17 research outputs found
The Vulnerability Assessment and Penetration Testing of Two Networks
Vulnerability assessments and penetration testing are two approaches available for use by internet security practitioners to determine the security posture of information networks. By assessing network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing security professionals are able to evaluate the effectiveness of their network defenses by identifying defense weaknesses, affirming the defense mechanisms in place, or some combination of the two. This project is a discussion of the methods and tools used during the vulnerability assessment and penetration testing, and the respective test results of two varied and unique networks. The assessment and testing of the first network occurred from an internal perspective, while the assessment and testing of the second occurred from an external perspective. While the tools and methodologies used across both networks were consistent, the test results differed significantly. The paper concludes with a series of recommendations regarding practical methods and tools that may prove useful to anyone interested in network security, and vulnerability assessments and penetration testing in particular
The Geopolitical Commission: Learning the âLanguage of Powerâ? College of Europe Policy Brief #2/20 February 2020
The European Commission under President Ursula
von der Leyen has branded itself as a âgeopolitical
Commissionâ. Does this imply a geopolitical turn in
the external action of the European Union (EU)?
> According to High Representative Josep Borrell, the
EU needs to learn the âlanguage of powerâ so as to
translate its resources into geopolitical impact. First
fledgling signs of a search for more economic
sovereignty, strategic autonomy, leadership and
âweaponisedâ trade have emerged already in recent
years. Many of these initiatives still need to be
implemented while new ones are being added.
> Geopolitical EU external action implies a more
integrated external action. It also means reinforcing
the EUâs resilience against external pressure, while
not neglecting âgeopolitical cooperationâ in the face
of geopolitical competition. The geopolitical
Commission will have to find a âEuropean wayâ to
deal with great power challenges in line with the
EUâs capabilities and values
Technical Considerations in Remote LIMS Access via the World Wide Web
The increased dependency on the World Wide Web by both laboratories and their customers has led LIMS developers to take advantage of thin-client web applications that provide both remote data entry and manipulation, along with remote reporting functionality. Use of an LIMS through a web browser allows a person to interact with a distant application, providing both remote administration and real-time analytical result delivery from virtually anywhere in the world. While there are many benefits of web-based LIMS applications, some concern must be given to these new methods of system architecture before justifying them as a suitable replacement for their traditional
client-server systems. Developers and consumers alike must consider the security aspects of introducing a wide area network capable system into a production environment, as well as the concerns of data integrity and usability
Recommended from our members
Assessing Software Vulnerabilities and Recovery Time Using Open Resources: Elements Of Technique And Results
Modern vulnerability resources are considered, their content security and recovery time of different software products are analyzed. To make the process smoother and more efficient three main stages are distinguished: source overview, general security and severity analysis, and more detailed vulnerability consideration including recovery time. The proposed approach is universal and can be used almost for any software projects and systems
The Geopolitical Commission: Learning the âLanguage of Powerâ? College of Europe Policy Brief February 2020.
The European Commission under President Ursula von der Leyen has branded itself as a âgeopolitical Commissionâ. Does this imply a geopolitical turn in the external action of the European Union (EU)?
According to High Representative Josep Borrell, the EU needs to learn the âlanguage of powerâ so as to translate its resources into geopolitical impact. First fledgling signs of a search for more economic sovereignty, strategic autonomy, leadership and âweaponisedâ trade have emerged already in recent years. Many of these initiatives still need to be implemented while new ones are being added.
Geopolitical EU external action implies a more integrated external action. It also means reinforcing the EUâs resilience against external pressure, while not neglecting âgeopolitical cooperationâ in the face of geopolitical competition. The geopolitical Commission will have to find a âEuropean wayâ to deal with great power challenges in line with the EUâs capabilities and values
Special issue on 'Dark side of information technology use':an introduction and a framework for research
We introduce the Special Issue on âDark Side of Information Technology Useâ. We first provide a brief summary of the literature and suggest a framework as guidance for future research on dark side phenomenon. We then comment on and characterize the papers presented in this Special Issue using this framework
The Update, March 2015
Inside this issue:
-- UNI & the Arts: Department of Art Faculty Engage Students at Waterloo East High School-- Department News-- School of Music Events-- UNI Wins Big at AAF: UNI Department of Art Students Bring Home the Gold-- Alumni Spotlight: Department of Philosophy and World Religions: Rick Grisel-- Alumni Spotlight: Department of Theatre: Michaela Nelson-- Student Spotlight: Department of Chemistry and Biochemistry: Angela Weepie-- Mesa Española, Department of Languages and Literatures-- Student Spotlight: Department of Theatre: Cory Skold-- Student Spotlight: Department of Computer Science: Mojtaba Alfardan-- Physics Club, Department of Physics-- UNI Student Travels to Austria: School of Music Student Emily Bicknese for Music-- All the CHAS that\u27s Fit to Print: March 2015 Eventshttps://scholarworks.uni.edu/chasnews/1026/thumbnail.jp
Managing Vulnerabilities of Tactical Wireless RF Network Systems: A Case Study
Organisations and individuals benefit when wireless networks are protected. After assessing the risks associated with wireless technologies, organisations can reduce the risks by applying countermeasures to address specific threats and vulnerabilities. These countermeasures include management, operational and technical controls. While these countermeasures will not prevent all penetrations and adverse events, they can be effective in reducing many of the common risks associated with wireless RF networks. Among engineers dealing with different scaled and interconnected engineering systems, such as tactical wireless RF communication systems, there is a growing need for a means of analysing complex adaptive systems. We propose a methodology based on the systematic resolution of complex issues to manage the vulnerabilities of tactical wireless RF systems. There are is a need to assemble and balance the results of any successful measure, showing how well each solution meets the systemâs objectives. The uncertain arguments used and other test results are combined using a form of mathematical theory for their analysis. Systems engineering thinking supports design decisions and enables decisionâmakers to manage and assess the support for each solution. In these circumstances, complexity management arises from the many interacting and conflicting requirements of an increasing range of possible parameters. There may not be a single ârightâ solution, only a satisfactory set of resolutions which this system helps to facilitate. Smart and innovative performance matrixes are introduced using a mathematical Bayesian network to manage, model, calculate and analyse all the potential vulnerability paths in wireless RF networks
Remote connection improvement to SC OSHA, OVP, NCR server
This paper discusses the use of remote access computers for use by employees at the South Carolina Department of Labor, Licensing, and Regulation. This will allow the personnel to file their reports more timely and with less frustration than they experience with a single modem connection access