Securing Telemetry Post Processing Applications with Hardware Based Security
AffiliationHewlett Packard Corporation
KeywordsHardware Security Modules (HSM)
Hardware Security Module Hybrids (HSMH)
Federal Processing Information Standard 140-2 (FIPS 140-2)
Common Criteria (CC)
MetadataShow full item record
RightsCopyright © International Foundation for Telemetering
Collection InformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
AbstractThe use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
SponsorsInternational Foundation for Telemetering
Showing items related by title, author, creator and subject.
Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line BankingBongani Ngwenya; Khanyisa Malufu; Dean, faculty of Business, Solusi University Bulawayo, +263, Zimbabwe; Department of Computers and Information Systems Solusi University, Bulawayo, +263, Zimbabwe (IJCSN, 2012-12-01)The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
Promoting Healthy Food Access and Food Security in Urban American Indians through Adaptations to the Local Food Systems and Digital StorytellingTeufel-Shone, Nicolette; Kahn, Carmella; Reinschmidt, Kerstin; Marston, Sallie; Ehiri, John (The University of Arizona., 2018)BACKGROUND: Food systems are shaped by social determinants that influence health outcomes. American Indian (AI) food systems have been disrupted over the last 200 years by historical factors including policies of removal from traditional lands and food systems and reliance on government provided foods. This dissertation will identify barriers and develop strategies using three studies to improve the connection between urban AIs and a food system that affords healthy food and food security. STUDY AIMS: These studies aim to: (1) document urban AI adult food access, food security, body mass index (BMI), and barriers and strategies in using Tucson, AZ’s food system to explore social determinants of health that impact food availability and accessibility; (2) use a Social Cognitive Theory (SCT) framework and strategies documented in Aim 1 to collaboratively plan the development of a digital storytelling (DST) food system curriculum that promotes personal, behavioral, and environmental strategies to access healthy foods and promote food security; and (3) evaluate the development and application of the DST food system curriculum. METHODS: Aim 1 is a secondary analysis of existing qualitative and quantitative data sampled from the Tucson Indian Center (TIC) Community Health Assessment (CHA). Aim 2 is the development of DST food system curriculum. Aim 3 is the qualitative analysis of the DST curriculum from the perspective of the DST team and AI community members. RESULTS: Urban AIs in Tucson experience high rates of low food security and low food access associated with social determinants of health. AI adults with low food security were more likely to not have access to personal vehicles and lived more than 0.5 miles from full-service grocery stores. Combined overweight/obese status among AI adults was associated with low food security based on adjusted models (OR 2.0, CI 1.0, 4.0). Barriers for food access and security occurred at the individual level to environmental level, e.g. food preferences, not having access to community gardening space. Strategies to build food security and access were identified, e.g. build social support, create opportunities for cultural sharing. A food system conceptual model was developed from the participating community members’ perspectives and demonstrates the interconnections of social and cultural determinants between culture, social, economic, political, and biophysical systems that influence food access and security. Gaps in the model can be leveraged by efforts of food revitalization, policy, and indigenous-centered approaches. A DST curriculum offers a unique tool to help urban AI community members understand their food system to identify ways to create personal, behavioral, and environmental level changes. CONCLUSION: Food security and food access impacts the health of urban AIs in Tucson. The urban AI food system is comprised of multilevel factors shaped by social determinants of health. Current barriers included individual behavior to institutional level policies that challenge food security. Strategies that involve community engagement could increase social support and social influence to connect urban AIs to food systems in Tucson that support access to healthy foods and food security. Such strategies include working with community members to develop DST curriculum, consisting of videos and an activity/discussion guide, which can be shared as educational tools and motivators for action.
OVERVIEW OF SECURE COGNITIVE RADIO MAC PROTOCOL IN THE PROPOSED 3.5 GHZ BANDDean, Richard; Moazzami, Farzad; Oyediran, David; Morgan State University, Electrical and Computer Engineering Department (International Foundation for Telemetering, 2017-10)Spectrum sharing between federal and commercial users is proposed by the FCC and NTIA to open up the 3.5 GHz band for wireless broadband use. The proposed technology requires the detection and subsequent allocation of available licensed spectrum for temporary use by other users without compromising the privacy of the licensed user. DoD has a documented requirement of 865 MHz by 2025 to support telemetry but only 445 MHz is presently available. Research is presently on-going at DoD to realize, test and evaluate spectrum efficient technology with the aim to develop, demonstrate, and evaluate technology components required to enable flight and ground test telemetry operations. The use of cognitive radio (CR) in spectrum sharing has gained much popularity in that CR senses the unused spectrum at a specific time and location and dynamically allocates to users as required. This paper will provide an overview of a secured CR Media Access Protocols using the IEEE 802.22. Carrier Sense Multiple Access Collision Avoidance (CSMA/CA) will be utilized for protocol transmission in order to properly identify user’s location and identity thereby providing a secured network against false alarm from external attack.