10,735 research outputs found
A Comparison of Cybersecurity Risk Analysis Tools
This paper presents the ongoing work of a decision aiding software intended to support cyber risk and cyber threats analysis of an information and communications technology infrastructure. The work focuses on the evaluation of the different tools in relation to risk assessment and decision making to incorporate some of the characteristics, metrics and strategies that will help cybersecurity risk analysis, decision-making, prevention measures and risk strategies for infrastructure and the protection of an organization's information assets
The Cooperative Defense Overlay Network: A Collaborative Automated Threat Information Sharing Framework for a Safer Internet
With the ever-growing proliferation of hardware and software-based computer security exploits and the increasing power and prominence of distributed attacks, network and system administrators are often forced to make a difficult decision: expend tremendous resources on defense from sophisticated and continually evolving attacks from an increasingly dangerous Internet with varying levels of success; or expend fewer resources on defending against common attacks on "low hanging fruit," hoping to avoid the less common but incredibly devastating zero-day worm or botnet attack. Home networks and small organizations are usually forced to choose the latter option and in so doing are left vulnerable to all but the simplest of attacks. While automated tools exist for sharing information about network-based attacks, this sharing is typically limited to administrators of large networks and dedicated security-conscious users, to the exclusion of smaller organizations and novice home users. In this thesis we propose a framework for a cooperative defense overlay network (CODON) in which participants with varying technical abilities and resources can contribute to the security and health of the internet via automated crowdsourcing, rapid information sharing, and the principle of collateral defense
Recommended from our members
Uncharted Waters: Treating Trauma Symptoms in the Context of Early Psychosis.
Psychosis is conceptualized in a neurodevelopmental vulnerability-stress framework, and childhood trauma is one environmental factor that can lead to psychotic symptoms and the development of psychotic disorders. Higher rates of trauma are associated with higher psychosis risk and greater symptom frequency and severity, resulting in increased hospitalization rates and demand on outpatient primary care and mental health services. Despite an estimated 70% of individuals in the early stages of psychosis reporting a history of experiencing traumatic events, trauma effects (post-traumatic anxiety or depressive symptoms) are often overlooked in psychosis treatment and current interventions typically do not target commonly comorbid post-traumatic stress symptoms. We presented a protocol for Trauma-Integrated Cognitive Behavioral Therapy for Psychosis (TI-CBTp), an approach to treating post-traumatic stress symptoms in the context of early psychosis care. We provided a brief summary of TI-CBTp as implemented in the context of Coordinated Specialty Care and presented preliminary data supporting the use of TI-CBTp in early psychosis care. The preliminary results suggest that individuals with comorbid psychosis and post-traumatic stress symptoms can be appropriately and safely treated using TI-CBTp within Coordinated Specialty Care
Village Building and School Readiness: Closing Opportunity Gaps in a Diverse Society
Examines a community's impacts on child development and frames strategies to build early learning systems in poor minority neighborhoods. Stresses combining services with community-building and developing a diverse early education workforce from within
Developing a gamified peer-reviewed bug bounty programme
Bug bounty processes have remained broadly unchanged since their inception. Existing literature recognises that current methods generate intensive resource demands, impacting upon programme effectiveness. This paper proposes a novel implementation which aims to alleviate resource demands and mitigate inherent issues through gamification. This incorporates the use of additional crowdsourcing of vulnerability verification and reproduction by peers, allowing the client organisation to reduce overheads at the cost of rewarding participants. The system has the potential to be used in Higher Education Institutions which typically face resource and budget constraints
Response time optimization for vulnerability management system by combining the benchmarking and scenario planning models
The growth of information and communication technology has made the internet network have many users. On the other side, this increases cybercrime and its risks. One of the main attack targets is network weakness. Therefore, cyber security is required, which first does a network scan to stop the attack. Points of vulnerability on the network can be discovered using scanning techniques. Furthermore, mitigation or recovery measures can be implemented. However, it needs a short response time and high accuracy while scanning to reduce the level of damage caused by cyber-attacks. In this paper, the proposed method improves the performance of a vulnerability management system based on network and port scanning by combining the benchmarking and scenario planning models. On a network scanning to discover open ports on a subnet, Masscan can achieve response times of less than 2 seconds, and on scenario planning for detection on a single host by Nmap can reach less than 4 seconds. It was combining both models obtained an adequate optimization response time. The total response time is less than 6 seconds
- …