237 research outputs found

    Zero Trust and Advanced Persistent Threats: Who Will Win the War?

    Get PDF
    Advanced Persistent Threats (APTs) are state-sponsored actors who break into computer networks for political or industrial espionage. Because of the nature of cyberspace and ever-changing sophisticated attack techniques, it is challenging to prevent and detect APT attacks. 2020 United States Federal Government data breach once again showed how difficult to protect networks from targeted attacks. Among many other solutions and techniques, zero trust is a promising security architecture that might effectively prevent the intrusion attempts of APT actors. In the zero trust model, no process insider or outside the network is trusted by default. Zero trust is also called perimeterless security to indicate that it changes the focus from network devices to assets. All processes are required to verify themselves to access the resources. In this paper, we focused on APT prevention. We sought an answer to the question: could the 2020 United States Federal Government data breach have been prevented if the attacked networks used zero trust architecture? To answer this question, we used MITRE\u27s ATT&CKÂź framework to extract how the APT29 threat group techniques could be mitigated to prevent initial access to federal networks. Secondly, we listed basic constructs of the zero trust model using NIST Special Publication 800-207 and several other academic and industry resources. Finally, we analyzed how zero trust can prevent malicious APT activities. We found that zero trust has a strong potential of preventing APT attacks or mitigating them significantly. We also suggested that vulnerability scanning, application developer guidance, and training should not be neglected in zero trust implementations as they are not explicitly or strongly mentioned in NIST SP 800-207 and are among the mostly referred controls in academic and industry publications

    Factors influencing curriculum adoption in undergraduate cybersecurity programs

    Get PDF
    https://scholar.dsu.edu/research-symposium/1025/thumbnail.jp

    FACTORS INFLUENCING CURRICULUM ADOPTION IN UNDERGRADUATE CYBERSECURITY PROGRAMS

    Get PDF
    Increased demand in the cybersecurity workforce requires a significant response from colleges and universities to meet that demand. The federal government has emphasized cybersecurity education at all levels as a way to address demand, yet there is wide variance in curriculum defined by academics, industry, and government organizations. While there are many curriculum standards, little research has been conducted to investigate the drivers for curriculum adoption. This study aims to discover what factors influence the adoption of new curriculum at the undergraduate level through a quantitative adaptation and application of existing technology adoption models (e.g. UTAUT, UTAUT2, TRA, TPB, TAM) to the domain of curriculum adoption. It is hypothesized that many of the same factors that drive technology adoption also drive curriculum adoption with the addition of altruistic motivation of the faculty member on behalf of the student. The survey-based study employs a path model analyzed using partial least squares structural equation modeling (PLS-SEM). If it is desirable to move toward standardized cybersecurity curriculum or to encourage faculty to adopt existing high quality curriculum, this work will benefit standards bodies, accreditors, university leaders, and the federal government to determine the factors that drive adoption to direct resources appropriatel

    Critical Thinking in the Information Technology Program: A Deciding Factor for Employment

    Get PDF
    “[C]ritical thinking [as analysis and evaluation] is an active skill-building process, not a subject for passive academic study.” Thus, it cannot be mastered through the technical content of a major alone. This suggests that there is a crucial gap between a purely vocationally focused approach to teaching and the higher-cognitive skills (i.e., learning through connecting ideas together) necessary for students “to compete successfully in securing employment or progressing in their chosen field.” Business leaders and educators around the globe realize that critical thinking is in short supply across the board, and managers and employees must be able to think critically for both personal and organizational success. Accordingly, rather than just focusing on teaching any single technical outcome, the Information Technology Major strives to graduate versatile, broadly skilled individuals prepared to tackle a wide range of problems in a rapidly changing world of intensifying complexity. Since many of Franklin’s graduates are completing their degrees in order to advance their careers, it is reasonable to look at correlations between individual criteria and the summative “Employability” outcome of our Capstone Project. A statistical analysis of the data shows that the correlation between critical thinking and employability is significantly the strongest. While select technical skills are important, the largest single contributor to employability is not the technical content of the major, but rather the ability of students to think, reason, and communicate critically about the technical content.https://fuse.franklin.edu/ss2014/1027/thumbnail.jp

    H\u3csub\u3e2\u3c/sub\u3e Oxidation Over Supported Au Nanoparticle Catalysts: Evidence for Heterolytic H\u3csub\u3e2\u3c/sub\u3e Activation at the Metal-Support Interface

    Get PDF
    Water adsorbed at the metal-support interface (MSI) plays an important role in multiple reactions. Due to its importance in CO preferential oxidation (PrOx), we examined H2 oxidation kinetics in the presence of water over Au/TiO2 and Au/Al2O3 catalysts, reaching the following mechanistic conclusions: (i) O2 activation follows a similar mechanism to that proposed in CO oxidation catalysis; (ii) weakly adsorbed H2O is a strong reaction inhibitor; (iii) fast H2 activation occurs at the MSI, and (iv) H2 activation kinetics are inconsistent with traditional dissociative H2 chemisorption on metals. Density function theory (DFT) calculations using a supported Au nanorod model suggest H2 activation proceeds through a heterolytic dissociation mechanism, resulting in a formal hydride residing on the Au and a proton bound to a surface TiOH group. This potential mechanism was supported by infrared spectroscopy experiments during H2 adsorption on a deuterated Au/TiO2 surface, which showed rapid H-D scrambling with surface hydroxyl groups. DFT calculations suggest that the reaction proceeds largely through proton-mediated pathways and that typical BrĂžnstednsted-Evans Polanyi behavior is broken by introducing weak acid/base sites at the MSI. THe kinetics data were successfully reinterpreted in the context of the heterolytic H2 activation mechanism, tying together the experimental and computational evidence and rationalizing the observed inhibition by physiorbed water on the support as blocking the MSI sites required for heterolytic H2 activation. In addition to providing evidence for the unusual H2 activation mechanism, these results offer additional insight into why water dramatically improves CO PrOx catalysis over Au

    What does empathy sound like in social work communication? A mixed‐methods study of empathy in child protection social work practice

    Get PDF
    It is widely accepted that empathy is important for social work practice, yet there are multiple dimensions of empathy and comparatively few studies of empathy as a component of social work skill. To date, published studies have been quantitative, and as a result, we know little about how social workers demonstrate empathy in practice or what skilled empathic practice in child and family social work might sound like. This study contributes to the development of understanding of empathy as a social work skill through a mixed‐methods analysis of 110 audio recordings of meetings in a child protection service between workers and parents, applying a coding framework for analysis. Findings indicate that workers who demonstrate higher levels of empathy skill use more open questions and reflections in their communication with parents. Further, they demonstrate curiosity about and make efforts to understand parents' often difficult experiences, including a focus on emotions. That the majority of workers were found not to demonstrate a high level of empathy skill presents concerns to be considered by the social work profession. A deeper understanding of empathy presents an opportunity for an increased focus in organizations to enable workers to demonstrate empathy towards families they work with.

    Chronic cisplatin treatment promotes enhanced damage repair and tumor progression in a mouse model of lung cancer

    Get PDF
    Chemotherapy resistance is a major obstacle in cancer treatment, yet the mechanisms of response to specific therapies have been largely unexplored in vivo. Employing genetic, genomic, and imaging approaches, we examined the dynamics of response to a mainstay chemotherapeutic, cisplatin, in multiple mouse models of human non-small-cell lung cancer (NSCLC). We show that lung tumors initially respond to cisplatin by sensing DNA damage, undergoing cell cycle arrest, and inducing apoptosis—leading to a significant reduction in tumor burden. Importantly, we demonstrate that this response does not depend on the tumor suppressor p53 or its transcriptional target, p21. Prolonged cisplatin treatment promotes the emergence of resistant tumors with enhanced repair capacity that are cross-resistant to platinum analogs, exhibit advanced histopathology, and possess an increased frequency of genomic alterations. Cisplatin-resistant tumors express elevated levels of multiple DNA damage repair and cell cycle arrest-related genes, including p53-inducible protein with a death domain (Pidd). We demonstrate a novel role for PIDD as a regulator of chemotherapy response in human lung tumor cells.National Institutes of Health (U.S.) (grant 5-UO1-CA84306)National Cancer Institute (U.S.) (CA034992

    The classicism of Hugh Trevor-Roper

    Get PDF
    Hugh Trevor-Roper was educated as a classicist until he transferred to history, in which he made his reputation, after two years at Oxford. His schooling engendered in him a classicism that was characterised by a love of classical literature and style, but rested on a repudiation of the philological tradition in classical studies. This reaction helps to explain his change of intellectual career. His classicism, however, endured: it influenced his mature conception of the practice of historical studies, and can be traced throughout his life. This essay explores a neglected aspect of Trevor-Roper's intellectual biography through his ‘Apologia transfugae’ (1973), which explains his rationale for abandoning classics, and published and unpublished writings attesting to his classicism, especially his first publication ‘Homer unmasked!’ (1936) and his wartime notebooks

    TIC e empreendedorismo: o papel das redes sociais

    Get PDF
    As inovaçÔes tecnolĂłgicas, a globalização e a aceleração das comunicaçÔes tĂȘm desencadeado uma enorme revolução no mundo do trabalho, trazendo como resultados o aumento da concorrĂȘncia, a redução drĂĄstica de empregos e a maior exigĂȘncia quanto Ă s competĂȘncias individuais. Antigamente nĂŁo era frequente a mudança de emprego ou de carreira (tĂ­nhamos a ideia do emprego para toda a vida), ou mesmo a necessidade do aperfeiçoamento acadĂ©mico constante. Hoje, com a concorrĂȘncia cada vez mais feroz, a escassez de vagas e a persistente procura de uma melhor qualidade de vida, levam o trabalhador a investir cada vez mais na sua formação acadĂ©mica e na incessante construção de uma rede de relacionamentos que poderĂŁo contribuir para a sua carreira profissional. Poderemos chamar a esta rede social, ligada ao desenvolvimento da empregabilidade do indivĂ­duo, network

    Controlling Activity and Selectivity Using Water in the Au-Catalysed Preferential Oxidation of CO in H\u3csub\u3e2\u3c/sub\u3e

    Get PDF
    Industrial hydrogen production through methane steam reforming exceeds 50 million tons annually and accounts for 2–5% of global energy consumption. The hydrogen product, even after processing by the water–gas shift, still typically contains ∌1% CO, which must be removed for many applications. Methanation (CO + 3H2 → CH4 + H2O) is an effective solution to this problem, but consumes 5–15% of the generated hydrogen. The preferential oxidation (PROX) of CO with O2 in hydrogen represents a more-efficient solution. Supported gold nanoparticles, with their high CO-oxidation activity and notoriously low hydrogenation activity, have long been examined as PROX catalysts, but have shown disappointingly low activity and selectivity. Here we show that, under the proper conditions, a commercial Au/Al2O3 catalyst can remove CO to below 10 ppm and still maintain an O2-to-CO2 selectivity of 80–90%. The key to maximizing the catalyst activity and selectivity is to carefully control the feed-flow rate and maintain one to two monolayers of water (a key CO-oxidation co-catalyst) on the catalyst surface
    • 

    corecore