11,133 research outputs found

    An Analysis of Successful SQLIA for Future Evolutionary Prediction

    Get PDF
    Web applications are a fundamental component of the internet, many interact with backend databases. Securing web applications and their databases from hackers should be a top priority for cybersecurity researchers. Structured Query Language (SQL) injection attacks (SQLIA) constitute a significant threat to web applications. They can hijack the backend databases to steal personally identifiable information (PII), initiate scams, or launch more sophisticated cyberattacks. SQLIA has evolved since its conception in the early 2000s and will continue to do so in the coming years. This paper analyzes past literature and successful SQLIA from specific time periods to identify themes and methods used by security researchers and hackers. By extrapolating and interpreting the themes of both literature and effective SQLIA, trends can be identified, and a clearer understanding of the future of SQL injection can be defined to improve cybersecurity best practices

    Effective Counterterrorism: What Have We Learned so Far?

    Get PDF
    The fight against terrorism, in particular of Islamist nature, has become a focus area of foreign and security policies in Western countries and around the world. This substantial effort is however only to a limited extent matched by adequate evaluations as to its actual success. This paper offers an overview of the counterterrorism effectiveness literature in terms of main areas of interest, conceptualisation and operationalisation difficulties as well as methodological considerations regarding the types of methods used, validity and reliability evaluations. It discusses the different understandings of causality and proposes a working definition of counterterrorism effectiveness. We find that a main focus of the literature lies on the impact component of effectiveness, often in the sense of a reduction of terrorist attacks in general or a reduction of certain methods of terrorism such as suicide attacks. Our model article "What Happened to Suicide Bombings in Israel? Insights from a Terror Stock Model" by Kaplan et al. (2005) illustrates the above-mentioned issues and reflects the mainstream approach in this field. The article uses econometric methods to determine the impact-effectiveness of counter-terrorism and reflects the problematique associated with attempts to infer a causal relationship between counterterrorism policies and the occurrence of terrorism.Counterterrorism, effectiveness, causality, quantitative and qualitative research methods

    Plant-based remedies for wolf bites and rituals against wolves in the Iberian Peninsula: therapeutic opportunities and cultural values for the conservation of biocultural diversity

    Get PDF
    Combined approaches to local knowledge and folk plant use improve awareness and promote effective strategies for the conservation of significant biocultural patrimony. Moreover, the information reported might be the basis for further appropriate phytochemical and pharmacological research. Therefore we provide an insight into traditional herbal remedies and practices for healing bite injuries in humans and domestic animals caused by the Iberian wolf. Wolf bites are associated with inflammatory processes and rabies is a potential complication AIMS: This paper describes and summarises the medicinal-veterinary empirical and ritual uses of the Iberian flora for wolf injuries and reviews the ethnopharmacological data of specific plants that are already published. The Iberian wolf is a critically endangered subspecies of the grey wolf. Livestock attacks attributed to wolves are increasingly frequent in the Iberian Peninsula, resulting in serious social problems. Interesting strategies for Iberian wolf conservation might be related to traditional grazing practices that are deeply linked with empirical knowledge and local practices passed on by oral tradition, which are also vulnerable now.info:eu-repo/semantics/publishedVersio

    Familial Mediterranean fever, from pathogenesis to treatment: a contemporary review

    Get PDF
    Familial Mediterranean fever (FMF) (OMIM #249100) is the most common hereditary autoinflammatory disease in the world. FMF is caused by gain of function mutations of MEFV gene which encodes an immune regulatory protein, pyrin. Over the last few years, we have witnessed several new developments in the pathogenesis, genetic testing, diagnosis, comorbidities, disease related damage and treatment approaches to FMF. Elucidation of some of the pathogenic mechanisms has led to the discovery of pathways involved in inflammatory, metabolic, cardiovascular and degenerative diseases. The use of next generation sequencing in FMF has revealed many new gene variants whose clinical significance may be clarified by developing functional assays and biomarkers. Clinically, although FMF is considered an episodic disease characterized by brief attacks, recent systematic studies have defined several associated chronic inflammatory conditions. Colchicine is the mainstay of FMF treatment, and interleukin (IL)-1 antagonists are the treatment of choice in refractory or intolerant cases. Experience of IL-1 antagonists, anakinra and canakinumab, is now available in thousands of colchicine resistant or intolerant FMF patients. In this contemporary review, we surveyed current FMF knowledge in the light of these recent advances

    Identification of prognostic factors predicting the long-term clinical outcome in Multiple Sclerosis

    Get PDF
    Multiple Sclerosis (MS) evolution varies from benign to aggressive forms, and its prognosis remains largely unpredictable, especially in individual cases. Relapse frequency is commonly used as indicator of disease activity and as primary endpoint in randomized clinical trials (RCTs). However, the role of inflammatory attacks on the disease progression is still largely debated. The lack of reliable predictors of the long-term evolution prevents from applying a rational and individualized therapeutic approach. In addition, RCTs methodology is still not sufficiently rigorous for protecting against the bias due to the large variability of the clinical outcome. The project was carried out by analysing the London Ontario (LO) database, one of the largest collections of natural history data from untreated patients, followed up for 28 years. We analysed factors affecting prognosis and predicting disease evolution up to its latest stages. We first investigated in details the relationship between relapses and long-term outcome. The analysis demonstrated poor correlation between number of attacks and the attainment of severe disability, invalidating relapse frequency as surrogate marker for late outcome. In addition, it evidenced the onset of the secondary progressive (SP) phase as the key determinant of prognosis, differentiating patients’ outcome and accounting for the variability of disease course. We therefore analysed in details factors affecting the rate of conversion to SP MS, in order to calculate how the risk of becoming progressive varies with disease duration. This information can be used for designing RCTs using SP onset as primary outcome. We then extensively investigated the effect of age on the disease evolution, before and after the onset of progression. The analysis highlighted age as the strongest determinant of MS prognosis, exerting its predictive effect primarily by affecting the evolution of the relapsing remitting (RR) phase and by increasing the probability of experiencing a progressive courseOpen Acces

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators

    Development of Incident Response Playbooks and Runbooks for Amazon Web Services Ransomware Scenarios

    Get PDF
    In today’s digital landscape, enterprises encounter myriad cybersecurity challenges that jeopardize their critical digital assets. Modern cyber threats have evolved drastically, adapting to the proliferation of cloud technologies that drive organizations towards platforms like AWS that offer convenience, cost-reduction, and reliability. However, this transition introduces new security risks because threat actors are motivated to craft and deploy advanced malware explicitly targeting the cloud. Ransomware emerged as one of the most impactful and dangerous cyber threats, still in 2023, encrypting data and demanding payment (usually in untraceable tokens) for the decryption key. Confidentiality, integrity, and availability of cloud assets stand perpetually vulnerable, and sometimes, unprepared businesses suddenly hit by ransomware cannot find a way out. Besides financial loss and operation disruption, the breach of sensitive information compromises trust, leading to reputational damage that's hard to mend. Corporations are urged to develop robust defensive strategies to identify, contain, and recover from ransomware and other cloud threat exploitation. Traditional cybersecurity approaches must rapidly reshape to manage emerging menaces. Hence, they require new specialized and well-structured incident response plans to become the bedrock of the security tactics. This thesis dives into the complexities of designing and implementing accurate incident response Playbooks and Runbooks, focusing on handling the common danger of ransomware, especially within Amazon Web Services (AWS). This research journey is strictly connected to the real-world context, resulting from a six-month internship within Bynder, a digital asset management leader company. This experience culminated in conceptualizing the step-by-step procedures against ransomware incidents in cloud infrastructures, improving communication, and coordinating actions during high-pressure situations

    A review of cyber security risk assessment methods for SCADA systems

    Get PDF
    This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluation and tool support. Based on the analysis, we suggest an intuitive scheme for the categorisation of cyber security risk assessment methods for SCADA systems. We also outline five research challenges facing the domain and point out the approaches that might be taken

    Exploring Current Trends and Challenges in Cybersecurity: A Comprehensive Survey

    Get PDF
    Cyber security is the process of preventing unauthorized access, theft, damage, and interruption to computers, servers, networks, and data. It entails putting policies into place to guarantee the availability, confidentiality, and integrity of information and information systems. Cyber security seeks to protect against a variety of dangers, including as hacking, data breaches, malware infections, and other nefarious actions.  Cyber security has grown to be a major worry as a result of the quick development of digital technology and the growing interconnection of our contemporary society. In order to gain insight into the constantly changing world of digital threats and the countermeasures put in place to address them, this survey seeks to study current trends and issues in the area of cyber security. The study includes responses from end users, business executives, IT administrators, and experts across a wide variety of businesses and sectors. The survey gives insight on important problems such the sorts of cyber threats encountered, the efficacy of current security solutions, future technology influencing cyber security, and the human elements leading to vulnerabilities via a thorough analysis of the replies. The most important conclusions include an evaluation of the most common cyber dangers, such as malware, phishing scams, ransom ware, and data breaches, as well as an investigation of the methods and tools used to counter these threats. The survey explores the significance of staff education and awareness in bolstering cyber security defenses and pinpoints opportunities for development in this area. The survey also sheds insight on how cutting-edge technologies like cloud computing, artificial intelligence, and the Internet of Things (IoT) are affecting cyber security practices. It analyses the advantages and disadvantages of using these technologies while taking into account issues like data privacy, infrastructure security, and the need for specialized skills. The survey also looks at the compliance environment, assessing how industry norms and regulatory frameworks affect cyber security procedures. The survey studies the obstacles organizations encounter in attaining compliance and assesses the degree of knowledge and commitment to these requirements. The results of this cyber security survey help to better understand the current status of cyber security and provide organizations and individual’s useful information for creating effective policies to protect digital assets. This study seeks to promote a proactive approach to cyber security, allowing stakeholders to stay ahead of threats and build a safe digital environment by identifying relevant trends and concerns

    11th European Headache Federation Congress jointly with 31st Congress of the Italian Society for the Study of Headaches : Rome, Italy. 01-03 December 2017

    Get PDF
    . Aims of the study were explore the relationship between peripheral chromatic and central visual dysfunction evaluating also the presence of functional receptor impairment in patients with migraine, with and without aura examined interictally
    • …
    corecore