892 research outputs found

    The IACS Cybersecurity Certification Framework (ICCF). Lessons from the 2017 study of the state of the art.

    Get PDF
    The principal goal of this report is to present the experiments of the IACS component Cybersecurity Certification Framework (ICCF) performed in 2017 by the NETs (National Exercise Teams) of several Member States, namely France, Poland and Spain. Based on real life use cases and simulations of ICCF activities, this report documents the current practices of these countries and NET members’ views in relation to IACS products cybersecurity certification. These studies have led to a series of findings that will be useful for the future of the ICCF in the context of the European Cybersecurity Certification Framework. In conclusion, a plan of action is proposed for the 2018-2019 period.JRC.E.2-Technology Innovation in Securit

    Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies)

    Get PDF
    DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500 Gbps. Hacker News stated that the largest DDoS attack as of March 2016 was over 600 Gbps, and the attack targeted the entire BBC website. With this increasing frequency and threat, and the average DDoS attack duration at about 16 hours, we know for certain that DDoS attacks will not be going away anytime soon. Commercial companies are not effectively providing mitigation techniques against these attacks, considering that major corporations face the same challenges. Current security appliances are not strong enough to handle the overwhelming traffic that accompanies current DDoS attacks. There is also a limited research on solutions to mitigate DDoS attacks. Therefore, there is a need for a means of mitigating DDoS attacks in order to minimize downtime. One possible solution is for organizations to implement their own architectures that are meant to mitigate DDoS attacks. In this dissertation, we present and implement an architecture that utilizes an activity monitor to change the states of firewalls based on their performance in a hybrid network. Both firewalls are connected inline. The monitor is mirrored to monitor the firewall states. The monitor reroutes traffic when one of the firewalls become overwhelmed due to a HTTP DDoS flooding attack. The monitor connects to the API of both firewalls. The communication between the rewalls and monitor is encrypted using AES, based on PyCrypto Python implementation. This dissertation is structured in three parts. The first found the weakness of the hardware firewall and determined its threshold based on spike and endurance tests. This was achieved by flooding the hardware firewall with HTTP packets until the firewall became overwhelmed and unresponsive. The second part implements the same test as the first, but targeted towards the virtual firewall. The same parameters, test factors, and determinants were used; however a different load tester was utilized. The final part was the implementation and design of the firewall performance monitor. The main goal of the dissertation is to minimize downtime when network firewalls are overwhelmed as a result of a DDoS attack

    Authorization schema for electronic health-care records: for Uganda

    Get PDF
    This thesis discusses how to design an authorization schema focused on ensuring each patient's data privacy within a hospital information system

    Team Leadership Approaches for Corporate Project Managers

    Get PDF
    The study of Critical and Creative Thinking (C&CT) methods introduced me to a number of new approaches and tools that have vital and practical applications for today’s corporate team leaders. The primary purpose of my paper and the Genuity Inc. case example, is to demonstrate how these C&CT approaches and tools can be used by corporate team leaders to motivate, direct and lead their teams. Towards this end I have organized my paper into two major sections: 1) In the first, I lay the groundwork by defining the challenges facing today’s project managers and the cross-functional teams they lead. 2) In the second section, I introduce and discuss C&CT concepts for analyzing and defining thinking styles of team members, and how this knowledge can be used by project managers for more effective leadership. The concepts covered will help team leaders address the wide range of challenges they face today. These concepts include the conceptual blocks to better problem solving, including common barriers to creative thinking, cultural blocks, emotional blocks, perceptual blocks, and intellectual blocks, as described by James Adams in Conceptual Blockbusting, a Guide to Better Ideas

    Сборник текстов по обучению профессионально-ориентированному чтению на английском языке для студентов специальностей 1-28 01 01 – "Экономика электронного бизнеса" 1-28 01 02 – "Электронный маркетинг"

    Get PDF
    Rakhuba Valery Ivanovich. Основы электронного бизнеса и маркетинга. Learning Textbook professionally oriented reading in EnglishСборник текстов по обучению профессионально-ориентированному чтению на английском языке предназначается для студентов специальностей 1-28 01 01 Экономика электронного бизнеса и 1-28 01 02 Электронный маркетинг. Тематика текстов дает достаточно полное представление о практической реализации принципов деятельности в этих сферах экономической активности

    General Education Requirements: Fontbonne Catalog, 2018-2019

    Get PDF
    This catalog reflects an institution that is devoted to upholding its new, self-identified value of the common good. The addition of the Mission Core classes and restructuring of the GERs that took place in 2015 fundamentally changed how the program worked. A system that relies on Mission core being the “heart” of the GER program with “Pillars” of knowledge supporting the “structure” of Fontbonne is an important change. The institution is now focused on bringing its own version of a liberal arts education to its students rather than a more standardized one, coming close to finalizing the vision started in the 1970s.https://griffinshare.fontbonne.edu/gen-ed/1004/thumbnail.jp

    Machine Learning based Anomaly Detection for Cybersecurity Monitoring of Critical Infrastructures

    Get PDF
    openManaging critical infrastructures requires to increasingly rely on Information and Communi- cation Technologies. The last past years showed an incredible increase in the sophistication of attacks. For this reason, it is necessary to develop new algorithms for monitoring these infrastructures. In this scenario, Machine Learning can represent a very useful ally. After a brief introduction on the issue of cybersecurity in Industrial Control Systems and an overview of the state of the art regarding Machine Learning based cybersecurity monitoring, the present work proposes three approaches that target different layers of the control network architecture. The first one focuses on covert channels based on the DNS protocol, which can be used to establish a command and control channel, allowing attackers to send malicious commands. The second one focuses on the field layer of electrical power systems, proposing a physics-based anomaly detection algorithm for Distributed Energy Resources. The third one proposed a first attempt to integrate physical and cyber security systems, in order to face complex threats. All these three approaches are supported by promising results, which gives hope to practical applications in the next future.openXXXIV CICLO - SCIENZE E TECNOLOGIE PER L'INGEGNERIA ELETTRONICA E DELLE TELECOMUNICAZIONI - Elettromagnetismo, elettronica, telecomunicazioniGaggero, GIOVANNI BATTIST

    The InfoSec Handbook

    Get PDF
    Computer scienc
    corecore