175 research outputs found
Planning, Managing and Monitoring Technological Security Infrastructures
Over the past few decades many different Information Technologies (IT) policies have been introduced, including COSO, ITIL, PMBook, CMM,ISO 2700x, Six Sigma, being COBIT IT (Control Objectives for IT) the framework that encompasses all IT and Information Systems (IS) governance activities at the organization’s level. As part of the applicability of quality services certification (ISO 9001) in all IT services of a public institution, it is presented a case study aimed at planning, managing and monitoring technological security infrastructures. It followed the guidelines for the ISO 2700x family, COBIT, ITIL and other standards and conducted a survey to complement the IT process’s objectives. With regard to an action-research methodology for problem-solving (i.e., a kind of attempt to improve or investigate practice) and according to the issue under analyze, the question is put into the terms, viz. “How can the ISO 2700x, COBIT, ITIL and other guidelines help with the planning, management and monitoring of technological security infrastructures and minimize the risk management of IT and IS?”. Indeed, it may be resolved that it is possible to achieve the goals of planning, managing and monitoring a technological security infrastructure. In the future, we will use Artificial Intelligence based approaches to problem solving such as Artificial Neural Networks and Cased Based Reasoning, to evaluate this issue
Towards data-driven cyber attack damage and vulnerability estimation for manufacturing enterprises
Defending networks against cyber attacks is often reactive rather than proactive. Attacks against enterprises are often monetary driven and are targeted to compromise data. While the best practices in enterprise-level cyber security of IT infrastructures are well established, the same cannot be said for critical infrastructures that exist in the manufacturing industry. Often guided by these best practices, manufacturing enterprises apply blanket cyber security in order to protect their networks, resulting in either under or over protection. In addition, these networks comprise heterogeneous entities such as machinery, control systems, digital twins and interfaces to the external supply chain making them susceptible to cyber attacks that cripple the manufacturing enterprise. Therefore, it is necessary to analyse, comprehend and quantify the essential metrics of providing targeted and optimised cyber security for manufacturing enterprises. This paper presents a novel data-driven approach to develop the essential metrics, namely, Damage Index (DI) and Vulnerability Index (VI) that quantify the extent of damage a manufacturing enterprise could suffer due to a cyber attack and the vulnerabilities of the heterogeneous entities within the enterprise respectively. A use case for computing the metrics is also demonstrated. This work builds a strong foundation for development of an adaptive cyber security architecture with optimal use of IT resources for manufacturing enterprises
Short Lag Times for Invasive Tropical Plants: Evidence from Experimental Plantings in Hawai'i
Background: The lag time of an invasion is the delay between arrival of an introduced species and its successful spread in a new area. To date, most estimates of lag times for plants have been indirect or anecdotal, and these estimates suggest that plant invasions are often characterized by lag times of 50 years or more. No general estimates are available of lag times for tropical plant invasions. Historical plantings and documentation were used to directly estimate lag times for tropical plant invasions in Hawai’i. Methodology/Principal Findings: Historical planting records for the Lyon Arboretum dating back to 1920 were examined to identify plants that have since become invasive pests in the Hawaiian Islands. Annual reports describing escape from plantings were then used to determine the lag times between initial plantings and earliest recorded spread of the successful invaders. Among 23 species that eventually became invasive pests, the average lag time between introduction and first evidence of spread was 14 years for woody plants and 5 years for herbaceous plants. Conclusions/Significance: These direct estimates of lag times are as much as an order of magnitude shorter than previous, indirect estimates, which were mainly based on temperate plants. Tropical invaders may have much shorter lag times than temperate species. A lack of direct and deliberate observations may have also inflated many previous lag time estimates. Although there have been documented cases of long lag times due to delayed arrival of a mutualist or environmenta
Is there still a place for the cemented titanium femoral stem?: 10,108 cases from the Norwegian Arthroplasty Register
Human Cytomegalovirus Nuclear Capsids Associate with the Core Nuclear Egress Complex and the Viral Protein Kinase pUL97
Abstract: The nuclear phase of herpesvirus replication is regulated through the formation of
regulatory multi-component protein complexes. Viral genomic replication is followed by nuclear
capsid assembly, DNA encapsidation and nuclear egress. The latter has been studied intensely
pointing to the formation of a viral core nuclear egress complex (NEC) that recruits a multimeric
assembly of viral and cellular factors for the reorganization of the nuclear envelope. To date, the
mechanism of the association of human cytomegalovirus (HCMV) capsids with the NEC, which in
turn initiates the specific steps of nuclear capsid budding, remains undefined. Here, we provide
electron microscopy-based data demonstrating the association of both nuclear capsids and NEC
proteins at nuclear lamina budding sites. Specifically, immunogold labelling of the core NEC
constituent pUL53 and NEC-associated viral kinase pUL97 suggested an intranuclear NEC-capsid
interaction. Staining patterns with phospho-specific lamin A/C antibodies are compatible with
earlier postulates of targeted capsid egress at lamina-depleted areas. Important data were provided
by co-immunoprecipitation and in vitro kinase analyses using lysates from HCMV-infected cells,
nuclear fractions, or infectious virions. Data strongly suggest that nuclear capsids interact with
pUL53 and pUL97. Combined, the findings support a refined concept of HCMV nuclear trafficking
and NEC-capsid interaction
Changes in habitat associations during range expansion: disentangling the effects of climate and residence time
The distributions of many species are not at equilibrium with their environment. This includes spreading non-native species and species undergoing range shifts in response to climate change. The habitat associations of these species may change during range expansion as less favourable climatic conditions at expanding range margins may constrain species to use only the most favourable habitats, violating the species distribution model assumption of stationarity. Alternatively, changes in habitat associations could result from density-dependent habitat selection; at range margins, population densities are initially low so species can exhibit density-independent selection of the most favourable habitats, while in the range core, where population densities are higher, species spread into less favourable habitat. We investigate if the habitat preferences of the non-native common waxbill Estrilda astrild changed as they spread in three directions (north, east and south-east) in the Iberian Peninsula. There are different degrees of climatic suitability and colonization speed across range expansion axes, allowing us to separate the effects of climate from residence time. In contrast to previous studies we find a stronger effect of residence time than climate in influencing the prevalence of common waxbills. As well as a strong additive effect of residence time, there were some changes in habitat associations, which were consistent with density-dependent habitat selection. The combination of broader habitat associations and higher prevalence in areas that have been colonised for longer means that species distribution models constructed early in the invasion process are likely to underestimate species’ potential distribution
Pet Project or Best Project? Online Decision Support Tools for Prioritizing Barrier Removals in the Great Lakes and Beyond
Structures that block movement of fish through river networks are built to serve a variety of societal needs, including transportation, hydroelectric power, and exclusion of exotic species. Due to their abundance, road crossings and dams reduce the amount of habitat available to fish that migrate from the sea or lakes into rivers to breed. The benefits to fish of removing any particular barrier depends on its location within the river network, its passability to fish, and the relative position of other barriers within the network. Balancing the trade-offs between ecological and societal values makes choosing among potential removal projects difficult. To facilitate prioritization of barrier removals, we developed an online decision support tool (DST) with three functions: (1) view existing barriers at various spatial scales; (2) modify information about barriers, including removal costs; and (3) run optimization models to identify portfolios of removals that provide the greatest amount of habitat access for a given budget. A survey of available DSTs addressing barrier removal prioritization indicates that barrier visualization is becoming widespread but few tools allow dynamic calculation of connectivity metrics, scenario analysis, or optimization. Having these additional functions, our DST enables organizations to develop barrier removal priorities based on
cost-effectiveness in restoring aquatic connectivity
Soy product consumption in 10 European countries: the European Prospective Investigation into Cancer and Nutrition (EPIC) study
Recommended from our members
Bi-allelic genetic variants in the translational GTPases GTPBP1 and GTPBP2 cause a distinct identical neurodevelopmental syndrome.
The homologous genes GTPBP1 and GTPBP2 encode GTP-binding proteins 1 and 2, which are involved in ribosomal homeostasis. Pathogenic variants in GTPBP2 were recently shown to be an ultra-rare cause of neurodegenerative or neurodevelopmental disorders (NDDs). Until now, no human phenotype has been linked to GTPBP1. Here, we describe individuals carrying bi-allelic GTPBP1 variants that display an identical phenotype with GTPBP2 and characterize the overall spectrum of GTP-binding protein (1/2)-related disorders. In this study, 20 individuals from 16 families with distinct NDDs and syndromic facial features were investigated by whole-exome (WES) or whole-genome (WGS) sequencing. To assess the functional impact of the identified genetic variants, semi-quantitative PCR, western blot, and ribosome profiling assays were performed in fibroblasts from affected individuals. We also investigated the effect of reducing expression of CG2017, an ortholog of human GTPBP1/2, in the fruit fly Drosophila melanogaster. Individuals with bi-allelic GTPBP1 or GTPBP2 variants presented with microcephaly, profound neurodevelopmental impairment, pathognomonic craniofacial features, and ectodermal defects. Abnormal vision and/or hearing, progressive spasticity, choreoathetoid movements, refractory epilepsy, and brain atrophy were part of the core phenotype of this syndrome. Cell line studies identified a loss-of-function (LoF) impact of the disease-associated variants but no significant abnormalities on ribosome profiling. Reduced expression of CG2017 isoforms was associated with locomotor impairment in Drosophila. In conclusion, bi-allelic GTPBP1 and GTPBP2 LoF variants cause an identical, distinct neurodevelopmental syndrome. Mutant CG2017 knockout flies display motor impairment, highlighting the conserved role for GTP-binding proteins in CNS development across species
- …