Privacy Protection in Distributed Industrial System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Although awareness is constantly rising, that industrial computer networks (in a very broad sense)can be exposed to serious cyber threats, many people still think that the same countermeasures, developed toprotect general-purpose computer networks, can be effectively adopted also in those situations where a physicalsystem is managed/controlled through some distributed Information and Communication Technology (ICT)infrastructure. Unfortunately, this is not the case, as several examples of successful attacks carried out in thelast decade, and more frequently in the very recent past, have dramatically shown. Experts in this area knowvery well that often the peculiarities of industrial networks prevent the adoption of classical approaches to theirsecurity and, in particular, of those popular solutions that are mainly based on a detect and patch philosophy.This paper is a contribution, from the security point of view, to the assessment of the current situation of a wideclass of industrial distributed computing systems. In particular, the analysis presented in this paper takes intoaccount the process of ensuring a satisfactory degree of security for a distributed industrial system, with respectto some key elements such as the system characteristics, the current state of the art of standardization and theadoption of suitable controls (countermeasures) that can help in lowering the security risks below a predefined,acceptable threshold
Authors and Affiliations
P. Sheela Rani, , B. Malavika, , D. Menaka
Virtual Teaching and Painting Platform for the Colour Blind
Abstract: Education involves perception of colour and unfortunately some of us are not blessed with this gift of proper vision. Lacking the ability to distinguish certain colours is commonly known as Colour Blindne...
"Randomized Visual Cryptography scheme for color images”
Abstract: In this paper, we propose a new color visual cryptography scheme which is based on modified visualcryptography. Visual Cryptography is based on cryptography where n images are encoded in a way that onlyth...
Associated Edge Weight Approach to Improve Personalized Ranking
Abstract: Search engine is most leading and valuable tool that collects the data which is extent and it objectives to offer rising data being reachable to the user. Objective of personalization ranking is to improve the...
Human Being Character Analysis from Their Social Networking Profiles
In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...
A New Skin Color Based Face Detection Algorithm by CombiningThree Color Model Algorithms
Abstract: Human face recognition systems have gained a considerable attention during last decade due to itsvast applications in the field of computer and advantages over previous biometric methods. There are manyap...