161 research outputs found

    Reviewing effectivity in security approaches towards strengthening internet architecture

    Get PDF
    The usage of existing Internet architecture is shrouded by various security loopholes and hence is highly ineffective towards resisting potential threats over internet. Hence, it is claimed that future internet architecture has been evolved as a solution to address this security gaps of existing internet architecture. Therefore, this paper initiates its discussion by reviewing the existing practices of web security in conventional internet architecture and has also discussed about some recent solutions towards mitigating potentially reported threats e.g. cross-site scripting, SQL inject, and distributed denial-of-service. The paper has also discussed some of the recent research contribution towards security solution considering future internet architecture. The proposed manuscripts contributes to showcase the true effectiveness of existing approaches with respect to advantages and limitation of existing approaches along with explicit highlights of existing research problems that requires immediate attention

    Motherhood as a Unifying Theme in Social Movements: Symbolic Essentialism, Environmental Justice, and the Movement Against Bisphenol A in Maine

    Get PDF
    Environmental injustice has typically been an infringement of the rights of poor and minority communities from a “Not in my Backyard” mindset with regards to harmful chemicals. However, the pervasiveness of many chemicals, including bisphenol A has narrowed the exposure gap so that everyone, regardless of class or race, is affected by these chemicals. The United States has a history of being a responsive rather than a proactive agent regarding chemical regulation, but the environmental and health stakes are now too high to continue with this approach. The movement in Maine to reduce exposure to bisphenol A can be seen as a continuation of organizing for environmental justice because the movement incorporates classic organizing techniques and challenges what we perceive as the “environment” that should be regulated by governmental action. The movement in Maine and the subsequent policy put in place to regulate the hormone-disrupting chemical bisphenol A can be used as a model to demonstrate the route that the new tributary of the environmental justice movement can take. The health effects of bisphenol A and similar chemicals combined with their omnipresence demonstrate the need to protect American consumers from the persistent toxic chemicals that are in our lives because of pressure from industry, gaps in regulatory policy, and governmental inaction

    Respawn

    Get PDF
    In Respawn Colin Milburn examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, Milburn illustrates how they impact the lives of gamers and non-gamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. Providing an essential walkthrough guide to our digital culture and its high-tech controversies, Milburn shows how games and playable media spawn new modes of engagement in a computerized world

    Cyber Security and Critical Infrastructures

    Get PDF
    This book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles: an editorial explaining current challenges, innovative solutions, real-world experiences including critical infrastructure, 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems, and a review of cloud, edge computing, and fog's security and privacy issues

    Application of systems engineering to complex systems and system of systems

    Get PDF
    2017 Spring.Includes bibliographical references.This dissertation is an investigation of system of systems (SoS). It begins with an analysis to define, with some rigor, the similarities and differences between complex systems and SoS. With this foundation, the baseline concept is development for several different types of systems and they are used as a practical approach to compare and contrast complex systems versus SoS. The method is to use a progression from simple to more complex systems. Specifically, a pico hydro electric power generation system, a hybrid renewable electric power generation system, a LEO satellites system, and Molniya orbit satellite system are investigated. In each of these examples, systems engineering methods are applied for the development of a baseline solution. While these examples are complex, they do not rise to the level of a SoS. In contrast, a multi-spectral drone detection system for protection of airports is investigated and a baseline concept for it is generated. The baseline is shown to meet the minimum requirements to be considered a SoS. The system combines multiple sensor types to distinguish drones as targets. The characteristics of the drone detection system which make it a SoS are discussed. Since emergence is considered by some to be a characteristic of a SoS, it is investigated. A solution to the problem of determining if system properties are emergent is presented and necessary and sufficient conditions for emergence are developed. Finally, this work concludes with a summary and suggestions for additional work

    An Approach to Guide Users Towards Less Revealing Internet Browsers

    Get PDF
    When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string. This string contains information related to the sender’s device, browser, and operating system. Previous research has shown that there are numerous privacy and security risks result from exposing sensitive information in the User-Agent string. For example, it enables device and browser fingerprinting and user tracking and identification. Our large analysis of thousands of User-Agent strings shows that browsers differ tremendously in the amount of information they include in their User-Agent strings. As such, our work aims at guiding users towards using less exposing browsers. In doing so, we propose to assign an exposure score to browsers based on the information they expose and vulnerability records. Thus, our contribution in this work is as follows: first, provide a full implementation that is ready to be deployed and used by users. Second, conduct a user study to identify the effectiveness and limitations of our proposed approach. Our implementation is based on using more than 52 thousand unique browsers. Our performance and validation analysis show that our solution is accurate and efficient. The source code and data set are publicly available and the solution has been deployed

    Cyber Law and Espionage Law as Communicating Vessels

    Get PDF
    Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225. Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices – the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp

    Regulating terrorist content on tech platforms: A proposed framework based on social regulation

    Get PDF
    Scholars have been arguing for years that responses to terrorist content on tech platforms have, to-date, been inadequate. Past responses have been reactive and fragmented with tech platforms self-regulating. Over the last few years, many governments began to decide that the self-regulatory approach was not working. As a result, a number of regulatory frameworks have been proposed and/or implemented. However, they have been highly criticised. The purpose of this thesis is to propose a new regulatory framework to counter terrorist content on tech platforms and overcome many of these criticisms. Scholars have argued that it is vital that future regulation be informed by past experience and supported by evidence from prior research. Therefore, a number of steps were taken. First, this thesis examines a review of literature into what platforms are exploited by terrorist organisations. Next, a content analysis was undertaken on blogposts that tech platforms publish in order to investigate the efforts that tech platforms report making to counter terrorist content on their services and the challenges that they face. Third, a sample of existing or currently proposed regulatory frameworks were examined in order to learn what was done well and what gaps, limitations and challenges exist that require addressing in future regulation. Finally, social regulation theory was identified as applicable in this regulatory context. Social regulation strategies were examined in three other regulatory contexts in order to examine whether they could be used in this regulatory context. The findings from the above analyses were used to inform a new regulatory framework that is proposed in this thesis. In addition to proposing a new regulatory framework, this thesis also identified three compliance issues that tech platforms may face. These compliance issues are addressed alongside the proposal of the framework. Overall, it is argued that previous regulatory attempts failed to consider the diverse array of challenges that are faced by different platforms when countering terrorist content. The regulatory framework proposed in this thesis researched these challenges and identified strategies from a social regulation approach, learning lessons from how they were applied elsewhere to overcome some of the key criticisms and limitations of existing regulatory practice
    • …
    corecore