Time filter

Source Type

United States

Byres E.,CTO
Control (Chicago, Ill) | Year: 2010

The Stuxnet worm that targeted Siemens HMI and PLC systems highlighted the fact that designing a good cyber defense for SCADA or process control system was insufficient to prevent such worms from attacking these systems. It was revealed that this worm was designed to let an outsider gain unauthorized access to control systems using the most widely deployed brand of PLC and SCADA products in the world. Siemens and Microsoft responded rapidly to the Stuxnet threat, and provided a patch to address the vulnerability and a utility to detect and remove the virus. It was essential for companies to develop and maintain a cyber security management program that employed a defense-in-depth strategy to address such threats. Companies needed to implement a cyber security program that combined policies and procedures coupled with technical countermeasures and an ongoing program to monitor, maintain, and adapt as necessary.

Mansour A.M.A.,CTO | Fouad M.A.M.,National Telecommunication Institute
International Journal of Software Engineering and its Applications | Year: 2014

This paper proposes a new Text Encryption (N-TEA) Algorithm that compresses and encrypts input text before transmitting it to the receiver. The N-TEA algorithm uses a predefined static dictionary providing codewords of only 12 bits as maximum length, and occupying less than 16 Kbytes. The predefined dictionary stores characters, symbols, and few frequently used words. The dictionary is hashed, generating encrypted dictionary of large number of possibilities that is almost impossible to be discovered or broken without knowing the right hashing function. Several hashing functions could be applied for exchanging text data between parties. Although dictionary based text coding is not new, the proposed work is novel, very simple, and generic, having three main advantages over those in the literature. First, the used dictionary is for characters and symbols, instead of the complete dictionary of words and encryption is for the dictionary itself, instead of the original text. Second, no private/public keys are transmitted through communication channels, providing secured data exchange. Third, transmitted data is reduced by at least 25% of its original size at the same time the text is encrypted, transmitting compressed and encrypted data. Thus, the proposed N-TEA algorithm is adequate for real-time applications, resisting many kinds of attacks such as the Brute Force, Meet-in-the-Middle, and Birthday attacks. © 2014 SERSC.

Buechier K.,CTO
Large Lithium Ion Battery Technology and Application Symposium, LLIBTA 2015 - Held at AABC 2015 | Year: 2015

Ultrathin ALD Films for Li-ion Battery Systems Improvements available for Cathode Powders (capacity retention) Anode Electrodes (capacity retention and physical stability) Separators (wetting and thermal stability) Manufacturing is scalable Uses scalable, pre-existing equipment Gas phase and efficient Robust, self-limiting process ALD NanoSolutions is an ideal development partner Broad IP protection Unmatched experience and existing clientele. © (2015) by Cambridge EnerTech.

Symmonds G.,CTO
WIT Transactions on the Built Environment | Year: 2011

Water scarcity and variability are increasing worldwide. Once isolated to developing nations, water scarcity is dramatically affecting first world nations like Australia, Spain, and the United States. All nations are now recognizing that the world's water is a finite resource, and that resource is being drastically altered in both availability and quality by development, climate change and population growth. To survive in this new reality, water managers must not only increase the availability of conservation infrastructure - dual water mains, etc. - they must also increase the availability of information available to consumers. Addressing this water crisis requires a fundamental change in the planning and infrastructure deployment employed for water resources; a change from the largesse policies of the past to stewardship of the future and a commitment to engage the consumer in active conservation. © 2012 WIT Press.

Bunker G.,CTO
Information Security Technical Report | Year: 2012

Information security has become a boardroom topic, lost laptops and hacked systems make front page news across the globe, but while technology is a key piece of any corporate security strategy, it is not enough. In this paper, Dr. Bunker examines the change in emphasis for information security from being hidden in the backroom of IT to a responsibility of every employee. Security needs to be taken into account in every IT activity, but it has to match the requirements and needs of the business. Information security has given way to the more comprehensive information assurance which can be categorized into more than thirty different strategic, operational and tactical controls. This paper examines the different controls and how a maturity model can be used to prioritise improvements by concentrating on the people and the processes as well as the technology. Finally it looks at the implications of cloud computing on information assurance and on how people can be an organizations greatest security asset. © 2011 Elsevier Ltd. All rights reserved.

Discover hidden collaborations