456 research outputs found
Real-time monitoring as a supplementary security component of vigilantism in modern network environments
© 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in todayâs dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organizationâs network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments
The Politics of Service Delivery Reform
This article identifies the leaders, the supporters and the resisters of public service reform. It adopts a principalâagent framework, comparing reality with an âidealâ situation in which citizens are the principals over political policy-makers as their agents, and policy-makers are the principals over public service officials as their agents. Reform in most developing countries is complicated by an additional set of external actors â international financial institutions and donors. In practice, international agencies and core government officials usually act as the âprincipalsâ in the determination of reforms. The analysis identifies the interests involved in reform, indicating how the balance between them is affected by institutional and sectoral factors. Organizational reforms, particularly in the social sectors, present greater difficulties than first generation economic policy reforms
Ontologyâdriven perspective of CFRaaS
A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during a postâevent response process. The benefit of applying a CFRaaS model in a cloud environment, is that, it is designed to prevent the modification/tampering of the cloud architectures or the infrastructure during the reactive process, which if it could, may end up having farâreaching implications. The authors of this article present the reactive process as a very costly exercise when the infrastructure must be reprogrammed every time the process is conducted. This may hamper successful investigation from the forensic experts and law enforcement agencies perspectives. The CFRaaS model, in its current state, has not been presented in a way that can help to classify or visualize the different types of potential evidence in all the cloud deployable models, and this may limit the expectations of what or how the required PDE may be collected. To address this problem, the article presents the CFRaaS from a holistic ontologyâdriven perspective, which allows the forensic experts to be able to apply the CFRaaS based on its simplicity of the concepts, relationship or semantics between different form of potential evidence, as well as how the security of a digital environment being investigated could be upheld. The CFRaaS in this context follows a fundamental ontology engineering approach that is based on the classical Resource Description Framework. The proposed ontologyâdriven approach to CFRaaS is, therefore, a knowledgeâbase that uses layerâdependencies, which could be an essential toolkit for digital forensic examiners and other stakeholders in cloudâsecurity. The implementation of this approach could further provide a platform to develop other knowledge base components for cloud forensics and security
Giving Miss Marple a makeover : graduate recruitment, systems failure and the Scottish voluntary sector
The voluntary sector in Scotland, as across the globe, is becoming increasingly business like. Resultantly, there is an increasing demand for graduates to work in business and support functions. In Scotland, however, despite an oversupply of graduates in the labor market, the voluntary sector reports skills shortages for graduate-level positions; a leadership deficit was also reported in countries such as the United States. Through exploratory, mainly qualitative, case study and stakeholder research, this article proposes that one reason for this mismatch between the supply of and demand for graduates is a systems failure within the sector. Many graduates and university students remain unaware of potentially suitable paid job opportunities, in part because of the sector's voluntary label. To rectify this systems failure, thought needs to be given to the sector's nomenclature and the manner in which voluntary sector organizations attract graduate recruits, for example, through levering value congruence in potential recruits
Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments
© 2020 The Author(s) Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems. This paper surveys existing literature on the potential of using supervised classical machine learning techniques, such as K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for different IoT configurations. There are also a number of challenges associated with the use of machine learning techniques, as discussed in this paper
Recommended from our members
Climate Information for Improved Planning and Management of Mega Cities (Needs Perspective)
The majority of the population of the planet (6.6 billion) now live in urban areas, which have distinct impacts upon climate at scales from the local to the global. This urban effect is due to the physical form of the city (its three-dimensional geometry and material composition) and its functions (the day-to-day activity patterns that generate emissions of waste heat and materials into the overlying air). While a substantial body of knowledge on the science of urban climates has been developed over the past fifty years, there is little evidence that this knowledge is incorporated into urban planning and design practice. This paper focuses on this gap by examining the nature of urban climate expertise and the needs of those that make decisions about urban areas. In conclusion it makes recommendations to maintain and enhance urban observations and data; to improve understanding of local, regional and global climate linkages; to develop tools for practical planning; and to disseminate urban climate knowledge and its relevance to urban planning to both practicing meteorologists and urban decision makers
Targeting OGG1 and PARG radiosensitises head and neck cancer cells to high-LET protons through complex DNA damage persistence
Complex DNA damage (CDD), containing two or more DNA lesions within one or two DNA helical turns, is a signature of ionising radiation (IR) and contributes significantly to the therapeutic effect through cell killing. The levels and complexity of CDD increases with linear energy transfer (LET), however, the specific cellular response to this type of DNA damage and the critical proteins essential for repair of CDD is currently unclear. We performed an siRNA screen of ~240 DNA damage response proteins to identify those specifically involved in controlling cell survival in response to high-LET protons at the Bragg peak, compared to low-LET entrance dose protons which differ in the amount of CDD produced. From this, we subsequently validated that depletion of 8-oxoguanine DNA glycosylase (OGG1) and poly(ADP-ribose) glycohydrolase (PARG) in HeLa and head and neck cancer cells leads to significantly increased cellular radiosensitivity specifically following high-LET protons, whilst no effect was observed after low-LET protons and X-rays. We subsequently confirmed that OGG1 and PARG are both required for efficient CDD repair post-irradiation with high-LET protons. Importantly, these results were also recapitulated using specific inhibitors for OGG1 (TH5487) and PARG (PDD00017273). Our results suggest OGG1 and PARG play a fundamental role in the cellular response to CDD and indicate that targeting these enzymes could represent a promising therapeutic strategy for the treatment of head and neck cancers following high-LET radiation
JWST/MIRI coronagraphic performances as measured on-sky
Characterization of directly imaged exoplanets is one of the most eagerly
anticipated science functions of the James Webb Space Telescope. MIRI, the
mid-IR instrument has the capability to provide unique spatially resolved
photometric data points in a spectral range never achieved so far for such
objects. We aim to present the very first on-sky contrast measurements of the
MIRI's coronagraphs. In addition to a classical Lyot coronagraph at the longest
wavelength, this observing mode implements the concept of the four quadrant
phase mask for the very first time in a space telescope. We observed single
stars together with a series of reference stars to measure raw contrasts as
they are delivered on the detector, as well as reference subtracted contrasts.
MIRI's coronagraphs achieve raw contrasts greater than at the smallest
angular separations (within ) and about further out (beyond
). Subtracting the residual diffracted light left unattenuated by the
coronagraph has the potential to bring the final contrast down to the
background and detector limited noise floor at most angular separations (a few
times at less than ). MIRI coronagraphs behave as expected from
simulations. In particular the raw contrasts for all four coronagraphs are
fully consistent with the diffractive model. Contrasts obtained with
subtracting reference stars also meet expectations and are fully demonstrated
for two four quadrant phase masks (F1065C and F1140C). The worst contrast,
measured at F1550C, is very likely due to a variation of the phase aberrations
at the primary mirror during the observations, and not an issue of the
coronagraph itself. We did not perform reference star subtraction with the Lyot
mask at F2300C, but we anticipate that it would bring the contrast down to the
noise floor.Comment: submitted to A&
- âŠ