security technology
Recently Published Documents


TOTAL DOCUMENTS

703
(FIVE YEARS 196)

H-INDEX

17
(FIVE YEARS 3)

2022 ◽  
Vol 355 ◽  
pp. 03067
Author(s):  
Kai Jin ◽  
Zhanji Niu ◽  
Jieping Liu ◽  
Jinxue Bai ◽  
Lei Zhang

The relationship between industrial control system and Internet is becoming closer and closer, and its network security has attracted much attention. Penetration testing is an active network intrusion detection technology, which plays an indispensable role in protecting the security of the system. This paper mainly introduces the principle of penetration testing, summarizes the current cutting-edge penetration testing technology, and looks forward to its development.


2022 ◽  
pp. 143-160
Author(s):  
Md Abdullah Al Momin ◽  
Md Nazmul Islam

Technology has greatly increased the availability of medical procedures in remote locations that are difficult to access, such as battlefields. Teleoperated surgical robots can be used to perform surgeries on patients over the internet in remote locations. A surgeon can remotely operate the robot to perform a procedure in another room or in a different continent. However, security technology has not yet caught up to these cyber-physical devices. There exist potential cybersecurity attacks on these medical devices that could expose a patient to danger in contrast to traditional surgery. Hence, the security of the system is very important. A malicious actor can gain control of the device and potentially threaten the life of a patient. In this chapter, the authors conduct a survey of potential attack vectors a malicious actor could exploit to deny service to the device, gain control of the device, and steal patient data. Furthermore, after the vulnerability analysis, the authors provide mitigation techniques to limit the risk of these attack vectors.


2021 ◽  
Vol 40 (1) ◽  
Author(s):  
Zhi Ji ◽  
George Abuselidze ◽  
Valeriia Lymar

In the paper, the authors prove that the application of the Chinese currency in the less developed regions reveals that the Chinese Yuan, despite its limited turnover, can replace the national currency. The following positive and negative results on the global financial system are highlighted promoting the internationalization of the digital Yuan: ensuring and unlimited transparency of the government and visibility of internal financial transactions; transparency of all offshore financial transactions within a country as well as of non-resident users; providing a framework for the global financial system and controlling the monetary policies of regional economies that have actively adopted the Yuan. The paper analyses that the strategy of the Yuan internationalization was implemented through the mechanism of the currency swap agreements with central banks of different countries, respectively, the growing international application of the Yuan gradually stimulated the creation of the „Yuan zone". It is proved that the Yuan internationalization has become a part of the state strategy of the Chinese government in transition to a new type of economic growth, so the digital Yuan should eventually replace cash and will become the main innovation in the global financial system since the appearance of digital currency. According to the conducted research, it is shown that the main technology of the state digital currency of China accommodates security technology, transaction technology, and reliable guarantee technology. The system of Digital Currency, Electronic Payment - DCEP includes a digital currency tracking method system and a digital currency management system based on certain conditions. Launch conditions include terms of economic conditions, interest rate terms of the loan, the terms of the subject flow, and time conditions.


2021 ◽  
Author(s):  
Zhou Xinli ◽  
Yilin Zeng ◽  
Liangbin Yang ◽  
Danyang Li

2021 ◽  
Vol 2143 (1) ◽  
pp. 012019
Author(s):  
Qi Gao ◽  
Jinniu Bai

Abstract With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages.


Sign in / Sign up

Export Citation Format

Share Document