5,095 research outputs found

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection

    Get PDF
    The broadening dependency and reliance that modern societies have on essential services provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just at the economic level but also in terms of physical damage and even loss of human life. Complementing traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are in place and compliant with standards and internal policies. Forensics assist the investigation of past security incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of tackling the requirements imposed by massively distributed and complex Industrial Automation and Control Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic template for a converged platform. These results are intended to guide future research on forensics and compliance auditing for Critical Infrastructure Protection.info:eu-repo/semantics/publishedVersio

    Schizophrenia – time to commit to policy change

    Get PDF
    Schizophrenia is recognised as one of the most complex and profound mental health conditions, steeped in both myth and reality. Efforts needs to be multifaceted, including policy development, treatment guidance and scientific innovation, with all stakeholders working together to ensure meaningful progress. This report delves into the unique needs of people with schizophrenia, exploring supportive measures for their well-being, practical and attainable recommendations for change. The message to all nations, policy makers, payers and healthcare professionals is clear: strive for excellence, but most importantly – start somewhere

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Measuring the Health and Development of School-age Zimbabwean Children

    Get PDF
    Health, growth and development during mid-childhood (from 5 to 14 years) are poorly characterised, and this period has been termed the ‘missing middle’. This thesis describes the piloting and application of the School-Age Health, Activity, Resilience, Anthropometry and Neurocognitive (SAHARAN) toolbox to measure growth, cognitive and physical function amongst the SHINE cohort in rural Zimbabwe. The SHINE cluster-randomised trial tested the effects of a household WASH intervention and/or infant and young child feeding (IYCF) on child stunting and anaemia at age 18 months in rural Zimbabwe. SHINE showed that IYCF modestly increased linear growth and reduced stunting by age 18 months, while WASH had no effects. The SAHARAN toolbox was used to measure 1000 HIV-unexposed children (250 in each intervention arm), and 275 HIV-exposed children within the SHINE cohort to evaluate long-term outcomes. Children were re-enrolled at age seven years to evaluate growth, body composition, cognitive and physical function. Four main findings are presented from the SAHARAN toolbox measurements of this cohort. Firstly, child sex, growth and contemporary environmental conditions are associated with school-age physical and cognitive function at seven years. Secondly, early-life growth and baseline environmental conditions suggest the impact of early-life trajectories on multiple aspects of school-age growth, physical and cognitive function. Thirdly, the long-term impact of HIV-exposure in pregnancy is explored, which indicate reduced cognitive function, cardiovascular fitness and head circumference by age 7 years. Finally, associations with the SHINE trial early life interventions are explored, demonstrating that the SHINE early-life nutrition intervention has minimal impact by 7 years of age, except marginally stronger handgrip strength. The public health implications advocate that child interventions need to be earlier (including antenatal), broader (incorporating nurturing care), deeper (providing transformational WASH) and longer (supporting throughout childhood), as well as targeting particularly vulnerable groups such as children born HIV-free

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Safe passage for attachment systems:Can attachment security at international schools be measured, and is it at risk?

    Get PDF
    Relocations challenge attachment networks. Regardless of whether a person moves or is moved away from, relocation produces separation and loss. When such losses are repeatedly experienced without being adequately processed, a defensive shutting down of the attachment system could result, particularly when such experiences occur during or across the developmental years. At schools with substantial turnover, this possibility could be shaping youth in ways that compromise attachment security and young people’s willingness or ability to develop and maintain deep long-term relationships. Given the well-documented associations between attachment security, social support, and long-term physical and mental health, the hypothesis that mobility could erode attachment and relational health warrants exploration. International schools are logical settings to test such a hypothesis, given their frequently high turnover without confounding factors (e.g. war trauma or refugee experiences). In addition, repeated experiences of separation and loss in international school settings would seem likely to create mental associations for the young people involved regarding how they and others tend to respond to such situations in such settings, raising the possibility that people at such schools, or even the school itself, could collectively be represented as an attachment figure. Questions like these have received scant attention in the literature. They warrant consideration because of their potential to shape young people’s most general convictions regarding attachment, which could, in turn, have implications for young people’s ability to experience meaning in their lives

    Conversations on Empathy

    Get PDF
    In the aftermath of a global pandemic, amidst new and ongoing wars, genocide, inequality, and staggering ecological collapse, some in the public and political arena have argued that we are in desperate need of greater empathy — be this with our neighbours, refugees, war victims, the vulnerable or disappearing animal and plant species. This interdisciplinary volume asks the crucial questions: How does a better understanding of empathy contribute, if at all, to our understanding of others? How is it implicated in the ways we perceive, understand and constitute others as subjects? Conversations on Empathy examines how empathy might be enacted and experienced either as a way to highlight forms of otherness or, instead, to overcome what might otherwise appear to be irreducible differences. It explores the ways in which empathy enables us to understand, imagine and create sameness and otherness in our everyday intersubjective encounters focusing on a varied range of "radical others" – others who are perceived as being dramatically different from oneself. With a focus on the importance of empathy to understand difference, the book contends that the role of empathy is critical, now more than ever, for thinking about local and global challenges of interconnectedness, care and justice
    • …
    corecore