Explore chapters and articles related to this topic
Dynamic Risk Management
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Ioannis Koufos, Nicholas Kolokotronis, Konstantinos Limniotis
Despite a significant effort in hardening networks, system administrators find it difficult to cope against smart and sophisticated threats. In recent years, cyber-attacks became more complex and one of the most common ways of protecting those complicated networks was to invent smart and sophisticated solutions and strategies as well. System administrators, apart from their other tasks, need to identify and patch vulnerabilities in order to secure their systems. Nevertheless, lack of human resources, lack of funds and interruptions in critical systems usually make this job not systematically achieved. This situation leads to the need of a risk-driven approach to optimize resources for network protection and assessing the network risks, making it necessary to focus on the most important and dangerous threats first. An approach of this type requires an estimation of risk exposures, being provided by metrics regarding the threats of the corresponding network.
Advances in Computing Infrastructure
Published in Siyong Kim, John Wong, Advanced and Emerging Technologies in Radiation Oncology Physics, 2018
Yulong Yan, Alicia Yingling, Steve Jiang
System administration ensures that one or more systems are running appropriately and efficiently. System administration oversees user management, backups, and scheduling software and hardware upgrades as well as security patches. Expertise is required to integrate new systems into the infrastructure. System administrators are involved in upgrading and updating custom development solutions. Best practices should be followed to ensure that resources are secured and that accounts remain functional.
Introduction
Published in Preston de Guise, Data Protection, 2020
Originally, backup and recovery systems were a function of system administrators. Over time, those systems evolved and became a specific job function. A company could potentially have hundreds of system administrators spread across a large number of geographic locations, but it might have backup services centralized and controlled by a small number of administrators operating out of a single location.
Trust aware cryptographic role based access control scheme for secure cloud data storage
Published in Automatika, 2023
K. Roslin Dayana, P. Shobha Rani
As a result of these issues, a significant amount of research in cloud access control has emerged at academic institutions and in the business world, and both sectors have attempted to implement already existing access control solutions [7–12]. However, each of them provides centralized storage and management modalities for identity information, as well as key, authority, authentication and other information. Therefore, the technology of access control still has two problems to solve in terms of privacy and security: An outside adversary launches an assault on the trusted centre, makes unauthorized changes to the database of authorized users that is kept on the central server, and gains unauthorized access to or steals the resources that users have stored in the cloud.A malicious cloud System Administrator (SA) may use the privilege to illegally access resources or tamper with the authorization database to do so.
Dynamic Educational Recommender System Based on Improved Recurrent Neural Networks Using Attention Technique
Published in Applied Artificial Intelligence, 2022
Hadis Ahmadian Yazdi, Seyyed Javad Seyyed Mahdavi Chabok, Maryam Kheirabadi
The Cold-start (New User/Item) problem appears in situations when ERS encounters a user or an item that could be recommended for the first time. In such cases, the system does not have enough information about this user or the item to prepare a meaningful recommendation (Al Mamunur, Karypis, and Riedl 2008). Consequently, the system depends on the manually entered initial parameters about the user or the items of recommendation provided by the user or system administrator. Implicitly gathered information about the user, which does not require the user’s cooperation, will give the system more accurate information about the user’s interest, how the user uses the design, what contents are recommended, etc. (Reddy, 2016). However, for implicit data collection, the user must use the system for a certain period of time. in open education surroundings there is a danger that, due to the lack of information about the new items, they will not be treated like that by the system. In these cases, ERS relies only on the available information about items that are in some cases dependent on the other users of the plan (through ratings, etc.). (Adomavicius and Tuzhilin 2005; Al Mamunur, Karypis, and Riedl 2008).
The Design and Implementation of the Remote Control and Visualization System for Pulse Application Experiments
Published in Fusion Science and Technology, 2022
Yu Gu, Mengqi Fan, Tengfei Cao, Yuanzhe Zhao, Xiaodan Zhang
As for the implementation, a shell script is used on the data server to obtain some performance parameters, and then, the WebSocket protocol is employed for data exchange with the network server. RCVS is responsible for dynamic visualization of the acquired data. Once the web server fails to capture the information from the data server, it will send the first alarm to the system administrator through the Simple Mail Transfer Protocol (SMTP), transmitting the start time of the data server error. When the data server fails, RCVS will shut down some remote services to reduce the server load and at the same time start a standby management solution to work in place of the data server. At this time, the data will flow to a temporary storage tree of MDSplus that is automatically generated based on the guarantee mechanism of data storage. After this task is completed, RCVS will send the second alarm to the administrator, informing the administrator of the end time of the task after the data server malfunctions and the relevant information of the error, and then, RCVS will suspend the work until the whole system resumes operation.