Securing Telemetry Post Processing Applications with Hardware Based Security
AffiliationHewlett Packard Corporation
KeywordsHardware Security Modules (HSM)
Hardware Security Module Hybrids (HSMH)
Federal Processing Information Standard 140-2 (FIPS 140-2)
Common Criteria (CC)
MetadataShow full item record
RightsCopyright © International Foundation for Telemetering
Collection InformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
AbstractThe use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
SponsorsInternational Foundation for Telemetering
Showing items related by title, author, creator and subject.
Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line BankingBongani Ngwenya; Khanyisa Malufu; Dean, faculty of Business, Solusi University Bulawayo, +263, Zimbabwe; Department of Computers and Information Systems Solusi University, Bulawayo, +263, Zimbabwe (IJCSN, 2012-12-01)The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
POLITICAL SCIENCE: EMPHASIS ON FOREIGN AFFAIRS STUDYING THE SUPPORT FOR MORE DRASTIC NATIONAL SECURITY POLICIES BASED ON THE FEAR OF CITIZENSKlar, Samara; GONDOSCH, ALISON NICOLE (The University of Arizona., 2016)The hypothesis of this study is that when citizens feel as if their families and/or countries are in danger, they will support more drastic National Security policies to ensure their safety. More specifically, citizens will support these measures when they feel a strong sense of national solidarity even if these policies are not considered “ethical” in the traditional sense of the word. In order to discover the ways in which citizens think about the implementation of more drastic National Security policies, these citizens must be in the most controlled environment possible, therefore an online survey was implemented. The independent variable was the threat citizens feel towards their respective country by outside forces. The participants were randomly assigned into three groups: the threat group, the nonthreat group, and the control group. Qualtrics uses a computer-generated randomization process to randomize the condition that each respondent receives. The threat group was shown a threatening newspaper article about ISIS, the non-threat was shown an article regarding a refugee family settling into a new country in a positive manner, and the control group was shown a completely arbitrary article. All three groups filled out the same survey, which was then analyzed.
The Use of Binary Cyclic Codes in the Generation of Two Other Classes of High Security CodesBrothman, A.; Horowitz, L. M.; Halpern, S. J.; Brothman, E. H.; Reiser, R. D.; Transitel International Corporation (International Foundation for Telemetering, 1965-05)