scholarly journals An Enhancement of Optimized Detection Rule of Security Monitoring and Control for Detection of Cyberthreat in Location-Based Mobile System

2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Wonhyung Park ◽  
Byeong Ho Kang

A lot of mobile applications which provided location information by using a location-based service are being developed recently. For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However, the information leakage and the crime that misused the leaked information caused by the cyberattack of mobile information system occurred. So the interest and importance of information security are increasing. Also the number of users who has used mobile devices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has been used to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kinds of equipment. It is expected that the security of mobile information system would be improved and information leakage would be blocked by selecting options through optimization of Snort detection policy to protect users who are using location-based service in mobile information system environment in this paper.

1979 ◽  
Vol 1 (3) ◽  
pp. 177-179 ◽  
Author(s):  
J.A. Kennerley

In this paper the author distinguishes between the busi ness manager's task of making decisions and the supervisor's role of monitoring and control, and urges that the former must be aware of the modern business information system. The importance of firms developing an 'Information Demand Structure' is discussed to allow the making of instant com parisons of various courses of action in response to informa tion on events which are outside of their usual planning and which are likely to affect their business.


2012 ◽  
Vol 15 (5) ◽  
pp. 677-691 ◽  
Author(s):  
Seok-Hyun Kim ◽  
Ji-Uk Kim ◽  
Hyun-Jeong Kim ◽  
Dong-Gyu Park

2019 ◽  
Vol 4 (4) ◽  
pp. 328-335
Author(s):  
Iryna HAVRYLKO

Introduction. The state of the modern economic environment requires the introduction of control in the management of agricultural enterprises. The control is aimed at identifying potential or existing adverse economic situations in the enterprise. The purpose of scientific research is to develop application areas of prognostic tools for monitoring and control in the management of agricultural enterprises. Results. The reason for the emergence and implementation of the control concept in the activities of agricultural enterprises is determined. It is established that the control system is characterized by recording information about past events and focus on the future. The reasons that determine the need for control are described. The role of control in the agricultural enterprise management is substantiated. The essence of control information technology in enterprise management is determined. An expert assessment of the cost structure for the implementation of the automated information system project was conducted. The approach to the choice of the automated information system is substantiated. Features and advantages of the most widespread automated information systems are described. It is proved that control is one of the most modern and effective enterprise management systems. The potential possibility of control to improve the performance of domestic agricultural enterprises has been identified. The role of control in marketing activity of agrarian business subjects in the conditions of market relations is allocated. An overview of the main control tools in the agricultural enterprises management is given. The purpose of control in the context of operational and strategic plans is outlined. Objects of analysis for formation of information base of control are allocated. The main tasks of marketing control in the agricultural enterprises activities are described. Conclusions. The integration of control and monitoring tools is necessary to obtain the desired effect in any management subsystem. Such integration has a positive effect on the economic efficiency of agricultural entities and helps to increase the level of decisions validity. Keywords: monitoring, control, enterprise management, agrarian business entity, automated information systems, marketing activities.


Computers ◽  
2018 ◽  
Vol 7 (4) ◽  
pp. 47 ◽  
Author(s):  
Zebo Yang ◽  
Tatsuo Nakajima

Electronic visual display enabled by touchscreen technologies evolves as one of the universal multimedia output methods and a popular input intermediate with touch–interaction. As a result, we can always gain access of an intelligent machine by obtaining control of its display contents. Since remote screen sharing systems are also increasingly prevalent, we propose a cross-platform middleware infrastructure which supports remote monitoring and control functionalities based on remote streaming for networked intelligent devices such as smart phone, computer and smart watch, etc. and home appliances such as smart refrigerator, smart air-conditioner and smart TV, etc. We aim to connect all these devices with display screens, so as to make possible remote monitoring and controlling a certain device by whichever one (usually the nearest one) of display screens among the network. The system is a distributed network consisting of multiple modular nodes of server and client, and is compatible to prevalent operating systems such as Windows, macOS, Unix-like/Linux and Android, etc.


Author(s):  
K Mounika

House control and monitoring system using Bluetooth and infrared. In Bluetooth with android smart phone connectivity and for accessing and controlling devices and appliances remotely using Android based Smart phone applications. In IR-based house Appliances Control System is a control system using which the user can control different home appliances with a remote controller. The future system does not require a dedicated server PC with respect to similar systems and offers a novel communication protocol to monitor and control the house environment with more than just the switching functionality. House automation using Bluetooth is a residence incorporating a communications network that connects the electric home equipment and offerings letting them be remotely controlled, monitored or accessed. house automation System includes different approaches to achieve multiple objectives range from enhancing consolation in day by day existence to permitting a greater unbiased existence for aged and handicapped people. The system design is based on Arduino Microcontroller using C/C++, language software, Bluetooth and infrared (IR) which is used in different monitoring and control processes. This project the combination hardware and software implementation of a multiple form control system for house automation, combines both hardware and software technologies. The system results show that it can be classified as comfortable, secure, private, economic and safe house automation in addition to its great flexibility and Reliability.


2020 ◽  
Vol XXIII (1) ◽  
pp. 277-281
Author(s):  
Sorin R. Sintea

The communication devices can transport information from data controller to a longdistance central communication point. Industry 4.0 advances the concept of mobile devices that must be controlled and monitored from long distance. This paper represents a common effort to adapt the new ITC expectations and possibilities for existing equipment. This work proposes a highway communication infrastructure which ensures communication between mobile devices and fixed 5G networks infrastructure. The solution given addresses to the control and monitoring of an USV (unnamed surface vehicle) from Cloud, using IoT services. The scope is to reliably connect the USV real-time communication through IoT services, over 5G Mobile network solution. All data are to be send in Cloud, where will be installed the USV monitoring and control application, detailed by its modules, components and their role.


2013 ◽  
Vol 3 (4) ◽  
pp. 40-51
Author(s):  
Karen Renaud ◽  
Wendy Goucher

Mobile devices have diffused through the global population with unprecedented rapidity. This diffusion has delivered great benefits to the populace at large. In the third world people living in rural areas are now able to contact family members who live in other parts of the country for the first time. For the city-dweller the mobile device revolution has brought the ability to communicate and work on the move, while they travel to and from work, or between meetings, thus making ertswhile “dead” time more productive. It is trivial, nowadays, to utilise workplace functionality, and access confidential information, outside the four walls of the organisation's traditional boundaries. Data now moves across organisational boundaries, is stored on mobile devices, on USB sticks, and in emails, and also stored in the cloud. Organisations have somehow lost control over their data. This mobility and lack of control undeniably creates the potential for information leakage that could hurt the organisation. The almost ubiquitous camera-equipped mobile phones exacerbate the problem. These feature-rich phones change the threat from mere Shoulder Surfing into Visual Information Capture. Information is now no longer merely observed or overheard but potentially captured and retained without the knowledge of the person working on said documents in public. The first step in deciding how to manage any risk is to be able to estimate the extent and nature of the risk. This paper seeks to help organisations to understand the risk related to mobile working. We will model the mobile information leakage risk, depicting the factors that play a role in exacerbating and encouraging the threat. We then report on two experiments that investigated the vulnerability of data on laptops and tablet devices to visual information capture. The authors address both capability and likelihood (probability) of such leakage. The results deliver insight into the size of the Mobile Information Leakage risk. The following stage in this research will be to find feasible ways of mitigating the risk.


2014 ◽  
Vol 543-547 ◽  
pp. 1587-1590
Author(s):  
Xin Qiang Li ◽  
Xian Hui Duan ◽  
Guo Dong Han ◽  
Xu Ning Liu

In order to improve the level of production management and information development of textile industry, firstly the paper analyzed the hardware and software structure of jet loom monitoring system, then carried out related research on the information management of textile industry, introduced the related techniques, implemented the real-time monitoring and control based on CAN bus, data gathering and Winsock technology. The practice has proved that the loom network monitoring information system based on the industrial Ethernet has improved greatly the efficiency of production, and building network is simple, the development and maintenance are easy, and the performance is good and so on, which can provide better realistic instructions on realizing the standardization of communication, automation and information of the textile industry.


Sign in / Sign up

Export Citation Format

Share Document