118 research outputs found
Password Managers: Secure Passwords the Easy Way
Poor passwords are often the central problem identified when data breaches, ransomware attacks, and identity fraud cases occur. This Purdue Extension publication provides everyday users of Internet websites and computer systems with tools and strategies to protect their online accounts. Securing information access with password managers can be convenient and often free of cost, on a variety of devices and platforms. βDoβs and Donβtsβ of password practices are highlighted, as well as the benefits of multi-factor authentication. The content is especially applicable for small businesses or non-profits, where employees often share access to systems or accounts
A WireGuard Exploration
Internet users require secure means of communication. Virtual Private Networks (VPNs) often serve this purpose, for consumers and businesses. The research aims of this paper were an analysis and implementation of the new VPN protocol WireGuard. The authors explain the cryptographic primitives used, build server and client code implementations of WireGuard peers, and present the benefits and drawbacks of this new technology. The outcome was a functional WireGuard client and server implementation, capable of tunneling all Internet traffic through a cloud-based virtual private server (VPS), with minimal manual configuration necessary from the end user. The code is publicly available
Optimizing Cybersecurity Budgets with AttackSimulation
Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that their model is an effective quantitative means of measuring the probability of success of a threat actor and implements two primary changes to increase the model\u27s accuracy. First, the authors modified the model\u27s inputs, allowing users to select threat actors based on the organization\u27s specific threat model. Threat actor effectiveness is evaluated based on publicly available breach data (in addition to security control efficacy), resulting in further refined attack success probabilities. Second, all three elements - threat effectiveness, control efficacy, and model variance - are computed and evaluated at each node to increase the estimation fidelity in place of pooled variance calculations. Visualization graphs, multiple simulation runs (up to 1 million), attack path customization, and code efficiency changes are also implemented. The result is a simulation tool that provides valuable insight to decision-makers and practitioners about where to most efficiently invest resources in their computing environment to increase cybersecurity posture. AttackSimulation and its source code are freely available on GitHub
Genomic analysis of early murine mammary gland development using novel probe-level algorithms
We describe a novel algorithm (ChipStat) for detecting gene-expression changes utilizing probe-level comparisons of replicate Affymetrix oligonucleotide microarray data. A combined detection approach is shown to yield greater sensitivity than a number of widely used methodologies including SAM, dChip and logit-T. Using this approach, we identify alterations in functional pathways during murine neonatal-pubertal mammary development that include the coordinate upregulation of major urinary proteins and the downregulation of loci exhibiting reciprocal imprinting
Remote Actuation of Magnetic Nanoparticles For Cancer Cell Selective Treatment Through Cytoskeletal Disruption
Motion of micron and sub-micron size magnetic particles in alternating magnetic fields can activate mechanosensitive cellular functions or physically destruct cancer cells. However, such effects are usually observed with relatively large magnetic particles (>250 nm) that would be difficult if at all possible to deliver to remote sites in the body to treat disease. Here we show a completely new mechanism of selective toxicity of superparamagnetic nanoparticles (SMNP) of 7 to 8 nm in diameter to cancer cells. These particles are coated by block copolymers, which facilitates their entry into the cells and clustering in the lysosomes, where they are then magneto-mechanically actuated by remotely applied alternating current (AC) magnetic fields of very low frequency (50 Hz). Such fields and treatments are safe for surrounding tissues but produce cytoskeletal disruption and subsequent death of cancer cells while leaving healthy cells intact
Towards nanomedicines of the future: Remote magneto-mechanical actuation of nanomedicines by alternating magnetic fields
The paper describes the concept of magneto-mechanical actuation of single-domain magnetic nanoparticles (MNPs) in super-low and low frequency alternating magnetic fields (AMFs) and its possible use for remote control of nanomedicines and drug delivery systems. The applications of this approach for remote actuation of drug release as well as effects on biomacromolecules, biomembranes, subcellular structures and cells are discussed in comparison to conventional strategies employing magnetic hyperthermia in a radio frequency (RF) AMF. Several quantitative models describing interaction of functionalized MNPs with single macromolecules, lipid membranes, and proteins (e.g. cell membrane receptors, ion channels) are presented. The optimal characteristics of the MNPs and an AMF for effective magneto-mechanical actuation of single molecule responses in biological and bio-inspired systems are discussed. Altogether, the described studies and phenomena offer opportunities for the development of novel therapeutics both alone and in combination with magnetic hyperthermia
Sleeping with the Enemy: How Intracellular Pathogens Cope with a Macrophage Lifestyle
Sleeping with the Enemy: How Intracellular Pathogens Cope with a Macrophage Lifestyl
Surgical treatment of complications of pulmonary tuberculosis, including drug-resistant tuberculosis.
CAPRISA, 2015.Abstract available in pdf
Macrophages in Breast Cancer: Do Involution Macrophages Account for the Poor Prognosis of Pregnancy-Associated Breast Cancer?
Macrophage influx is associated with negative outcomes for women with breast cancer and has been demonstrated to be required for metastasis of mammary tumors in mouse models. Pregnancy-associated breast cancer is characterized by particularly poor outcomes, however the reasons remain obscure. Recently, post-pregnancy mammary involution has been characterized as having a wound healing signature. We have proposed the involution-hypothesis, which states that the wound healing microenvironment of the involuting gland is tumor promotional. Macrophage influx is one of the prominent features of the involuting gland, identifying the macrophage a potential instigator of tumor progression and a novel target for breast cancer treatment and prevention
- β¦