82 research outputs found

    Разработка и анализ защищенности фрагмента информационно-телекоммуникационной системы, реализующей концепцию Интернета вещей

    Get PDF
    This paper comprises the development and implementation of systems using the concept of Internet of Things. In terms of active development of industries, use the concept of the Internet of Things, the information security problem is urgent. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing GOST standards when choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. A feature of the work is an integrated approach to the design with the use of the intruder models, analysis of the system’s assets and evaluation of their security.В работе исследуются вопросы разработки и реализации систем, использующих концепцию Интернета вещей. В условиях активного развития отраслей, использующих концепцию Интернета вещей, актуальна проблема информационной безопасности. Для того чтобы определить актуальные угрозы, необходимо использовать детальный анализ рисков в соответствии с действующими стандартами ГОСТ. Выбирая защитные меры, необходимо учитывать все идентифицированные актуальные угрозы информационной безопасности. В статье определяются актуальные угрозы и защитные меры, необходимые для разработки и внедрения защищенного фрагмента программно-аппаратной системы Умный дом в части контроля доступа в помещение. Решены следующие задачи: описание системы Умный дом, описание этапов оценки и обеспечения безопасности системы Умный дом; осуществление аппаратной сборки и написания программного кода для выбранного фрагмента системы; оценка безопасности выбранного фрагмента Умного дома и определение актуальных угроз; выработка рекомендаций по противодействию актуальным угрозам; программная реализация одной из актуальных угроз и программная реализация защитных мер для выбранной угрозы. Особенностью работы является комплексный подход к проектированию с использованием моделей нарушителя, анализа активов системы и оценки их защищенности

    Alterations to nuclear architecture and genome behavior in senescent cells.

    Get PDF
    The organization of the genome within interphase nuclei, and how it interacts with nuclear structures is important for the regulation of nuclear functions. Many of the studies researching the importance of genome organization and nuclear structure are performed in young, proliferating, and often transformed cells. These studies do not reveal anything about the nucleus or genome in nonproliferating cells, which may be relevant for the regulation of both proliferation and replicative senescence. Here, we provide an overview of what is known about the genome and nuclear structure in senescent cells. We review the evidence that nuclear structures, such as the nuclear lamina, nucleoli, the nuclear matrix, nuclear bodies (such as promyelocytic leukemia bodies), and nuclear morphology all become altered within growth-arrested or senescent cells. Specific alterations to the genome in senescent cells, as compared to young proliferating cells, are described, including aneuploidy, chromatin modifications, chromosome positioning, relocation of heterochromatin, and changes to telomeres

    Phosphorothioate antisense oligonucleotides induce the formation of nuclear bodies

    Get PDF
    Antisense oligonucleotides are powerful tools for the in vivo regulation of gene expression. We have characterized the intracellular distribution of fluorescently tagged phosphorothioate oligodeoxynucleotides (PS-ONs) at high resolution under conditions in which PS-ONs have the potential to display antisense activity. Under these conditions PS-ONs predominantly localized to the cell nucleus where they accumulated in 20-30 bright spherical foci designated phosphorothioate bodies (PS bodies), which were set against a diffuse nucleoplasmic population excluding nucleoli. PS bodies are nuclear structures that formed in cells after PS-ON delivery by transfection agents or microinjection but were observed irrespectively of antisense activity or sequence. Ultrastructurally, PS bodies corresponded to electron-dense structures of 150-300 nm diameter and resembled nuclear bodies that were found with lower frequency in cells lacking PS-ONs. The environment of a living cell was required for the de novo formation of PS bodies, which occurred within minutes after the introduction of PS-ONs. PS bodies were stable entities that underwent noticeable reorganization only during mitosis. Upon exit from mitosis, PS bodies were assembled de novo from diffuse PS-ON pools in the daughter nuclei. In situ fractionation demonstrated an association of PS-ONs with the nuclear matrix. Taken together, our data provide evidence for the formation of a nuclear body in cells after introduction of phosphorothioate oligodeoxynucleotides

    Design and Security Analysis of a Fragment of Internet of Things Telecommunication System

    No full text
    This paper comprises the development and implementation of systems using the concept of Internet of Things. In terms of active development of industries, use the concept of the Internet of Things, the information security problem is urgent. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing GOST standards when choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. A feature of the work is an integrated approach to the design with the use of the intruder models, analysis of the system’s assets and evaluation of their security

    THE STUDY OF REGULARITIES OF INDUCTION OF IL-8 SYNTHESIS BY NEUTROPHIL DEFENSINS IN VITRO

    No full text
    Abstract. We explored the effects of defensins on IL-8 synthesis in various human cells, including bronchoepithelial cell line A-549, monocytes, monocyte-derived macrophages differentiated in the presence of M-CSF, HU-VEC cells, HEK293 and THP-1 cell lines. HNP at 10-5-10-4М induced IL-8 production and cytotoxicity in serum-less A-549 culture. The addition of serum abrogated the cytotoxicity along with the induction of IL-8 synthesis. Similar effects were observed in HEK293 cell line and HUVEC.The induction of cytotoxicity along with IL-8 production by HNP at 10-5-10-4М was also observed in the serum-less cultures of human monocytes and macrophages. However, monocytes and macrophages retained HNP-induced production of IL-8 after the addition of serum, while cytotoxic effect of HNP was completely inhibited. The data imply a specific interaction of alpha-defensins with some membrane receptors of monocytes and macrophages that leads to the induction of IL-8 and might also occur in vivo.</p

    Radiation Absorbed Dose to the Basal Ganglia from Dopamine Transporter Radioligand F-18-FPCIT

    Get PDF
    Our previous dosimetry studies have demonstrated that for dopaminergic radiotracers, F-18-FDOPA and F-18-FPCIT, the urinary bladder is the critical organ. As these tracers accumulate in the basal ganglia (BG) with high affinity and long residence times, radiation dose to the BG may become significant, especially in normal control subjects. We have performed dynamic PET measurements using F-18-FPCIT in 16 normal adult subjects to determine if in fact the BG, although not a whole organ, but a well-defined substructure, receives the highest dose. Regions of interest were drawn over left and right BG structures. Resultant time-activity curves were generated and used to determine residence times for dosimetry calculations. S-factors were computed using the MIRDOSE3 nodule model for each caudate and putamen. For F-18-FPCIT, BG dose ranged from 0.029 to 0.069 mGy/MBq. In half of all subjects, BG dose exceeded 85% of the published critical organ (bladder) dose, and in three of those, the BG dose exceeded that for the bladder. The BG can become the dose-limiting organ in studies using dopamine transporter ligands. For some normal subjects studied with F-18 or long half-life radionuclide, the BG may exceed bladder dose and become the critical structure
    corecore