Explore chapters and articles related to this topic
Nonfunctional Testing
Published in William E. Lewis, David Dobbs, Gunasekaran Veerapillai, Software Testing and Continuous Quality Improvement, 2017
William E. Lewis, David Dobbs, Gunasekaran Veerapillai
The security of an application is tested by attempting to violate the built-in security controls. This technique ensures that the protection mechanisms in the system are adequate enough to secure the application from improper and unauthorized access. The tester overloads the system with continuous requests, thereby denying service to others. The tester may deliberately cause system errors to violate security during recovery or may browse through insecure data to find the key to system entry. The following areas need to be tested for security: ■ User authentication■ Password management■ Access controls■ Input validation■ Exception handling■ Secure data storage and transmission■ Logging■ Monitoring and alerting■ Change management■ Application development■ Periodic security assessments and audits
Storage, System Security and Access Control for Big Data IoT
Published in Naveen Chilamkurti, T. Poongodi, Balamurugan Balusamy, Blockchain, Internet of Things, and Artificial Intelligence, 2021
T. Lucia Agnes Beena, T. Kokilavani, D. I. George Amalarethinam
Data generated by the internet is increasing every day which leads to an increase in IoT-based cloud services. IoT devices are used in various fields like healthcare, marketing, weather forecasting, and security management [28]. The main focuses in addressing security issues for data produced from IoT devices are authentication and access control. The security clearance mechanism has to be easily controllable and adaptable. As IoT devices are included in human lifestyle (in tools like fridges, watches, etc.) people with diverse proficiency need to be implicated in security clearance activities. An effective access control mechanism should satisfy three constraints, namely [29]:Confidentiality: To prevent unauthorized access of resourcesAvailability: To ensure access to the authorized users whenever resources are neededIntegrity: To prevent modification of resources without authorizationWhen users try to access data, a strong protection mechanism needs to be applied to check the user’s permission to obtain the data and the allowable conditions to access the data. To ensure security in data storage, different types of access control mechanisms are followed in IoT applications. The enormous amount of heterogeneous data generated by IoT devices needs to be analyzed using big data analytics. The data produced by IoT devices are semi-structured like bank/credit card transactions, current location of a device, and measurements from human body. Traditional database management systems cannot support huge volumes of data in terms of performance, efficacy, flexibility, and scalability. Databases like NoSQL and MapReduce mechanisms are used for the systematic analysis of semi-structured data. A fine-grained access control mechanism is an effective approach for protecting personal and sensitive data. For customized access control, context management is used through which constrained access can be given to data based on exact time periods or geographical locations [30].
Development of a supersonic mist-cooled chiller based on dual-fuzzy control
Published in International Journal of Green Energy, 2019
To prevent the program from malfunctioning, a protection mechanism is required. The mechanism presented in Figure 6 can identify any problems at the start of the program. If this occurs, the program does not load the machine’s operating status and the fan’s current protection compressor, supersonic vibrations, ice water pump, and fan motor shut down. If the program encounters an AI-2≤ low-pressure setting, the supersonic atomizer turns off, as does the fan motor after a time delay.