2,615 research outputs found

    The Authority of the Church

    Get PDF

    Introduction to Security Onion

    Get PDF
    Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes data related to: Host, Network, Session, Asset, Alert and Protocols. Security Onion can be implemented as a standalone deployment with server and sensor included or with a master server and multiple sensors allowing for the system to be scaled as required. Many interfaces and tools are available for management of the system and analysis of data such as Sguil, Snorby, Squert and Enterprise Log Search and Archive (ELSA). These interfaces can be used for analysis of alerts and captured events and then can be further exported for analysis in Network Forensic Analysis Tools (NFAT) such as NetworkMiner, CapME or Xplico. The Security Onion platform also provides various methods of management such as Secure SHell (SSH) for management of server and sensors and Web client remote access. All of this with the ability to replay and analyse example malicious traffic makes the Security Onion a suitable low cost alternative for Network Security Management. In this paper, we have a feature and functionality review for the Security Onion in terms of: types of data, configuration, interface, tools and system management

    A survey of intrusion detection system technologies

    Get PDF
    This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection

    Supply Chains and Porous Boundaries: The Disaggregation of Legal Services

    Get PDF
    The economic downturn has had significant effects on law firms, and is causing many of them to rethink some basic assumptions about how they operate. In important respects, however, the downturn has simply intensified the effects of some deeper trends that preceded it, which are likely to continue after any recovery that may occur. This paper explores one of these trends, which is corporate client insistence that law firms “disaggregate” their services into discrete tasks that can be delegated to the least costly providers who can perform them. With advances in communications technology, there is increasing likelihood that some of these persons may be located outside the formal boundaries of the firm. This means that law firms may need increasingly to confront the make or buy decision that their corporate clients have regularly confronted for some time. The potential for vertical disintegration is a relatively recent development for legal services, but is well-established in other sectors of the global economy. Empirical work in several disciplines has identified a number of issues that arise for organizations as the make or buy decision becomes a potentially more salient feature of their operations. Much of this work has focused in particular on the implications of relying on outsourcing as an integral part of the production process. This paper discusses research on: (1) the challenges of ensuring that work performed outside the firm is fully integrated into the production process; (2) coordinating projects for which networks of organizations are responsible; (3) managing the transfer of knowledge inside and outside of firms that are participants in a supply chain; and (4) addressing the impact of using contingent workers on an organization’s workforce, structure, and culture. A review of this research suggests considerations that law firms will need to assess if they begin significantly to extend the process of providing services beyond their formal boundaries. Discussing the research also is intended to introduce concepts that may become increasingly relevant to law firms, but which currently are not commonly used to analyze their operations. Considering how these concepts are applicable to law firms may prompt us to rethink how to conceptualize these firms and what they do. This paper therefore is a preliminary attempt to explore: (1) the extent to which law firms may come to resemble the vertically disintegrated organizations that populate many other economic sectors and (2) the potential implications of this trend for the provision of legal services,the trajectory of legal careers, and lawyers’ sense of themselves as members of a distinct profession

    Alternative strategies for space station financing

    Get PDF
    The attributes of the proposed space station program are oriented toward research activities and technologies which generate long term benefits for mankind. Unless such technologies are deemed of national interest and thus are government funded, they must stand on their own in the market place. Therefore, the objectives of a United States space station should be based on commercial criteria; otherwise, such a project attracts no long term funding. There is encouraging evidence that some potential space station activities should generate revenues from shuttle related projects within the decade. Materials processing concepts as well as remote sensing indicate substantial potential. Futhermore, the economics and thus the commercial feasibility of such projects will be improved by the operating efficiencies available with an ongoing space station program

    Age-related differentiation of sensorimotor control strategies during pursuit and compensatory tracking

    Get PDF
    Motor control deficits during aging have been well-documented. Various causes of neuromotor decline, including both peripheral and central neurological deficits, have been hypothesized. Here, we use a model of closed-loop sensorimotor control to examine the functional causes of motor control deficits during aging. We recruited 14 subjects aged 19-61 years old to participate in a study in which they performed single-joint compensatory and pursuit tracking tasks with their dominant hand. We found that visual response delay and visual noise increased with age, while reliance on visual feedback, especially during compensatory tracking decreased. Increases in visual noise were also positively correlated with increases in movement error during a reach and hold task. The results suggest an increase in noise within the visuomotor control system may contribute to the decline in motor performance during early aging

    Visual and Proprioceptive Contributions to Compensatory and Pursuit Tracking Movements in Humans

    Get PDF
    An ongoing debate in the field of motor control considers how the brain uses sensory information to guide the formation of motor commands to regulate movement accuracy. Recent research has shown that the brain may use visual and proprioceptive information differently for stabilization of limb posture (compensatory movements) and for controlling goal-directed limb trajectory (pursuit movements). Using a series of five experiments and linear systems identification techniques, we modeled and estimated the sensorimotor control parameters that characterize the human motor response to kinematic performance errors during continuous compensatory and pursuit tracking tasks. Our findings further support the idea that pursuit and compensatory movements of the limbs are differentially controlled

    Cross Border Cooperation Health in Ireland

    Get PDF

    Collaborating on Healthcare on an All-Island Basis: A Scoping Study

    Get PDF

    The discursive and therapeutic limitations of psychotherapy: obscuring power issues?

    Get PDF
    This paper highlights and explores the discursive and therapeutic limitations of psychotherapy in dealing with issues of power and difference. In order to do this I focus on the difficulty of exploring issues of race and sexuality in a feminist psychodynamic eating disorders therapy group. Despite feminists' critique of psychoanalytic constructions of gender, object relations has been combined with critical theory to further understanding of women's gendered relationship with their bodies and food. In addition, 'feminist' psychotherapy has been regarded as a means to implement personal and political change. However, in promoting this approach, feminist object relations theorists have failed to deconstruct their own ideas. In theorising eating disorders as both social produced and constructed, feminists' concentration on women's oppression has obscured differences between women. The result is a hegemonic notion of 'woman' and 'women's bodies' as white and heterosexual. In turn, psychodynamic psychotherapy's individualistic focus on personal emotions limits exploration of how salient aspects of subjectivity are constructed - in particular sexual orientation. Taking a discursive position in relation to material from an eating disorders group psychotherapy offers ways to think about these issues not usually available to clinical practitioners. While feminism and psychoanalytic theory have provided insights about subjectivity and power, a failure to critique the assumptions underlying these modes of analysis functions to reproduce and maintain privilege. This has implications for clinical practice in making it difficult to satisfactorily address issues of difference as well as to question notions of normality
    • …
    corecore