2,159 research outputs found
Recommended from our members
A Clean-Slate Design for the Next-Generation Secure Internet
This is the report on a workshop held at CMU on July 12-14, 2005. The workshop is part of the planning process initiated by NSF to explore potential architectures for a next generation secure network designed to meet the needs of the 21st century. In considering future architectures, we ignore issues of backward compatibility with the current Internet but seek to benefit from the experience gained by analyzing both the strengths and weaknesses of the current design. Specifically, this workshop looks at the fundamental interplay between security and underlying network architecture and seeks to chart a preliminary course for future work in this crucial research area. This workshop focused on initiating a productive dialog between experts from the network security and network architecture communities. The agenda was arranged to stimulate initial consideration of the security goals for a new Internet, the design space of possible solutions, how research in security and network architecture could be integrated so that security is included as a first-tier objective in future architectures, and to explore methods for identifying and considering the social consequences of these architecture and security design choices
More than a touristic visit: scholar exchanges as a communication method in public diplomacy
This paper discusses the concept of Public Diplomacy and the effectiveness of a specific Public
Diplomacy tool: Scholar Exchanges as a tool of Public Diplomacy. The foreign Fulbright Program of
the United States Government is introduced as a case study and for further interpreting the perceptions
of the program, a survey is ran among 59 current grantees. Scholar exchanges programs are suggested
to be implemented in order to overcome the barriers in communication processes in the international
arena
Choosing IT Platforms In The Age Of Stuxnet
This paper addresses the question of choosing/investing in IT (hardware/software) platforms that avoid quick obsolescence and the underlying dilemmas of choosing proprietary software versus open source software, and opting for managed services such as public cloud computing versus in-house hardware/communication infrastructures. These dilemmas in strategic information systems planning have become more significant in light of the recent revelations of security backdoors in commercial software, encryption backdoors in communication software, and governmental access to private data on managed services for national security reasons. This paper considers enterprise-wide challenges and strategies for adopting open source software/hardware in response to these security concerns
A PERSPECTIVE ON TECHNOLOGY EDUCATION FOR LAW STUDENTS
A PERSPECTIVE ON TECHNOLOGY EDUCATION FOR LAW STUDENT
At the Gates: Analysis of Malicious Activity Facing Residential IP Addresses
The prevalence and permeation of technology in business has allowed for new and very creative ways to steal. With data breaches becoming more common (and more publicized), many people are aware of the threats that large companies face. However, the digital threats that a normal person faces are not as apparent. While many stories exist of people using technology to threaten or harass others, many are not necessarily aware of the threats these large scale data thieves pose to those who just simply own an always-on internet connection. This project was conceived as a way to see what threatens the common user. Using SecurityOnion, ESXI, and an unpatched operating system a simple network intrusion detection system was created to capture the reconnaissance traffic being sent to a residential IP address.
The usage of ESXI allows for fast deployment of new exploitable systems as well as easy packet capture with virtual switches. SecurityOnion was used due to its’ ease of use and detailed tutorials. An unpatched, unregistered, and unprotected (no firewall or antivirus) copy of Windows XP was used as the honeypot. All unsolicited packets from unknown IP addresses were then analyzed for country of origin to gain statistics on where attackers are coming from (or rather where they wish to be seen coming from), as well as to see the most common ports that were being scanned for
Recommended from our members
Soft power, hard news:How journalists at state-funded transnational media legitimize their work
How do journalists working for different state-funded international news organizations legitimize their relationship to the governments which support them? In what circumstances might such journalists resist the diplomatic strategies of their funding states? We address these questions through a comparative study of journalists working for international news organizations funded by the Chinese, US, UK and Qatari governments. Using 52 interviews with journalists covering humanitarian issues, we explain how they minimized tensions between their diplomatic role and dominant norms of journalistic autonomy by drawing on three – broadly shared – legitimizing narratives, involving different kinds of boundary-work. In, the first ‘exclusionary’ narrative, journalists differentiated their ‘truthful’ news reporting from the ‘false’ state ‘propaganda’ of a common Other, the Russian-funded network, RT. In the second ‘fuzzifying’ narrative, journalists deployed the ambiguous notion of ‘soft power’ as an ambivalent ‘boundary concept’, to defuse conflicts between journalistic and diplomatic agendas. In the final ‘inversion’ narrative, journalists argued that, paradoxically, their dependence on funding states gave them greater ‘operational autonomy’. Even when journalists did resist their funding states, this was hidden or partial, and prompted less by journalists’ concerns about the political effects of their work, than by serious threats to their personal cultural capital
Access to the Internet and Regional Structures: The Case of Italy
I study the effects of Internet access on regional structures and provide some insights into the complex question of the role of technology in regional development. The paper analyzes the distribution of access to the Internet in Italy, highlighting the differences among regions and sub-regional areas and with respect to categories of users. This is an aspect of the so-called \u201cdigital divide\u201d. I concentrate on the stability and change of regional structures in Italy, pointing at conclusions of general relevance. My analysis confirms the dynamism of the regions of the so-called \u201cThird Italy\u201d and the fundamental distinction between the North-Center with respect to the South, the Italian Mezzogiorno. My preliminary conclusions on the effects of the Internet in promoting economic development suggest lines for further investigation.
Key Words: Regional development, Italy, Internet, digital divide
JEL Classifications: R11, R12, O3
Int J Tuberc Lung Dis
Migrant health is a critical public health issue, and in many countries attention to this topic has focused on the link between migration and communicable diseases, including tuberculosis (TB). When creating public health policies to address the complex challenges posed by TB and migration, countries should focus these policies on evidence, ethics, and human rights. This paper traces a commonly used migration route from sub-Saharan Africa to Europe, identifying situations at each stage in which human rights and ethical values might be affected in relation to TB care. This illustration provides the basis for discussing TB and migration from the perspective of human rights, with a focus on the right to health. We then highlight three strands of discussion in the ethics and justice literature in an effort to develop more comprehensive ethics of migrant health. These strands include theories of global justice and global health ethics, the creation of 'firewalls' to separate enforcement of immigration law from protection of human rights, and the importance of non-stigmatization to health justice. The paper closes by reflecting briefly on how TB programs can better incorporate human rights and ethical principles and values into public health practice.20172018-10-01T00:00:00ZCC999999/Intramural CDC HHS/United States28911349PMC5793855870
Vulnerability analysis of three remote voting methods
This article analyses three methods of remote voting in an uncontrolled
environment: postal voting, internet voting and hybrid voting. It breaks down
the voting process into different stages and compares their vulnerabilities
considering criteria that must be respected in any democratic vote:
confidentiality, anonymity, transparency, vote unicity and authenticity.
Whether for safety or reliability, each vulnerability is quantified by three
parameters: size, visibility and difficulty to achieve. The study concludes
that the automatisation of treatments combined with the dematerialisation of
the objects used during an election tends to substitute visible vulnerabilities
of a lesser magnitude by invisible and widespread vulnerabilities.Comment: 15 page
- …