183 research outputs found

    Model primary content type for multipurpose internet mail extensions

    Full text link

    A Brief Library & Internet Glossary

    Get PDF
    Useful terms for a research project

    InfoTech Update, Volume 13, Number 3, May/June 2004

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/5004/thumbnail.jp

    Attitudes and perceptions regarding Internet-based electronic data interchange in a public organization in Saudi Arabia

    Get PDF
    This study examined the attitudes and perceptions of staff members and administrators in the General Directorate for Private Institutes & Centers (GDPI&C), Training institutes, and Centers in Saudi Arabia toward Internet-based Electronic Data Interchange (I-EDI) in a public organization. A survey was conducted of a group of GDPI&C members and randomly selected Institutes and Centers. The 339 respondents participated anonymously by providing demographic information and completing the attitudes and perceptions section of I-EDI questionnaire. The survey response rate was 82.6%. An attitude survey was distributed to staff members, administrators, and faculty members in the Saudi Arabian GDPI&C, Training Institutes, and Centers. The study was designed to (a) measure the attitudes and perceptions of staff members, administrators, and faculty members in GDPI&C toward the use of computers, the Internet, and the implementation of I-EDI within the organization and (b) describe Institute/Center administrators\u27, staff members\u27, and faculty members\u27 attitudes and perceptions toward the use of computers, the Internet, and the implementation of I-EDI. The study also examined the expectations of GDPI&C staff members/administrators/faculty members and those of Institute and Center staff members, administrators, and faculty members regarding the potential benefits of implementing a new system (I-EDI). It was found that the participants in GDPI&C, Training Institutes, and Centers across Saudi Arabia did understand and appreciate the value to the organization of I-EDI. It was also found that they did not hold significant fears about using computers and the Internet in the organization. It was further found that they would not be likely to fear the implementation of I-EDI in the organization. Based on these findings, it was concluded that implementation of I-EDI in GDPI&C, Training Institutes, and Centers across Saudi Arabia is a necessary project and that fears of personnel are unlikely to interfere with the implementation I-EDI. It was recommended that the GDPI&C proceed to a stage of intensive planning for the implementation of I-EDI in the organization

    Proceedings of the 2nd International Workshop on Security in Mobile Multiagent Systems

    Get PDF
    This report contains the Proceedings of the Second Workshop on Security on Security of Mobile Multiagent Systems (SEMAS2002). The Workshop was held in Montreal, Canada as a satellite event to the 5th International Conference on Autonomous Agents in 2001. The far reaching influence of the Internet has resulted in an increased interest in agent technologies, which are poised to play a key role in the implementation of successful Internet and WWW-based applications in the future. While there is still considerable hype concerning agent technologies, there is also an increasing awareness of the problems involved. In particular, that these applications will not be successful unless security issues can be adequately handled. Although there is a large body of work on cryptographic techniques that provide basic building-blocks to solve specific security problems, relatively little work has been done in investigating security in the multiagent system context. Related problems are secure communication between agents, implementation of trust models/authentication procedures or even reflections of agents on security mechanisms. The introduction of mobile software agents significantly increases the risks involved in Internet and WWW-based applications. For example, if we allow agents to enter our hosts or private networks, we must offer the agents a platform so that they can execute correctly but at the same time ensure that they will not have deleterious effects on our hosts or any other agents / processes in our network. If we send out mobile agents, we should also be able to provide guarantees about specific aspects of their behaviour, i.e., we are not only interested in whether the agents carry out-out their intended task correctly. They must defend themselves against attacks initiated by other agents, and survive in potentially malicious environments. Agent technologies can also be used to support network security. For example in the context of intrusion detection, intelligent guardian agents may be used to analyse the behaviour of agents on a firewall or intelligent monitoring agents can be used to analyse the behaviour of agents migrating through a network. Part of the inspiration for such multi-agent systems comes from primitive animal behaviour, such as that of guardian ants protecting their hill or from biological immune systems

    Mustererkennungsbasierte Verteidgung gegen gezielte Angriffe

    Get PDF
    The speed at which everything and everyone is being connected considerably outstrips the rate at which effective security mechanisms are introduced to protect them. This has created an opportunity for resourceful threat actors which have specialized in conducting low-volume persistent attacks through sophisticated techniques that are tailored to specific valuable targets. Consequently, traditional approaches are rendered ineffective against targeted attacks, creating an acute need for innovative defense mechanisms. This thesis aims at supporting the security practitioner in bridging this gap by introducing a holistic strategy against targeted attacks that addresses key challenges encountered during the phases of detection, analysis and response. The structure of this thesis is therefore aligned to these three phases, with each one of its central chapters taking on a particular problem and proposing a solution built on a strong foundation on pattern recognition and machine learning. In particular, we propose a detection approach that, in the absence of additional authentication mechanisms, allows to identify spear-phishing emails without relying on their content. Next, we introduce an analysis approach for malware triage based on the structural characterization of malicious code. Finally, we introduce MANTIS, an open-source platform for authoring, sharing and collecting threat intelligence, whose data model is based on an innovative unified representation for threat intelligence standards based on attributed graphs. As a whole, these ideas open new avenues for research on defense mechanisms and represent an attempt to counteract the imbalance between resourceful actors and society at large.In unserer heutigen Welt sind alle und alles miteinander vernetzt. Dies bietet mächtigen Angreifern die Möglichkeit, komplexe Verfahren zu entwickeln, die auf spezifische Ziele angepasst sind. Traditionelle Ansätze zur Bekämpfung solcher Angriffe werden damit ineffektiv, was die Entwicklung innovativer Methoden unabdingbar macht. Die vorliegende Dissertation verfolgt das Ziel, den Sicherheitsanalysten durch eine umfassende Strategie gegen gezielte Angriffe zu unterstützen. Diese Strategie beschäftigt sich mit den hauptsächlichen Herausforderungen in den drei Phasen der Erkennung und Analyse von sowie der Reaktion auf gezielte Angriffe. Der Aufbau dieser Arbeit orientiert sich daher an den genannten drei Phasen. In jedem Kapitel wird ein Problem aufgegriffen und eine entsprechende Lösung vorgeschlagen, die stark auf maschinellem Lernen und Mustererkennung basiert. Insbesondere schlagen wir einen Ansatz vor, der eine Identifizierung von Spear-Phishing-Emails ermöglicht, ohne ihren Inhalt zu betrachten. Anschliessend stellen wir einen Analyseansatz für Malware Triage vor, der auf der strukturierten Darstellung von Code basiert. Zum Schluss stellen wir MANTIS vor, eine Open-Source-Plattform für Authoring, Verteilung und Sammlung von Threat Intelligence, deren Datenmodell auf einer innovativen konsolidierten Graphen-Darstellung für Threat Intelligence Stardards basiert. Wir evaluieren unsere Ansätze in verschiedenen Experimenten, die ihren potentiellen Nutzen in echten Szenarien beweisen. Insgesamt bereiten diese Ideen neue Wege für die Forschung zu Abwehrmechanismen und erstreben, das Ungleichgewicht zwischen mächtigen Angreifern und der Gesellschaft zu minimieren
    • …
    corecore