Solange Ghernaouti-Hélie - Academia.edu (original) (raw)

Uploads

Papers by Solange Ghernaouti-Hélie

Research paper thumbnail of Sécurité informatique et criminalité informatique : une nécessaire maîtrise des risques

Research paper thumbnail of 802.11i Encryption Key Distribution Using Quantum Cryptography

Abstract—Quantum cryptography is a promising solution towards absolute security in long term cryp... more Abstract—Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. In this paper, we analyze the interests of using quantum cryptography in 802.11 wireless networks, and propose a scheme integrating quantum cryptography in 802.11i security mechanisms for the distribution of the encryption keys. The use of an apparatus network to provide alternative line-of-sight paths is also discussed. Index Terms—802.11i, quantum cryptography, network security. I.

Research paper thumbnail of Menaces, conflits dans le cyberespace et cyberpouvoir

Sécurité et stratégie

La recente revelation de postes de commande de drones americains infectes par un virus constitue ... more La recente revelation de postes de commande de drones americains infectes par un virus constitue une enieme alerte. Si ce genre d’intrusion ne s’est, a ce jour, pas solde par une atteinte majeure a la surete d’un Etat, la plus grande vigilance est requise. Solange Ghernaouti-Helie, professeur a l’universite de Lausanne, presente dans cet article les diverses formes d’expression de conflits qui peuvent se manifester dans le cyberespace et met en exergue le role que peuvent jouer les civils, y compris les hacktivistes, dans la force de frappe informatique d’un pays. L’article donne un eclairage sur les notions de cyberguerre et de cyberdefense, sur les moyens de prevention comme de reaction et souleve le probleme de l’identification de l’origine des cyberattaques. Une reflexion sur les aspects legaux relatifs a la cyberguerre et a la cybercriminalite conclut cet article en identifiant le besoin d’une approche holistique de la cybersecurite, basee sur une cooperation de tous les acteurs et une collaboration internationale efficace.

Research paper thumbnail of Evaluating the Human Dimension

Information Security Evaluation

Research paper thumbnail of Index of Keywords and Concepts

Information Security Evaluation

Research paper thumbnail of Sécurité informatique et réseaux : Cours avec plus de 100 exercices corrigés Ed. 3

Cet ouvrage offre un panorama global, pedagogique et concis des aspects techniques, organisationn... more Cet ouvrage offre un panorama global, pedagogique et concis des aspects techniques, organisationnels et juridiques du monde de la securite informatique, de la securite des reseaux (Internet notamment), et de la securite des telecoms (GSM, UMTS...). Partant des enjeux et des menaces lies a la securite informatique, il passe en revue les concepts permettant la maitrise des risques et la mise en oeuvre de solutions de securite. De nombreuses references et annexes ainsi que plus de 100 exercices corriges font de ce livre un veritable outil de formation et de travail. Cette troisieme edition integre les nouveaux developpements et savoir-faire en matiere de management et d'ingenierie de la securite de l'information, tous les exercices corriges ont ete revus et actualises.

Research paper thumbnail of Internet, l'entreprise et les nouveaux métiers

Research paper thumbnail of OpenAdap.Net: a Community-Based Shared System

Research paper thumbnail of Considérations économiques et politiques

Research paper thumbnail of Information Security Assurance: An Assessment Model

Research paper thumbnail of Index of Keywords and Concepts

Research paper thumbnail of Evaluating the Organizational Dimension

Information Security Evaluation

Research paper thumbnail of Les enjeux de l'Internet

Research paper thumbnail of Introduction to the special theme « Cybercrime and Privacy Issues »

Ercim News, 2012

44 years ago Charles P. Lickson in a well-known paper "Privacy and the computer age" (I... more 44 years ago Charles P. Lickson in a well-known paper "Privacy and the computer age" (IEEE Spectrum, October 1968, pp. 58-63) began his abstract with the prediction "By the year 2000, Americans could have computers and robots in the home - and virtually no privacy". Now, in 2012, we could say better "virtually no privacy and a lot of cybercrimes".

Research paper thumbnail of Security metrics to improve information security management

The concept of security metrics is a very important aspect for information security management. S... more The concept of security metrics is a very important aspect for information security management. Security metrics are tools to facilitate decision making and to improve performance and accountability. The aim of information security is to ensure business continuity and minimise business damage by preventing and minimising the impact of security incidents. In that way security is not only a technical matter. In a security metrics generation perspective, organizations must take into consideration all information security dimensions including technical, organizational, human and conformity aspects in order to be competitive whilst providing stakeholders detailed information about the complete structure of the organizations’ information security and risk treatment processes. This paper discusses ways to identify the right metrics to measure security preparedness and awareness within an organization.

Research paper thumbnail of E-commerce et marketing sur Internet

Research paper thumbnail of Risk Management Versus Security Management

Research paper thumbnail of Cybercriminalité, blanchiment d'argent et sécurité informatique, publié dans "Revue Banque et finance

Research paper thumbnail of Des origines aux réalités de l'Internet

Research paper thumbnail of E-privacy policy documents to enhance E-services

Privacy is a real concern for e-services users. Cyber crime, as the justice and police investigat... more Privacy is a real concern for e-services users. Cyber crime, as the justice and police investigations increase needs, affectS effective eprivacy solutions. Internet privacy challenges, issues and threats are presented. Benefits and limits of existing privacy solutions and the P3P project (W3C) are analyzed. Recommendations are proposed to preserve privacy and satisfy security objectives for organizations by their improving their E-privacy policy documents.

Research paper thumbnail of Sécurité informatique et criminalité informatique : une nécessaire maîtrise des risques

Research paper thumbnail of 802.11i Encryption Key Distribution Using Quantum Cryptography

Abstract—Quantum cryptography is a promising solution towards absolute security in long term cryp... more Abstract—Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. In this paper, we analyze the interests of using quantum cryptography in 802.11 wireless networks, and propose a scheme integrating quantum cryptography in 802.11i security mechanisms for the distribution of the encryption keys. The use of an apparatus network to provide alternative line-of-sight paths is also discussed. Index Terms—802.11i, quantum cryptography, network security. I.

Research paper thumbnail of Menaces, conflits dans le cyberespace et cyberpouvoir

Sécurité et stratégie

La recente revelation de postes de commande de drones americains infectes par un virus constitue ... more La recente revelation de postes de commande de drones americains infectes par un virus constitue une enieme alerte. Si ce genre d’intrusion ne s’est, a ce jour, pas solde par une atteinte majeure a la surete d’un Etat, la plus grande vigilance est requise. Solange Ghernaouti-Helie, professeur a l’universite de Lausanne, presente dans cet article les diverses formes d’expression de conflits qui peuvent se manifester dans le cyberespace et met en exergue le role que peuvent jouer les civils, y compris les hacktivistes, dans la force de frappe informatique d’un pays. L’article donne un eclairage sur les notions de cyberguerre et de cyberdefense, sur les moyens de prevention comme de reaction et souleve le probleme de l’identification de l’origine des cyberattaques. Une reflexion sur les aspects legaux relatifs a la cyberguerre et a la cybercriminalite conclut cet article en identifiant le besoin d’une approche holistique de la cybersecurite, basee sur une cooperation de tous les acteurs et une collaboration internationale efficace.

Research paper thumbnail of Evaluating the Human Dimension

Information Security Evaluation

Research paper thumbnail of Index of Keywords and Concepts

Information Security Evaluation

Research paper thumbnail of Sécurité informatique et réseaux : Cours avec plus de 100 exercices corrigés Ed. 3

Cet ouvrage offre un panorama global, pedagogique et concis des aspects techniques, organisationn... more Cet ouvrage offre un panorama global, pedagogique et concis des aspects techniques, organisationnels et juridiques du monde de la securite informatique, de la securite des reseaux (Internet notamment), et de la securite des telecoms (GSM, UMTS...). Partant des enjeux et des menaces lies a la securite informatique, il passe en revue les concepts permettant la maitrise des risques et la mise en oeuvre de solutions de securite. De nombreuses references et annexes ainsi que plus de 100 exercices corriges font de ce livre un veritable outil de formation et de travail. Cette troisieme edition integre les nouveaux developpements et savoir-faire en matiere de management et d'ingenierie de la securite de l'information, tous les exercices corriges ont ete revus et actualises.

Research paper thumbnail of Internet, l'entreprise et les nouveaux métiers

Research paper thumbnail of OpenAdap.Net: a Community-Based Shared System

Research paper thumbnail of Considérations économiques et politiques

Research paper thumbnail of Information Security Assurance: An Assessment Model

Research paper thumbnail of Index of Keywords and Concepts

Research paper thumbnail of Evaluating the Organizational Dimension

Information Security Evaluation

Research paper thumbnail of Les enjeux de l'Internet

Research paper thumbnail of Introduction to the special theme « Cybercrime and Privacy Issues »

Ercim News, 2012

44 years ago Charles P. Lickson in a well-known paper "Privacy and the computer age" (I... more 44 years ago Charles P. Lickson in a well-known paper "Privacy and the computer age" (IEEE Spectrum, October 1968, pp. 58-63) began his abstract with the prediction "By the year 2000, Americans could have computers and robots in the home - and virtually no privacy". Now, in 2012, we could say better "virtually no privacy and a lot of cybercrimes".

Research paper thumbnail of Security metrics to improve information security management

The concept of security metrics is a very important aspect for information security management. S... more The concept of security metrics is a very important aspect for information security management. Security metrics are tools to facilitate decision making and to improve performance and accountability. The aim of information security is to ensure business continuity and minimise business damage by preventing and minimising the impact of security incidents. In that way security is not only a technical matter. In a security metrics generation perspective, organizations must take into consideration all information security dimensions including technical, organizational, human and conformity aspects in order to be competitive whilst providing stakeholders detailed information about the complete structure of the organizations’ information security and risk treatment processes. This paper discusses ways to identify the right metrics to measure security preparedness and awareness within an organization.

Research paper thumbnail of E-commerce et marketing sur Internet

Research paper thumbnail of Risk Management Versus Security Management

Research paper thumbnail of Cybercriminalité, blanchiment d'argent et sécurité informatique, publié dans "Revue Banque et finance

Research paper thumbnail of Des origines aux réalités de l'Internet

Research paper thumbnail of E-privacy policy documents to enhance E-services

Privacy is a real concern for e-services users. Cyber crime, as the justice and police investigat... more Privacy is a real concern for e-services users. Cyber crime, as the justice and police investigations increase needs, affectS effective eprivacy solutions. Internet privacy challenges, issues and threats are presented. Benefits and limits of existing privacy solutions and the P3P project (W3C) are analyzed. Recommendations are proposed to preserve privacy and satisfy security objectives for organizations by their improving their E-privacy policy documents.