Securing Telemetry Post Processing Applications with Hardware Based Security
Author
Kalibjian, JeffAffiliation
Hewlett Packard CorporationIssue Date
2004-10Keywords
Hardware Security Modules (HSM)Hardware Security Module Hybrids (HSMH)
Federal Processing Information Standard 140-2 (FIPS 140-2)
Common Criteria (CC)
security boundary
key management
Metadata
Show full item recordRights
Copyright © International Foundation for TelemeteringCollection Information
Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.Abstract
The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.Sponsors
International Foundation for TelemeteringISSN
0884-51230074-9079
Additional Links
http://www.telemetry.org/Related items
Showing items related by title, author, creator and subject.
-
Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line BankingBongani Ngwenya; Khanyisa Malufu; Dean, faculty of Business, Solusi University Bulawayo, +263, Zimbabwe; Department of Computers and Information Systems Solusi University, Bulawayo, +263, Zimbabwe (IJCSN, 2012-12-01)The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
-
"Big Data" Management and Security Application to Telemetry Data ProductsKalibjian, Jeff; Hewlett Packard Corporation (International Foundation for Telemetering, 2013-10)"Big Data" [1] and the security challenge of managing "Big Data" is a hot topic in the IT world. The term "Big Data" is used to describe very large data sets that cannot be processed by traditional database applications in "tractable" periods of time. Securing data in a conventional database is challenge enough; securing data whose size may exceed hundreds of terabytes or even petabytes is even more daunting! As the size of telemetry product and telemetry post-processed product continues to grow, "Big Data" management techniques and the securing of that data may have ever increasing application in the telemetry realm. After reviewing "Big Data", "Big Data" security and management basics, potential application to telemetry post-processed product will be explored.
-
Engendered Security: Norms, Gender and Peace AgreementsGoertz, Gary; Ellerby, Kara; Peterson, V. Spike; Ghosn, Faten; Dovi, Suzanne; Goertz, Gary (The University of Arizona., 2011)As civil conflicts continue to be the most prevalent form of war, women and children are disproportionately affected by intrastate violence. In response to such findings, the United Nations, at the behest of a transitional activist network, passed United Nations Security Council Resolution 1325, which outlined how to include more women in formal security practices.Because of the normative qualities of the Resolution, I employ a norms framework to explore the properties and evolution of when and how women are part of peace agreements. Before exploring the norm of engendered security, I present a review of feminist security studies and how engendered security is understood using a gender lens. To first establish what a norm is, I developed a three-level approach which illuminates the principles, properties and policies that constitute a norm; I then apply this model to the norm of engendered security. I then use this norm to study peace agreements, and develop graphs and tables illustrating the varied levels of engendered security in different peace processes.Then, to address the ways in which this norm has evolved, I employ a norm lifecycle model which includes four stages: innovation, emergence, enactment and routinization. Subsequent chapters explore the first three phases of engendered security's development into a norm. This includes a discussion of Guatemala as a norm innovator, in which a strong domestic women's movement and feminist leaders promoted a high level of engendered security in their peace process. Norm emergence focuses on the agenda-setting of a Peacewomen's Network who promoted Resolution 1325; it includes an analysis of the developing discourses of security and women, culminating in global recognition of women's insecurity in conflict. The final chapter explores norm enactment and the ways in which norms become common practices and policies in various security-related institutions. This chapter concludes with a study of Sudan's two peace processes and the role the international community played in producing very different levels of engendered security.Ultimately, the views of leaders during peace processes, the presence of an organized women's movement and agenda and gender-conscious mediators seem to account for higher levels of engendered security.