17 research outputs found

    The Vulnerability Assessment and Penetration Testing of Two Networks

    Get PDF
    Vulnerability assessments and penetration testing are two approaches available for use by internet security practitioners to determine the security posture of information networks. By assessing network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing security professionals are able to evaluate the effectiveness of their network defenses by identifying defense weaknesses, affirming the defense mechanisms in place, or some combination of the two. This project is a discussion of the methods and tools used during the vulnerability assessment and penetration testing, and the respective test results of two varied and unique networks. The assessment and testing of the first network occurred from an internal perspective, while the assessment and testing of the second occurred from an external perspective. While the tools and methodologies used across both networks were consistent, the test results differed significantly. The paper concludes with a series of recommendations regarding practical methods and tools that may prove useful to anyone interested in network security, and vulnerability assessments and penetration testing in particular

    The Geopolitical Commission: Learning the ‘Language of Power’? College of Europe Policy Brief #2/20 February 2020

    Get PDF
    The European Commission under President Ursula von der Leyen has branded itself as a ‘geopolitical Commission’. Does this imply a geopolitical turn in the external action of the European Union (EU)? > According to High Representative Josep Borrell, the EU needs to learn the ‘language of power’ so as to translate its resources into geopolitical impact. First fledgling signs of a search for more economic sovereignty, strategic autonomy, leadership and ‘weaponised’ trade have emerged already in recent years. Many of these initiatives still need to be implemented while new ones are being added. > Geopolitical EU external action implies a more integrated external action. It also means reinforcing the EU’s resilience against external pressure, while not neglecting ‘geopolitical cooperation’ in the face of geopolitical competition. The geopolitical Commission will have to find a ‘European way’ to deal with great power challenges in line with the EU’s capabilities and values

    Technical Considerations in Remote LIMS Access via the World Wide Web

    Get PDF
    The increased dependency on the World Wide Web by both laboratories and their customers has led LIMS developers to take advantage of thin-client web applications that provide both remote data entry and manipulation, along with remote reporting functionality. Use of an LIMS through a web browser allows a person to interact with a distant application, providing both remote administration and real-time analytical result delivery from virtually anywhere in the world. While there are many benefits of web-based LIMS applications, some concern must be given to these new methods of system architecture before justifying them as a suitable replacement for their traditional client-server systems. Developers and consumers alike must consider the security aspects of introducing a wide area network capable system into a production environment, as well as the concerns of data integrity and usability

    The Geopolitical Commission: Learning the ‘Language of Power’? College of Europe Policy Brief February 2020.

    Get PDF
    The European Commission under President Ursula von der Leyen has branded itself as a ‘geopolitical Commission’. Does this imply a geopolitical turn in the external action of the European Union (EU)? According to High Representative Josep Borrell, the EU needs to learn the ‘language of power’ so as to translate its resources into geopolitical impact. First fledgling signs of a search for more economic sovereignty, strategic autonomy, leadership and ‘weaponised’ trade have emerged already in recent years. Many of these initiatives still need to be implemented while new ones are being added. Geopolitical EU external action implies a more integrated external action. It also means reinforcing the EU’s resilience against external pressure, while not neglecting ‘geopolitical cooperation’ in the face of geopolitical competition. The geopolitical Commission will have to find a ‘European way’ to deal with great power challenges in line with the EU’s capabilities and values

    Special issue on 'Dark side of information technology use':an introduction and a framework for research

    Get PDF
    We introduce the Special Issue on “Dark Side of Information Technology Use”. We first provide a brief summary of the literature and suggest a framework as guidance for future research on dark side phenomenon. We then comment on and characterize the papers presented in this Special Issue using this framework

    The Update, March 2015

    Get PDF
    Inside this issue: -- UNI & the Arts: Department of Art Faculty Engage Students at Waterloo East High School-- Department News-- School of Music Events-- UNI Wins Big at AAF: UNI Department of Art Students Bring Home the Gold-- Alumni Spotlight: Department of Philosophy and World Religions: Rick Grisel-- Alumni Spotlight: Department of Theatre: Michaela Nelson-- Student Spotlight: Department of Chemistry and Biochemistry: Angela Weepie-- Mesa Española, Department of Languages and Literatures-- Student Spotlight: Department of Theatre: Cory Skold-- Student Spotlight: Department of Computer Science: Mojtaba Alfardan-- Physics Club, Department of Physics-- UNI Student Travels to Austria: School of Music Student Emily Bicknese for Music-- All the CHAS that\u27s Fit to Print: March 2015 Eventshttps://scholarworks.uni.edu/chasnews/1026/thumbnail.jp

    Managing Vulnerabilities of Tactical Wireless RF Network Systems: A Case Study

    Get PDF
    Organisations and individuals benefit when wireless networks are protected. After assessing the risks associated with wireless technologies, organisations can reduce the risks by applying countermeasures to address specific threats and vulnerabilities. These countermeasures include management, operational and technical controls. While these countermeasures will not prevent all penetrations and adverse events, they can be effective in reducing many of the common risks associated with wireless RF networks. Among engineers dealing with different scaled and interconnected engineering systems, such as tactical wireless RF communication systems, there is a growing need for a means of analysing complex adaptive systems. We propose a methodology based on the systematic resolution of complex issues to manage the vulnerabilities of tactical wireless RF systems. There are is a need to assemble and balance the results of any successful measure, showing how well each solution meets the system’s objectives. The uncertain arguments used and other test results are combined using a form of mathematical theory for their analysis. Systems engineering thinking supports design decisions and enables decision‐makers to manage and assess the support for each solution. In these circumstances, complexity management arises from the many interacting and conflicting requirements of an increasing range of possible parameters. There may not be a single ‘right’ solution, only a satisfactory set of resolutions which this system helps to facilitate. Smart and innovative performance matrixes are introduced using a mathematical Bayesian network to manage, model, calculate and analyse all the potential vulnerability paths in wireless RF networks

    Remote connection improvement to SC OSHA, OVP, NCR server

    Get PDF
    This paper discusses the use of remote access computers for use by employees at the South Carolina Department of Labor, Licensing, and Regulation. This will allow the personnel to file their reports more timely and with less frustration than they experience with a single modem connection access
    corecore