Search results for "Security through obscurity"
showing 3 items of 3 documents
Vulnerabilities and Threats to Human Security Generated by an Ineffective Educational System
2017
Abstract The present trend towards globalization has led to people changing their views on possible threats to their existence. Nowadays, we witness a diversification of vulnerabilities and threats to human security, as well as a progressive reduction of our resilience. The article attempts to correlate the 5 dimensions of national security, as identified by the Copenhagen School of Security, with the problems of the Romanian educational system, explaining how these problems can become threats to the security of Romanian citizens. It offers an overview of the problems of the Romanian educational system, and the threats and vulnerabilities derived from them towards human security. It also su…
Human Security versus Human Development - Behavioristic Approach
2016
Abstract Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security) or the security of personal data when accessing and using the Internet (cyber security). Consequently, this paper attempts to highlight the way in which the safety and security n…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.