewall to an increased risk of service degradation during a DoS attack aimed at the DMZ. ...
Context 4
... the mail gateway generally requires only limited functionality, it is much easier to harden and secure than a fully functional mail server. Figure 7.4 provides an example of using a mail gateway to fortify a mail server on the internal network. ...

Similar publications

Technical Report
Full-text available
SMM4H 2021 accepted at NAACL (scheduled in Mexico City in June) https://2021.naacl.org/. The ProfNER Shared Task encourages its participants to detect occupations and employment situations in Spanish tweets related to the COVID-19 situation. These guidelines describe the process followed by the clinical and linguist experts who manually annotated...

Citations

... The Data Sending software (Fig. 2, bottom UML diagram) continuously sends emails to users about the current state and phase of the entire scenario building process. The software manages the data sent by the mail server that communicates with it via Simple Mail Transfer Protocol (Tracy et al., 2007). The final data will be sent to the participants by an email server, along with the documents attached to them. ...
Article
The purpose of this article is to present an online scenario building platform developed by the author. With the help of this platform scenarios can be created using arbitrary online scenario building methods in a way that a high number of individual participants could join the process. Using the elaborated online method, the entire scenario building process can be accomplished ranging from the development of driving forces, through the analysis of data and scenarios created and to their feedback. The platform enables the development of not only targeted methods, but the entirely general ones as well. This article provides a detailed presentation of the Two-axes method scenario created by use of this platform and constantly tested on several scenario building tasks. Individuals of various competencies participated in the testing over the past years, covering university students, experts, and representatives of various stakeholder groups. The platform comes with a text mining package with the help of which the resulting scenarios can be analysed logically and textually. This package enables the mapping out of the extent to which the scenarios, the driving forces and the intermediate stages are logically related.
... If encryption is not in place, providers should inform clients of its absence and limit the personal content of any communication. While a comprehensive discussion of encryption is beyond the scope of this article, it may be useful to summarize some basic considerations from the National Institute of Standards and Technology (Tracy, Jansen, Scarfone, & Butterfield, 2007). Use of encryption may require hardware upgrades given that it places additional demands on the microprocessor. ...
Article
Full-text available
Psychologists increasingly rely upon “telepsychology” (e.g., e-mail and Internet-based client communications) despite the growing presence of threats to online security. However, practitioners may overestimate the benefits of electronic communications and underestimate their risks. Using the example of the availability heuristic as one cognitive bias, which may promote this imbalance, this article reviews a number of resources for practitioners that provide enhanced security and confidentiality in the digital realm. Governmental, regulatory and professional bodies provide pertinent and detailed guidance that can achieve these goals. To illustrate this process, this article reviews and augments a number of safeguards (administrative, physical, and technical) within the HIPAA Security Rule. It also surveys opportunities for continuing education and credentialing that may enhance professional competence in electronic communications. It concludes with a list of recommendations for enhancing security and reducing the influence of the availability heuristic in telepsychology. These recommendations range across several categories of professional practice: hardware and software management, confidentiality, informed consent, competence, consultation, and continuing education. This article can help practitioners reap the benefits of telepsychology while successfully enhancing confidentiality and security. (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Conference Paper
We introduce the paradigm of security through hostility: cloud-based service providers in conflicting jurisdictions are assumed to be non-cooperating, and are used for transmitting encrypted content and corresponding keys through separate but accessible channels among end-users from both jurisdictions. Such separation between content and key can enable effortless user-to-user encrypted communication without any user-managed keys. As an example use-case of this paradigm, we consider encrypted email, which is complicated by the requirement of balancing security and ease-of-use needs. For example, users cannot be expected to manage long-term keys (e.g., PGP key-pair), or understand crypto primitives. We design CherAmi by leveraging existing relationships between a sender and a receiver on an online social networking (OSN) site, and assuming users can use OSN and email providers that are hosted from hostile/non-cooperating jurisdictions. CherAmi can provide integrity, authentication and confidentiality guarantees for selected messages among OSN friends. A confidentiality-protected email is encrypted by a randomly-generated key, and the key is privately shared with the receiver via the OSN site. Our implementation consists of a Thunderbird add-on and a Twitter app; the add-on is available at: https://madiba.encs.concordia.ca/software.html. CherAmi is a client-end solution and does not require changes to email or OSN servers. In this paper, the focus of our discussion includes: the paradigm of security through hostility, and the design, implementation and security analysis of the proposed encrypted email solution. We acknowledge that a user study will be required to validate usability-related features of CherAmi.
Conference Paper
Security of Big Data is a big concern. In broad sense Big Data contains two types of data such as structured and unstructured. To provide security to unstructured data is more difficult than that of structured. In this paper we have developed an approach to give adequate security to the unstructured data by considering the types of the data and their sensitivity levels. We have reviewed the different analytics methods of Big Data, which gives us the facility to build a data node of databases of different types of data. Each type of data has been further classified to provide adequate security and enhance the overhead of the security system. To provide security to data node a security suite has been designed by incorporating different security standards and algorithms. The proper security standards or algorithms can be activated using an algorithm, which has been interfaced with the data node. We have shown that data classification with respect to sensitivity levels enhance the performance of the system.