Tuesday, February 25, 2020

Summery Essay Example | Topics and Well Written Essays - 250 words - 14

Summery - Essay Example This is because crime is not spread evenly across the maps. Therefore, the NIJs have to come up with a formula to map the crimes depending on the concentration of crimes (National Institute of Justice). However, different types of crime hot spots areas require different types of maps because each area has different types of crime. The report further explains the different types of crime theories, as well as, how they can be depicted on the maps. It further gives the techniques and methods used in understanding crime hot spots, as well as, spatial analysis tools that are used for identifying such hot spots. The report concludes by giving an approach to hot spot analysis. The most interesting thing about the report is that it informs the reader on how crime mapping can be used to understand patterns of recidivism and incarceration. This helps target programs and resources in evaluating crime reduction or prevention in reduction programs, as well as, understanding the causes of crime. The approach of crime mapping is important because it ensures that the NIJs understands the issues the crimes that are committed in every community and methods to go about how to resolve and reduce

Saturday, February 8, 2020

Securing Data using IPSEC VPN over Satellite Communication Research Proposal

Securing Data using IPSEC VPN over Satellite Communication - Research Proposal Example Special focus will be put on Internet Protocol Security or IPSec protocol suite based VPN technology. A VPN is a kind of relatively secure network communication system. With the help of tunneling techniques (for example, HTTP tunnel), tunneling protocols (Layer 2 Tunneling Protocol or L2TP), IPSec technology, etc., a VPN is capable of operating as a secure and cost-effective network even inside the framework of a public network infrastructure (Bentley Walker 2012). Providers are now establishing VPN compatible with satellite communication systems (Siris, Ververidis, and Polyzos 2013). However, according to Fereidooni, Taheri, and Mahramian (2012:228): â€Å"In essence, a VPN provides a secured tunnel between two end points across a public network. The protocols used over the Internet (TCP/IP) are designed for reliable end-to-end data delivery over unreliable and congested networks †¦ However, satellite bears a high latency (delay) medium and TCP response to such latency is not in a determined way.† In general, satellite modems are utilized for operating a VPN over satellite. These modems help to send TCP/IP data in the form of radio frequency or RF. They also help in receiving TCP/IP data from the RF signals. This kind of network communication system is termed as the â€Å"VPN over satellite† (Bentley Walker 2012, paragraph 1; Ground Control 2014) technology, which has become a crucial necessity for remote users. While analyzing the security issues around VPN, Zhu and Ma (2004) stated that public key infrastructure (PKI) can be especially helpful along with dedicated network level key exchange protocols to enhance data protection. Within a few years, Demirel, Alagoz, and Ufuk (2006) stated that flow identification methods too are crucial for IPSec VPN technology operated via satellites. Much later, Fereidooni et al (2009) developed an enhanced