429 research outputs found

    Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    Get PDF
    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements.\ud Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session

    ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems

    Get PDF
    We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides useful context information regarding the network services. The false positives raised by the NIDS analyzing the incoming traffic (which can be either signature- or anomaly-based) are reduced by correlating them with the output anomalies. We designed our architecture for TCP-based network services which have a client/server architecture (such as HTTP). Benchmarks show a substantial reduction of false positives between 50% and 100%

    A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements

    Get PDF
    In this paper we present an approach for specifying and prioritizing\ud information security requirements in organizations. It is important\ud to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to\ud satisfy the most important ones. We propose to link explicitly security\ud requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a\ud basis for comparing the importance of different security requirements.\ud A conceptual framework is presented, where the relationships between\ud business vision, critical impact factors and valuable assets (together with\ud their security requirements) are shown

    Indicators of Malicious SSL Connections

    Get PDF
    Internet applications use SSL to provide data confidentiality to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious SSL connections, which is based on the unencrypted part of SSL (i.e., the SSL handshake protocol). We provide strong evidence for the strength of our indicators to identify malicious connections by cross-checking on blacklists from professional services. Besides the confirmation of prior research results through our indicators, we also found indications for a potential (not yet blacklisted) botnet on SSL. We consider the analysis of such SSL threats as highly relevant and hope that our findings stimulate the research community to further study this direction. © Springer International Publishing Switzerland 2015

    Implants outcome inserted in different sites

    Get PDF
    Oral rehabilitation by means dental implants has high standards of success. Recently, a new type of two-pieces spiral implants has been introduced in the market. Since few reports focus of the efficacy of this medical device as a reliable tool for oral rehabilitation, here a retrospective study is reported. In the period June-December 2017 one hundred and two spiral fixtures were inserted, half in females and 51 in males. The median age was 56 \ub1 8 (min-max 36-73 years). Forty-eight implants were inserted in upper jawbone and 54 in mandible. Two implants were lost and thus survival rate (SVR) is 99.9%. Then peri-implant bone resorption was used to investigate the clinical success (success rate, SCR) over time. No implants have a crestal bone resorption greater than 1.5 mm in the first year follow up. No studied variable has an effect on clinical outcome. In conclusion the studied implants have high SCR and SVR so that they are good tools for oral rehabilitation

    Electron localization and possible phase separation in the absence of a charge density wave in single-phase 1T-VS2_2

    Full text link
    We report on a systematic study of the structural, magnetic and transport properties of high-purity 1T-VS2_2 powder samples prepared under high pressure. The results differ notably from those previously obtained by de-intercalating Li from LiVS2_2. First, no Charge Density Wave (CDW) is found by transmission electron microscopy down to 94 K. Though, \textit{ab initio} phonon calculations unveil a latent CDW instability driven by an acoustic phonon softening at the wave vector qCDW≈{\bf q}_{CDW} \approx (0.21,0.21,0) previously reported in de-intercalated samples. A further indication of latent lattice instability is given by an anomalous expansion of the V-S bond distance at low temperature. Second, infrared optical absorption and electrical resistivity measurements give evidence of non metallic properties, consistent with the observation of no CDW phase. On the other hand, magnetic susceptibility and NMR data suggest the coexistence of localized moments with metallic carriers, in agreement with \textit{ab initio} band structure calculations. This discrepancy is reconciled by a picture of electron localization induced by disorder or electronic correlations leading to a phase separation of metallic and non-metallic domains in the nm scale. We conclude that 1T-VS2_2 is at the verge of a CDW transition and suggest that residual electronic doping in Li de-intercalated samples stabilizes a uniform CDW phase with metallic properties.Comment: 22 pages, 10 Figures. Full resolution pictures available at http://journals.aps.org/prb/abstract/10.1103/PhysRevB.89.23512

    A 3-dimensional transnasal endoscopic journey through the paranasal sinuses and adjacent skull base: a practical and surgery-oriented perspective

    Get PDF
    An endoscopic approach through the transnasal corridor is currently the treatment of choice in the management of benign sinonasal tumors, cerebrospinal fluid leaks, and pituitary lesions. Moreover, this approach can be considered a valid option in the management of selected sinonasal malignancies extending to the skull base, midline meningiomas, parasellar lesions such as craniopharyngioma and Rathke cleft cyst, and clival lesions such as chordoma and ecchordosis. Over the past decade, strict cooperation between otorhinolaryngologists and neurosurgeons and acquired surgical skills, together with high-definition cameras, dedicated instrumentation, and navigation systems, have made it possible to broaden the indications of endoscopic surgery. Despite these improvements, depth perception, as provided by the use of a microscope, was still lacking with this technology. The aim of the present project is to reveal new perspectives in the endoscopic perception of the sinonasal complex and skull base thanks to 3-dimensional endoscopes, which are well suited to access and explore the endonasal corridor. In the anatomic dissection herein, this innovative device came across with sophisticated and long-established fresh cadaver preparation provided by one of the most prestigious universities of Europe. The final product is a 3-dimensional journey starting from the nasal cavity, reaching the anterior, middle, and posterior cranial fossae, passing through the ethmoidal complex, paranasal sinuses, and skull base. Anatomic landmarks, critical areas, and tips and tricks to safely dissect delicate anatomic structures are addressed through audio comments, figures, and their captions
    • …
    corecore