Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 57 dokumen yang sesuai dengan query
cover
Ray, Sandip
"This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs – current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for “hardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.
- Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;
- Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;
- Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;
- Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field;
- Includes discussion of current and emerging approaches for security policy verification."
Switzerland: Springer Cham, 2019
e20502835
eBooks  Universitas Indonesia Library
cover
Andrzej Dziech, editor
"This book constitutes the refereed proceedings of the 5th International Conference on Multimedia Communications, Services and Security, MCSS 2012, held in Krakow, Poland, in May/June 2012. The 37 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address issues such as privacy and data protection using digital watermarking and other technologies; object and threat detection; data protection and distribution; human-centric multimedia analysis and synthesis; cybercrime detection and counteracting."
Berlin: [Springer-Verlag, ], 2012
e20409172
eBooks  Universitas Indonesia Library
cover
"This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is often and incorrectly conflated with resilience -- resilience refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance. A clear understanding of distinction between security, risk and resilience is important for developing appropriate management of cyber threats.
The book presents insightful discussion of the most current technical issues in cyber resilience, along with relevant methods and procedures. Practical aspects of current cyber resilience practices and techniques are described as they are now, and as they are likely to remain in the near term.
The bulk of the material is presented in the book in a way that is easily accessible to non-specialists. Logical, consistent, and continuous discourse covering all key topics relevant to the field will be of use as teaching material as well as source of emerging scholarship in the field. A typical chapter provides introductory, tutorial-like material, detailed examples, in-depth elaboration of a selected technical approach, and a concise summary of key ideas."
Switzerland: Springer Cham, 2019
e20501204
eBooks  Universitas Indonesia Library
cover
Zulhaedar
"Penelitian ini membahas tentang pengamanan di Pertambangan Emas-Tembaga PT. Newmont Nusa Tenggara di Kawasan Batu Hijau Kabupaten Sumbawa Barat yang pelaksanaan pengamanannya dilakukan oleh Departemen Sekuriti PT. Newmont Nusa Tenggara, Satuan Pengamanan PT. Nawakara Perkasa Nusantara dan Kepolisian setempat. Sebagai perusahaan dengan status obyek vital nasional, PT. Newmont Nusa Tenggara menghadapi resiko tinggi terhadap potensi gangguan keamanan. Penciptaan rasa aman di PT. Newmont Nusa Tenggara sangat tergantung pada penyelenggaraan sekuriti fisik.
Penelitian ini mencoba menganalisa efektifitas penyelenggaraan pengamanan dan faktor-faktor yang mempengaruhi imolementasi sistem pengamanan di PT. Newmont Nusa Tenggara sebagai obyek vital nasional. Penelitian inimenggunakan pendekatan penelitian kualitatif yang dianalisis secara deskriftif dengan menggunakan teori terkait bidang manajemen, bidang implementasi, bidang pencegahan kejahatan dan kerugian, bidang sekuriti fisik, bidang upaya sekuriti dan di bidang community policing.
Hasil penelitian ini menunjukan bahwa masih terjadi kegiatan pencurian dan unjuk rasa. Ini terjadi karena sistem pengamanan sebagai obyek vital nasional belum terkordinasi dengan baik di manejemen PT. Newmont Nusa Tenggara dan Kepolisian. Dengan demikian di rekomendasikan manajemen PT. Newmont Nusa Tenggara melakukan perbaikan-perbaikan sarana dan prasana sekuriti fisik dan membuat program-program pelatihan keamanan dan memaksimalkan peran polri dalam pengamanan obvitnas khususnya pada penegakan hukum dan kemitraan dengan masyarakat lingkar tambang.

This research is security system implementation on national vital objects in mininggold copper Of PT. Newmont Nusa Tenggara in the region Batu Hijau Kabupaten Sumbawa Barat, the implementation of the security done by the internal management PT. Newmont Nusa Tenggara, security officer of PT. Nawakara Perkasa Nusantara and local police. As a company with the status of national vital objects, PT. Newmont Nusa Tenggara face a high risk of potential disruption of security, the creation of security in PT. Newmont Nusa Tenggara highly dependent on the implementation of physical security.
This research tries to analyze the effectiveness of the security and the factors that affect the implementation of the security system in PT. Newmont Nusa Tenggara as national vital object. This research using the approach of the qualitative study analyzed in descriptive using related management theory, the theory of the implementation, the theory of loss and crime prevention, physical security theory, theory security efforts, the theory of community policing and the concept of industrial security in Indonesia.
These results indicate that there had been theft activities and demonstrations. This occurs because the security system as national vital object notwell coordinated in PT. Newmont Nusa Tenggara management and the police in implementing security functions. Therefore recommend to PT. Newmont Nusa Tenggara management improvement of physical security of facilities and infrastructures and create security training program and to maximize the role of the national police in securing the national vital object, especially in law enforcement and partnerships with the community around the mine.
"
Jakarta: Program Pascasarjana Universitas Indonesia, 2016
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Rachma Maharani Ulfa
"

Internet of things (IoT) seringkali menjadi target serangan Distributed Denial of Service (DDoS) pada perangkat mereka. Ini karena ekosistem IoT menggunakan sistem terpusat untuk mengendalikan dirinya sendiri. Blockchain menggunakan sistem distribusi terdesentralisasi sehingga tidak memerlukan otoritas dari pihak ketiga untuk memberikan kontrol verifikasi dalam mengidentifikasi block transaksi yang ada di dalam node ini.  Penggunaan Blockchain dapat diimplementasikan ke dalam ekosistem IoT dalam mengelola aliran data dan transaksi dan dapat mengelola manajemen akses yang aman dan andal yang mendukung ekosistem tepercaya. Integrasi blockchain pada IoT membutuhkan metode Smart Contract sebagai solusi untuk mendukung konsep keamanan jaringan seperti kerahasiaan, integritas, dan keseterdiaan.


Internet of things (IoT) is often the target of Distributed Denial of Service (DDoS) attacks on their devices. This is because the IoT ecosystem uses a centralized system to control itself. Blockchain uses a decentralized distribution system so that it does not require authority from a third party to provide verification control in identifying transaction blocks that exist within this node. The use of Blockchain can be implemented into the IoT ecosystem in managing data flow and transactions and can manage secure and reliable access management that supports trusted ecosystems. Blockchain integration in IoT requires Smart contract method as a solution to support the concept of network security such as confidentiality, integrity and integrity.

"
Depok: Fakultas Teknik Universitas Indonesia, 2020
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Benny, Daniel J
Boca Raton: CRC Press, Taylor & Francis Group, 2013
363.69 BEN c
Buku Teks  Universitas Indonesia Library
cover
Benny, Daniel J
"Machine generated contents note: 1.Importance of Culture Property Protection: Museums, Historic Sites, Archives, and Libraries
Introduction
Museums
Private Museums
Local Museums
County Museums
State Museums
National Museums
Military Museums
Historic Sites
Private, Local, and County Historic Sites
State Historic Sites
National Historic Sites
Archives
Private, Local, and County Archives
State Archives
National Archives
Libraries
Private Libraries
Campus Libraries
Local Libraries
County Libraries
State Libraries
National Libraries
Summary
Bibliography
2.Security Threats to Museums, Historic Sites, Archives, and Libraries
Security Threats to Museums
Security Threats to Historic Sites
Security Threats to Archives
Security Threats to Libraries
Security Threats to Individuals
Workplace Violence
Prevention of Violence in the Workplace
Identification of Behavioral Indicators
Contents note continued: Threats from Terrorism
Target Selection
Counter Terrorism
Signs of Terrorism
3.Physical Security Protection for Museums, Historic Sites, Archives, and Libraries
Intrusion and Fire Detection Systems
Security Cameras
Determining Total System Costs
Design Costs
Installation Costs
Operational Costs
IT Costs
Maintenance Costs
Replacement Costs
Cost-Benefit Analysis
Cost Factors
Benefit Factors
Cost of Loss
Prevention Costs
Return on Investment
Lock and Key Control
Mechanical Locks
Wafer Tumbler Locks
Dial Combination Locks
High Security Dead Bolt Locks
Card Access Electrified Locks
Exit Locks
Master Locking Systems
Control of Keys and Locking Devices
Master Keys
Duplication
Lost Keys
Disposition at Transfer or Termination
Security Containers
Security Filing Cabinets
Security Barriers and Fencing
Security Lighting
Contents note continued: Protection of Windows and Utility Ports
Radio Frequency Identification, Magnetometers, and X-Ray Devices
Protection of Artifacts
Artifacts on Display
Artifacts in Storage
Artifacts in Transit
Protection of Books, Publications, Documents, and Photographs
Internet Protection
4.Security Department Organization and Operation
Chief Security Officer
Determining Size of Department
Mission
Legal Authorization to Protect Property
Property Profile and Security Threats
Proprietary Security Force
Contract Security Force
Uniforms and Identification
Staff and Visitor Identification
Protective Equipment
Use of Force Continuum
Vehicles
Communications
Report Procedures
Protection of Department Information
Lost and Found
Ethics and Conduct
Ethics
Conduct
Training
Professional Certifications
Recruitment and Supervision
Patrols
Service Calls
Vehicle Stops
Contents note continued: Authority
Approaching Suspect Vehicle with Patrol Vehicle
Felony Vehicle Inquiries
Use of Force
Handcuffs
Oleoresin Capsicum (OC)
Extremities as Defensive Weapons
Batons
Firearms
Investigations
Apprehension and Arrest
Court Testimony
Security Information Center
Dealing with Media
5.Safety and Fire Protection
General Safety Policy
Safety Culture
Safety Program
Safety Coordinator
Fire Protection
Inspections
Protection Equipment
Fire Evacuation Plans and Drills
Employee and Visitor Protection Measures
Right-to-Know Worker Protection Act
Hazardous Chemical Inventory
Material Safety Data Sheets (MSDS)
Container Marking
Bloodborne Pathogens Act
Policy
Exposure Control Officer
Department Managers and Supervisors
Education or Training Coordinator
Employees
Exposure Determination
Universal Precautions and Engineering Controls
Contents note continued: Hepatitis B Vaccination Program
Hazardous Waste Management
6.Emergency Responses
Medical Emergencies
Responding to Medical Emergencies
Treatment of Victim
Vehicle Accidents
Fires
Evacuation
Firefighting
Gas Leaks
Important Safety Precautions
Severe Weather and Natural Disasters
Bomb Threats
Notification and Evacuation
Bomb Search
Return to Facility
Hostage Situations
Appendix A Commonwealth of Pennsylvania Library Theft Act
(Act 95 of Session 1982, 18 Purdon's Statutes [&​#x00A7;]3929.1)
House Bill 671
Appendix B Cultural Property Resources
Professional Cultural Property Security Organizations
Professional Cultural Property Organizations
Regional and State Museum Conferences and Associations
Regional Conservation Guilds and Associations
Cultural Property Journals and Publications
Cultural Property Funding Organizations
Contents note continued: Cultural Property Organizations for Reporting Thefts
Appendix C Cultural Property Physical Security Checklist
Perimeter Barriers
Protective Lighting
Intrusion Detection System
Security Communications
Personnel Identification and Control
Lock Security
Security Force
Appendix D Cultural Property Key Control Program Checklist
A.Control measures
B.Custodians appointed in writing for
C.Quarterly inspections
D.Access roster
E.Keys and padlocks
F.Key depositories
G.Combination locks
H.Seals and bands
Appendix E Cultural Property Security Force Checklist
Security Operation
Proprietary Security Department
Contract Security
Administration Issues
Miscellaneous."
Boca Raton, FL : CRC Press, 2013
363.69 BEN c
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 >>