456 research outputs found

    Real-time monitoring as a supplementary security component of vigilantism in modern network environments

    Get PDF
    © 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments

    The Politics of Service Delivery Reform

    Get PDF
    This article identifies the leaders, the supporters and the resisters of public service reform. It adopts a principal–agent framework, comparing reality with an ‘ideal’ situation in which citizens are the principals over political policy-makers as their agents, and policy-makers are the principals over public service officials as their agents. Reform in most developing countries is complicated by an additional set of external actors — international financial institutions and donors. In practice, international agencies and core government officials usually act as the ‘principals’ in the determination of reforms. The analysis identifies the interests involved in reform, indicating how the balance between them is affected by institutional and sectoral factors. Organizational reforms, particularly in the social sectors, present greater difficulties than first generation economic policy reforms

    Ontology‐driven perspective of CFRaaS

    Get PDF
    A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during a post‐event response process. The benefit of applying a CFRaaS model in a cloud environment, is that, it is designed to prevent the modification/tampering of the cloud architectures or the infrastructure during the reactive process, which if it could, may end up having far‐reaching implications. The authors of this article present the reactive process as a very costly exercise when the infrastructure must be reprogrammed every time the process is conducted. This may hamper successful investigation from the forensic experts and law enforcement agencies perspectives. The CFRaaS model, in its current state, has not been presented in a way that can help to classify or visualize the different types of potential evidence in all the cloud deployable models, and this may limit the expectations of what or how the required PDE may be collected. To address this problem, the article presents the CFRaaS from a holistic ontology‐driven perspective, which allows the forensic experts to be able to apply the CFRaaS based on its simplicity of the concepts, relationship or semantics between different form of potential evidence, as well as how the security of a digital environment being investigated could be upheld. The CFRaaS in this context follows a fundamental ontology engineering approach that is based on the classical Resource Description Framework. The proposed ontology‐driven approach to CFRaaS is, therefore, a knowledge‐base that uses layer‐dependencies, which could be an essential toolkit for digital forensic examiners and other stakeholders in cloud‐security. The implementation of this approach could further provide a platform to develop other knowledge base components for cloud forensics and security

    Giving Miss Marple a makeover : graduate recruitment, systems failure and the Scottish voluntary sector

    Get PDF
    The voluntary sector in Scotland, as across the globe, is becoming increasingly business like. Resultantly, there is an increasing demand for graduates to work in business and support functions. In Scotland, however, despite an oversupply of graduates in the labor market, the voluntary sector reports skills shortages for graduate-level positions; a leadership deficit was also reported in countries such as the United States. Through exploratory, mainly qualitative, case study and stakeholder research, this article proposes that one reason for this mismatch between the supply of and demand for graduates is a systems failure within the sector. Many graduates and university students remain unaware of potentially suitable paid job opportunities, in part because of the sector's voluntary label. To rectify this systems failure, thought needs to be given to the sector's nomenclature and the manner in which voluntary sector organizations attract graduate recruits, for example, through levering value congruence in potential recruits

    Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments

    Get PDF
    © 2020 The Author(s) Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems. This paper surveys existing literature on the potential of using supervised classical machine learning techniques, such as K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for different IoT configurations. There are also a number of challenges associated with the use of machine learning techniques, as discussed in this paper

    Targeting OGG1 and PARG radiosensitises head and neck cancer cells to high-LET protons through complex DNA damage persistence

    Get PDF
    Complex DNA damage (CDD), containing two or more DNA lesions within one or two DNA helical turns, is a signature of ionising radiation (IR) and contributes significantly to the therapeutic effect through cell killing. The levels and complexity of CDD increases with linear energy transfer (LET), however, the specific cellular response to this type of DNA damage and the critical proteins essential for repair of CDD is currently unclear. We performed an siRNA screen of ~240 DNA damage response proteins to identify those specifically involved in controlling cell survival in response to high-LET protons at the Bragg peak, compared to low-LET entrance dose protons which differ in the amount of CDD produced. From this, we subsequently validated that depletion of 8-oxoguanine DNA glycosylase (OGG1) and poly(ADP-ribose) glycohydrolase (PARG) in HeLa and head and neck cancer cells leads to significantly increased cellular radiosensitivity specifically following high-LET protons, whilst no effect was observed after low-LET protons and X-rays. We subsequently confirmed that OGG1 and PARG are both required for efficient CDD repair post-irradiation with high-LET protons. Importantly, these results were also recapitulated using specific inhibitors for OGG1 (TH5487) and PARG (PDD00017273). Our results suggest OGG1 and PARG play a fundamental role in the cellular response to CDD and indicate that targeting these enzymes could represent a promising therapeutic strategy for the treatment of head and neck cancers following high-LET radiation

    JWST/MIRI coronagraphic performances as measured on-sky

    Full text link
    Characterization of directly imaged exoplanets is one of the most eagerly anticipated science functions of the James Webb Space Telescope. MIRI, the mid-IR instrument has the capability to provide unique spatially resolved photometric data points in a spectral range never achieved so far for such objects. We aim to present the very first on-sky contrast measurements of the MIRI's coronagraphs. In addition to a classical Lyot coronagraph at the longest wavelength, this observing mode implements the concept of the four quadrant phase mask for the very first time in a space telescope. We observed single stars together with a series of reference stars to measure raw contrasts as they are delivered on the detector, as well as reference subtracted contrasts. MIRI's coronagraphs achieve raw contrasts greater than 10310^3 at the smallest angular separations (within 1â€Čâ€Č1'') and about 10510^5 further out (beyond 5∌6â€Čâ€Č5\sim6''). Subtracting the residual diffracted light left unattenuated by the coronagraph has the potential to bring the final contrast down to the background and detector limited noise floor at most angular separations (a few times 10410^4 at less than 1â€Čâ€Č1''). MIRI coronagraphs behave as expected from simulations. In particular the raw contrasts for all four coronagraphs are fully consistent with the diffractive model. Contrasts obtained with subtracting reference stars also meet expectations and are fully demonstrated for two four quadrant phase masks (F1065C and F1140C). The worst contrast, measured at F1550C, is very likely due to a variation of the phase aberrations at the primary mirror during the observations, and not an issue of the coronagraph itself. We did not perform reference star subtraction with the Lyot mask at F2300C, but we anticipate that it would bring the contrast down to the noise floor.Comment: submitted to A&
    • 

    corecore