9,648 research outputs found

    Pattern for malware remediation – A last line of defence tool against Malware in the global communication platform

    Get PDF
    Malware is becoming a major problem to every organization that operates on the global communication platform. The malicious software programs are advancing in sophistication in many ways in order to defeat harden deployed defenses. When an organization’s defense fails to keep this malice invasion out, the organization would incur significant amount of risks and damages. Risks include data leakage, inability to operate and tarnished corporate image. Damages include compensation costs to customers and partners, service unavailability and loss of customers’ and partners’ confidence in the organization. This in turn will affect the organization’s business continuity. In order to manage the risks and damages induced by Malware incidents, incident responders are called upon to be the last line of defense against the digital onslaught assault. However incident responders are challenged too by the deep levels of knowledge, skills and experience required to contain the ever advancing and persistent Malware. This paper proposes the establishment of a Pattern template for Malware Remediation to aid incident responders to overcome their competency limitations in order to provide organizations the tool to repel Malware and to reduce the associated risks. Examples and details of the proposed patters are provided with discussions on future direction of the research work

    United Nations Improvised Explosive Device Disposal Standards

    Get PDF
    These IEDD Standards have been designed for the safe, effective and efficient disposal of IEDs. They aim at ensuring uniformity and technical specificity related to the generation of an IED disposal capability. They establish the minimum competencies required for IEDD operators and frame the methodology for the clearance of IEDs. The Standards provide guidance on how to carry out IED disposal planning, the competencies and associated training and equipment required to conduct IED disposal operations, as well as the appropriate approaches to IED clearance in rural and urban areas, IED information management and IED risk education. The United Nations IEDD Standards are of a technical nature; they are for use by IED disposal operators and for the organizations and units that employ them under the auspices of the United Nations. For Explosive Ordnance Disposal (EOD) Units deployed in United Nations Peacekeeping Operations, the IEDD Standards outline the competencies required by individuals to meet the collective unit requirements set forth in the United Nations EOD Unit Manual. For commercial and non-governmental organizations contracted by the United Nations, these Standards provide the basis for evaluation of the contractors Standard Operating Procedures (SOPs) for IED disposal operations where the context or mandate objective is not humanitarian

    Prioritizing computer security incident response services for the South African National Research Network (SANReN)

    Get PDF
    The need for the South African (SA) National Research and Education Network (NREN) to establish a Computer Security Incident Response Team (CSIRT) was identified. CSIRTs offer a subset of all possible security services based on the environment and needs of the customers. Selecting this subset has its challenges as the view of the customer may differ from the provider and knowing which services will have the most impact (or be most beneficial) is difficult. In order to address the problem, this paper aims to propose an informed selection and prioritization of initial services for the SA NREN CSIRT, an academic sector CSIRT in South Africa. In order to do this, the first two stages of the IT Infrastructure Library (ITIL) service portfolio management process are used: defining the services based on authoritative CSIRT literature and analyzing them for value proposition and prioritization. A survey was used to obtain the viewpoint of the prospective customer base. The services are then selected based on the revelation of the SA NREN CSIRT as a coordinating CSIRT as well as the survey results. The primary contribution is providing a list of services for the CSIRT in the context of the SA NREN environment that can be used to develop a services portfolio. This study is useful to anyone wishing to select services for a new CSIRT or wanting to revise a CSIRT services portfolio

    XSEDE Campus Bridging Use Cases

    Get PDF
    This document is both a user-­facing document (publicly accessible) and an internal working document intended to define user needs and use cases that fall under the general umbrella of Campus Bridging within the overall activities of XSEDE.XSEDE is supported by National Science Foundation Grant 1053575 (XSEDE: eXtreme Science and Engineering Discovery Environment)

    Prerequisites for creating resources and compositions for cyber defence

    Get PDF
    The aim of this paper is to increase understanding about the prerequisites which evolving cyber society sets for actors, activities and structures of the defenders of society. The research proposes an approach for identifying, analysing and scheduling these prerequisites for decision-making. The paper presents results of two case studies where the proposed approach is applied. The case studies indicate that in the future compositions are needed for forming of joint defence cyber community and resources for joining this community in affordable and beneficial ways. These are the next steps on the strategic path to jointly defended cyber community of global information networks

    ISFSI Conduct of Radiation Protection

    Get PDF
    Docket 072-00027 License SNM- 2514 - To keep affiliated agencies apprised of changes to emergency procedures at the PG&E Humboldt Bay Independent Spent Fuel Storage Installation (HB ISFSl} in Eureka California, a disk containing four (4) implementing procedures is enclosed the disk contains: HBl-200, ISFSI Conduct of Radiation Protection HBl-201, ISFSI Radiological Instruments and Surveys HBl~261, Emergency Event Response and Protective Actions HBl-262, ISFSI Response and Action

    ISFSI Conduct of Radiation Protection

    Get PDF
    Docket 072-00027 License SNM- 2514 - To keep affiliated agencies apprised of changes to emergency procedures at the PG&E Humboldt Bay Independent Spent Fuel Storage Installation (HB ISFSl} in Eureka California, a disk containing four (4) implementing procedures is enclosed the disk contains: HBl-200, ISFSI Conduct of Radiation Protection HBl-201, ISFSI Radiological Instruments and Surveys HBl~261, Emergency Event Response and Protective Actions HBl-262, ISFSI Response and Action

    Implementation of Operational Framework in the Nlp (Based On Mof and Itil Standards)

    Get PDF
    An operational framework, as proposed by the Microsoft Operational Framework (MOF) and the Information Technology Infrastructure Library (ITIL) provides a process model for controlling and managing Information Technology (IT) operations. With a strict focus on IT operations, it provides the processes and terminology to coordinate and integrate the functional elements of an IT department. The Systems Engineering and Applications Development (SEAD) practicum is composed of four main groups; Data Access, Network, Integrated Services and Development. This professional project will propose the beginning framework for overall operation and integration of the SEAD Practicum with an emphasis on service support and documentation. The key deliverable of this project is the determination of a documentation standard and the creation of documentation of common processes that are performed routinely by the SEAD group. This will serve as a basis for transitioning between subsequent practicum and as a foundation upon which other MOF and ITIL processes and standards can be implemented

    Multi-Year Training and Exercise Plan

    Get PDF
    The South Carolina Emergency Management Division is tasked with creating a preparedness program to assure the success of the state's overall emergency management system. This document includes points of contact and a multi-year training schedule
    • 

    corecore