118 research outputs found

    Password Managers: Secure Passwords the Easy Way

    Get PDF
    Poor passwords are often the central problem identified when data breaches, ransomware attacks, and identity fraud cases occur. This Purdue Extension publication provides everyday users of Internet websites and computer systems with tools and strategies to protect their online accounts. Securing information access with password managers can be convenient and often free of cost, on a variety of devices and platforms. β€œDo’s and Don’ts” of password practices are highlighted, as well as the benefits of multi-factor authentication. The content is especially applicable for small businesses or non-profits, where employees often share access to systems or accounts

    A WireGuard Exploration

    Get PDF
    Internet users require secure means of communication. Virtual Private Networks (VPNs) often serve this purpose, for consumers and businesses. The research aims of this paper were an analysis and implementation of the new VPN protocol WireGuard. The authors explain the cryptographic primitives used, build server and client code implementations of WireGuard peers, and present the benefits and drawbacks of this new technology. The outcome was a functional WireGuard client and server implementation, capable of tunneling all Internet traffic through a cloud-based virtual private server (VPS), with minimal manual configuration necessary from the end user. The code is publicly available

    Optimizing Cybersecurity Budgets with AttackSimulation

    Get PDF
    Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that their model is an effective quantitative means of measuring the probability of success of a threat actor and implements two primary changes to increase the model\u27s accuracy. First, the authors modified the model\u27s inputs, allowing users to select threat actors based on the organization\u27s specific threat model. Threat actor effectiveness is evaluated based on publicly available breach data (in addition to security control efficacy), resulting in further refined attack success probabilities. Second, all three elements - threat effectiveness, control efficacy, and model variance - are computed and evaluated at each node to increase the estimation fidelity in place of pooled variance calculations. Visualization graphs, multiple simulation runs (up to 1 million), attack path customization, and code efficiency changes are also implemented. The result is a simulation tool that provides valuable insight to decision-makers and practitioners about where to most efficiently invest resources in their computing environment to increase cybersecurity posture. AttackSimulation and its source code are freely available on GitHub

    Genomic analysis of early murine mammary gland development using novel probe-level algorithms

    Get PDF
    We describe a novel algorithm (ChipStat) for detecting gene-expression changes utilizing probe-level comparisons of replicate Affymetrix oligonucleotide microarray data. A combined detection approach is shown to yield greater sensitivity than a number of widely used methodologies including SAM, dChip and logit-T. Using this approach, we identify alterations in functional pathways during murine neonatal-pubertal mammary development that include the coordinate upregulation of major urinary proteins and the downregulation of loci exhibiting reciprocal imprinting

    Remote Actuation of Magnetic Nanoparticles For Cancer Cell Selective Treatment Through Cytoskeletal Disruption

    Get PDF
    Motion of micron and sub-micron size magnetic particles in alternating magnetic fields can activate mechanosensitive cellular functions or physically destruct cancer cells. However, such effects are usually observed with relatively large magnetic particles (>250 nm) that would be difficult if at all possible to deliver to remote sites in the body to treat disease. Here we show a completely new mechanism of selective toxicity of superparamagnetic nanoparticles (SMNP) of 7 to 8 nm in diameter to cancer cells. These particles are coated by block copolymers, which facilitates their entry into the cells and clustering in the lysosomes, where they are then magneto-mechanically actuated by remotely applied alternating current (AC) magnetic fields of very low frequency (50 Hz). Such fields and treatments are safe for surrounding tissues but produce cytoskeletal disruption and subsequent death of cancer cells while leaving healthy cells intact

    Towards nanomedicines of the future: Remote magneto-mechanical actuation of nanomedicines by alternating magnetic fields

    Get PDF
    The paper describes the concept of magneto-mechanical actuation of single-domain magnetic nanoparticles (MNPs) in super-low and low frequency alternating magnetic fields (AMFs) and its possible use for remote control of nanomedicines and drug delivery systems. The applications of this approach for remote actuation of drug release as well as effects on biomacromolecules, biomembranes, subcellular structures and cells are discussed in comparison to conventional strategies employing magnetic hyperthermia in a radio frequency (RF) AMF. Several quantitative models describing interaction of functionalized MNPs with single macromolecules, lipid membranes, and proteins (e.g. cell membrane receptors, ion channels) are presented. The optimal characteristics of the MNPs and an AMF for effective magneto-mechanical actuation of single molecule responses in biological and bio-inspired systems are discussed. Altogether, the described studies and phenomena offer opportunities for the development of novel therapeutics both alone and in combination with magnetic hyperthermia

    Macrophages in Breast Cancer: Do Involution Macrophages Account for the Poor Prognosis of Pregnancy-Associated Breast Cancer?

    Get PDF
    Macrophage influx is associated with negative outcomes for women with breast cancer and has been demonstrated to be required for metastasis of mammary tumors in mouse models. Pregnancy-associated breast cancer is characterized by particularly poor outcomes, however the reasons remain obscure. Recently, post-pregnancy mammary involution has been characterized as having a wound healing signature. We have proposed the involution-hypothesis, which states that the wound healing microenvironment of the involuting gland is tumor promotional. Macrophage influx is one of the prominent features of the involuting gland, identifying the macrophage a potential instigator of tumor progression and a novel target for breast cancer treatment and prevention
    • …
    corecore