175 research outputs found

    Planning, Managing and Monitoring Technological Security Infrastructures

    Get PDF
    Over the past few decades many different Information Technologies (IT) policies have been introduced, including COSO, ITIL, PMBook, CMM,ISO 2700x, Six Sigma, being COBIT IT (Control Objectives for IT) the framework that encompasses all IT and Information Systems (IS) governance activities at the organization’s level. As part of the applicability of quality services certification (ISO 9001) in all IT services of a public institution, it is presented a case study aimed at planning, managing and monitoring technological security infrastructures. It followed the guidelines for the ISO 2700x family, COBIT, ITIL and other standards and conducted a survey to complement the IT process’s objectives. With regard to an action-research methodology for problem-solving (i.e., a kind of attempt to improve or investigate practice) and according to the issue under analyze, the question is put into the terms, viz. “How can the ISO 2700x, COBIT, ITIL and other guidelines help with the planning, management and monitoring of technological security infrastructures and minimize the risk management of IT and IS?”. Indeed, it may be resolved that it is possible to achieve the goals of planning, managing and monitoring a technological security infrastructure. In the future, we will use Artificial Intelligence based approaches to problem solving such as Artificial Neural Networks and Cased Based Reasoning, to evaluate this issue

    Towards data-driven cyber attack damage and vulnerability estimation for manufacturing enterprises

    Get PDF
    Defending networks against cyber attacks is often reactive rather than proactive. Attacks against enterprises are often monetary driven and are targeted to compromise data. While the best practices in enterprise-level cyber security of IT infrastructures are well established, the same cannot be said for critical infrastructures that exist in the manufacturing industry. Often guided by these best practices, manufacturing enterprises apply blanket cyber security in order to protect their networks, resulting in either under or over protection. In addition, these networks comprise heterogeneous entities such as machinery, control systems, digital twins and interfaces to the external supply chain making them susceptible to cyber attacks that cripple the manufacturing enterprise. Therefore, it is necessary to analyse, comprehend and quantify the essential metrics of providing targeted and optimised cyber security for manufacturing enterprises. This paper presents a novel data-driven approach to develop the essential metrics, namely, Damage Index (DI) and Vulnerability Index (VI) that quantify the extent of damage a manufacturing enterprise could suffer due to a cyber attack and the vulnerabilities of the heterogeneous entities within the enterprise respectively. A use case for computing the metrics is also demonstrated. This work builds a strong foundation for development of an adaptive cyber security architecture with optimal use of IT resources for manufacturing enterprises

    Short Lag Times for Invasive Tropical Plants: Evidence from Experimental Plantings in Hawai'i

    Get PDF
    Background: The lag time of an invasion is the delay between arrival of an introduced species and its successful spread in a new area. To date, most estimates of lag times for plants have been indirect or anecdotal, and these estimates suggest that plant invasions are often characterized by lag times of 50 years or more. No general estimates are available of lag times for tropical plant invasions. Historical plantings and documentation were used to directly estimate lag times for tropical plant invasions in Hawai’i. Methodology/Principal Findings: Historical planting records for the Lyon Arboretum dating back to 1920 were examined to identify plants that have since become invasive pests in the Hawaiian Islands. Annual reports describing escape from plantings were then used to determine the lag times between initial plantings and earliest recorded spread of the successful invaders. Among 23 species that eventually became invasive pests, the average lag time between introduction and first evidence of spread was 14 years for woody plants and 5 years for herbaceous plants. Conclusions/Significance: These direct estimates of lag times are as much as an order of magnitude shorter than previous, indirect estimates, which were mainly based on temperate plants. Tropical invaders may have much shorter lag times than temperate species. A lack of direct and deliberate observations may have also inflated many previous lag time estimates. Although there have been documented cases of long lag times due to delayed arrival of a mutualist or environmenta

    Human Cytomegalovirus Nuclear Capsids Associate with the Core Nuclear Egress Complex and the Viral Protein Kinase pUL97

    Get PDF
    Abstract: The nuclear phase of herpesvirus replication is regulated through the formation of regulatory multi-component protein complexes. Viral genomic replication is followed by nuclear capsid assembly, DNA encapsidation and nuclear egress. The latter has been studied intensely pointing to the formation of a viral core nuclear egress complex (NEC) that recruits a multimeric assembly of viral and cellular factors for the reorganization of the nuclear envelope. To date, the mechanism of the association of human cytomegalovirus (HCMV) capsids with the NEC, which in turn initiates the specific steps of nuclear capsid budding, remains undefined. Here, we provide electron microscopy-based data demonstrating the association of both nuclear capsids and NEC proteins at nuclear lamina budding sites. Specifically, immunogold labelling of the core NEC constituent pUL53 and NEC-associated viral kinase pUL97 suggested an intranuclear NEC-capsid interaction. Staining patterns with phospho-specific lamin A/C antibodies are compatible with earlier postulates of targeted capsid egress at lamina-depleted areas. Important data were provided by co-immunoprecipitation and in vitro kinase analyses using lysates from HCMV-infected cells, nuclear fractions, or infectious virions. Data strongly suggest that nuclear capsids interact with pUL53 and pUL97. Combined, the findings support a refined concept of HCMV nuclear trafficking and NEC-capsid interaction

    Changes in habitat associations during range expansion: disentangling the effects of climate and residence time

    Get PDF
    The distributions of many species are not at equilibrium with their environment. This includes spreading non-native species and species undergoing range shifts in response to climate change. The habitat associations of these species may change during range expansion as less favourable climatic conditions at expanding range margins may constrain species to use only the most favourable habitats, violating the species distribution model assumption of stationarity. Alternatively, changes in habitat associations could result from density-dependent habitat selection; at range margins, population densities are initially low so species can exhibit density-independent selection of the most favourable habitats, while in the range core, where population densities are higher, species spread into less favourable habitat. We investigate if the habitat preferences of the non-native common waxbill Estrilda astrild changed as they spread in three directions (north, east and south-east) in the Iberian Peninsula. There are different degrees of climatic suitability and colonization speed across range expansion axes, allowing us to separate the effects of climate from residence time. In contrast to previous studies we find a stronger effect of residence time than climate in influencing the prevalence of common waxbills. As well as a strong additive effect of residence time, there were some changes in habitat associations, which were consistent with density-dependent habitat selection. The combination of broader habitat associations and higher prevalence in areas that have been colonised for longer means that species distribution models constructed early in the invasion process are likely to underestimate species’ potential distribution

    Pet Project or Best Project? Online Decision Support Tools for Prioritizing Barrier Removals in the Great Lakes and Beyond

    Get PDF
    Structures that block movement of fish through river networks are built to serve a variety of societal needs, including transportation, hydroelectric power, and exclusion of exotic species. Due to their abundance, road crossings and dams reduce the amount of habitat available to fish that migrate from the sea or lakes into rivers to breed. The benefits to fish of removing any particular barrier depends on its location within the river network, its passability to fish, and the relative position of other barriers within the network. Balancing the trade-offs between ecological and societal values makes choosing among potential removal projects difficult. To facilitate prioritization of barrier removals, we developed an online decision support tool (DST) with three functions: (1) view existing barriers at various spatial scales; (2) modify information about barriers, including removal costs; and (3) run optimization models to identify portfolios of removals that provide the greatest amount of habitat access for a given budget. A survey of available DSTs addressing barrier removal prioritization indicates that barrier visualization is becoming widespread but few tools allow dynamic calculation of connectivity metrics, scenario analysis, or optimization. Having these additional functions, our DST enables organizations to develop barrier removal priorities based on cost-effectiveness in restoring aquatic connectivity
    • …
    corecore