3 research outputs found

    GUIDE FOR THE COLLECTION OF INSTRUSION DATA FOR MALWARE ANALYSIS AND DETECTION IN THE BUILD AND DEPLOYMENT PHASE

    Get PDF
    During the COVID-19 pandemic, when most businesses were not equipped for remote work and cloud computing, we saw a significant surge in ransomware attacks. This study aims to utilize machine learning and artificial intelligence to prevent known and unknown malware threats from being exploited by threat actors when developers build and deploy applications to the cloud. This study demonstrated an experimental quantitative research design using Aqua. The experiment\u27s sample is a Docker image. Aqua checked the Docker image for malware, sensitive data, Critical/High vulnerabilities, misconfiguration, and OSS license. The data collection approach is experimental. Our analysis of the experiment demonstrated how unapproved images were prevented from running anywhere in our environment based on known vulnerabilities, embedded secrets, OSS licensing, dynamic threat analysis, and secure image configuration. In addition to the experiment, the forensic data collected in the build and deployment phase are exploitable vulnerability, Critical/High Vulnerability Score, Misconfiguration, Sensitive Data, and Root User (Super User). Since Aqua generates a detailed audit record for every event during risk assessment and runtime, we viewed two events on the Audit page for our experiment. One of the events caused an alert due to two failed controls (Vulnerability Score, Super User), and the other was a successful event meaning that the image is secure to deploy in the production environment. The primary finding for our study is the forensic data associated with the two events on the Audit page in Aqua. In addition, Aqua validated our security controls and runtime policies based on the forensic data with both events on the Audit page. Finally, the study’s conclusions will mitigate the likelihood that organizations will fall victim to ransomware by mitigating and preventing the total damage caused by a malware attack

    Opportunity and Sex Offending by International Peacekeepers in the Central African Republic

    Get PDF
    Despite their peacekeeping role in the management of internal armed conflicts, some international peacekeepers have sexually exploited local populations in host countries, resulting in dire social consequences and threats to the success of international peace operations. Although researchers have examined sexual violence committed by peacekeepers, few researchers, if any, have used routine activities theory to examine sex offending by peacekeepers. This article explored the extent to which situational opportunities influenced international peacekeepers’ engagement in the sexual exploitation of civilians in the Central African Republic, a peacekeeping host country. Data were collected from face-to-face interviews with 15 research participants, including local witnesses, peacekeepers, and U.N. policy makers, and from public records obtained from online sources. Data were coded using an inductive coding strategy and then analyzed using thematic analysis. The findings indicated that both the local and peacekeeping conditions, including lack of deterrence and accountability mechanisms, heightened the vulnerability of local populations to sex predation and motivated peacekeeper sex offenders to engage in sex offending. Local community leaders and policy makers could use study findings to promote educational programs on the institutional responsibility to protect vulnerable civilians and shape policies to prevent the commission of sexual exploitation by peacekeepers

    Opportunity and Sex Offending by International Peacekeepers in the Central African Republic

    Get PDF
    Despite their peacekeeping role in the management of internal armed conflicts, some military peacekeepers have sexually exploited local populations in host countries, resulting in dire social and health consequences and threats to the success of international peace operations. Although researchers have examined sexual violence committed by peacekeepers, few researchers, if any, have used routine activities theory to examine sex offending by peacekeepers. The purpose of this study was to explore the extent to which situational opportunities influenced international military peacekeepers\u27 engagement in the sexual exploitation of civilians in the Central African Republic, a peacekeeping host country. Data were collected from face-to-face interviews with 15 research participants, including local witnesses, military officers, representatives of civil society organizations, and United Nations policy makers, and from public records obtained from online sources. Data were coded using an inductive coding strategy and then analyzed using thematic analysis. The findings indicated that both the local and peacekeeping conditions, including lack of deterrence and accountability mechanisms, heightened the vulnerability of local populations to sex predation and motivated peacekeeper sex offenders to engage in sex offending. Local community leaders, civil society organizations, peacekeepers, and policy makers could use study findings to promote educational programs on the institutional responsibility to protect vulnerable civilians as well as shape policies to prevent the commission of sexual exploitation by peacekeepers. These actions may also help susceptible civilians, especially women and girls, to be aware of the risks linked to their vulnerability and empower them to seek legal redress
    corecore