572 research outputs found

    Global Progress Toward Implementing the United Nations Fish Stocks Agreement

    Get PDF
    This brief examines the progress made in implementing the Fish Stocks Agreement, based on a review of the status of certain highly migratory stocks and the effectiveness of regional fishery management organization (RFMO) measures in meeting specific mandates. It also looks at whether recommendations made in prior reviews have been implemented

    Real-time monitoring as a supplementary security component of vigilantism in modern network environments

    Get PDF
    © 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments

    Democratisation and local government in Latin America

    Get PDF

    Adding Digital Forensic Readiness as a Security Component to the IoT Domain

    Get PDF
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart environments”. This experience has begun to be felt across different IoT-based domains like healthcare, surveillance, energy systems, home appliances, industrial machines, smart grids and smart cities. These developments have, however, brought about a more complex and heterogeneous environment which is slowly becoming a home to cyber attackers. Digital Forensic Readiness (DFR) though can be employed as a mechanism for maximizing the potential use of digital evidence while minimizing the cost of conducting a digital forensic investigation process in IoT environments in case of an incidence. The problem addressed in this paper, therefore, is that at the time of writing this paper, there still exist no IoT architectures that have a DFR capability that is able to attain incident preparedness across IoT environments as a mechanism of preparing for post-event response process. It is on this premise, that the authors are proposing an architecture for incorporating DFR to IoT domain for proper planning and preparing in the case of security incidents. It is paramount to note that the DFR mechanism in IoT discussed in this paper complies with ISO/IEC 27043: 2015, 27030:2012 and 27017: 2015 international standards. It is the authors’ opinion that the architecture is holistic and very significant in IoT forensics

    A revision of sexual mixing matrices in models of sexually transmitted infection

    Get PDF
    Two sexual mixing matrices previously used in models of sexually transmitted infections (STIs) are intended to calculate the probability of sexual interaction between age groups and sexual behaviour subgroups. When these matrices are used to specify multiple criteria for how people select sexual partners (such as age group and sexual behaviour class), their conditional probability structure means that they have in practice been prone to misuse. We constructed revised mixing matrices that incorporate a corrected conditional probability structure and then used one of them to examine the effect of this revision on population modelling of STIs. Using a dynamic model of human papillomavirus (HPV) transmission as an example, we examined changes to estimates of HPV prevalence and the relative reduction in age-standardised HPV incidence after the commencement of publicly funded HPV vaccination in Australia. When all other model specifications were left unchanged, the revised mixing matrix initially led to estimates of age-specific oncogenic HPV prevalence that were up to 11% higher than our previous models at certain ages. After re-calibrating the model by modifying unobservable parameters characterising HPV natural history, the revised mixing matrix yielded similar estimates to our previous models, predicting that vaccination would lead to relative HPV incidence reductions of 43% and 85% by 2010 and 2050, respectively, compared with 43% and 86% using the unrevised mixing matrix formulation. Our revised mixing matrix offers a rigorous alternative to commonly used mixing matrices, which can be used to reliably and explicitly accommodate conditional probabilities, with appropriate re-calibration of unobservable model parameter

    Digital forensic readiness intelligence crime repository

    Get PDF
    It may not always be possible to conduct a digital (forensic) investigation post-event if there is no process in place to preserve potential digital evidence. This study posits the importance of digital forensic readiness, or forensic-by-design, and presents an approach that can be used to construct a Digital Forensic Readiness Intelligence Repository (DFRIR). Based on the concept of knowledge sharing, the authors leverage this premise to suggest an intelligence repository. Such a repository can be used to cross-reference potential digital evidence (PDE) sources that may help digital investigators during the process. This approach employs a technique of capturing PDE from different sources and creating a DFR repository that can be able to be shared across diverse jurisdictions among digital forensic experts and law enforcement agencies (LEAs), in the form of intelligence. To validate the approach, the study has employed a qualitative approach based on a number of metrics and an analysis of experts\u27 opinion has been incorporated. The DFRIR seeks to maximize the collection of PDE, and reducing the time needed to conduct forensic investigation (e.g., by reducing the time for learning). This study then explains how such an approach can be employed in conjunction with ISO/IEC 27043: 2015

    A Tool for Developing Correct Programs by Refinement

    Get PDF
    This report reviews the requirements for tool support of refinement, and reports on the design and implementation of a new tool to support refinement based on these requirements. The main features of the new tool are close integration of refinement and proof in a single tool, good management of the refinement context, an extensible theory base that allows the tool to be adapted to new application domains, and a flexible user interface

    The Politics of Service Delivery Reform

    Get PDF
    This article identifies the leaders, the supporters and the resisters of public service reform. It adopts a principal–agent framework, comparing reality with an ‘ideal’ situation in which citizens are the principals over political policy-makers as their agents, and policy-makers are the principals over public service officials as their agents. Reform in most developing countries is complicated by an additional set of external actors — international financial institutions and donors. In practice, international agencies and core government officials usually act as the ‘principals’ in the determination of reforms. The analysis identifies the interests involved in reform, indicating how the balance between them is affected by institutional and sectoral factors. Organizational reforms, particularly in the social sectors, present greater difficulties than first generation economic policy reforms

    Ontology‐driven perspective of CFRaaS

    Get PDF
    A Cloud Forensic Readiness as a Service (CFRaaS) model allows an environment to preemptively accumulate relevant potential digital evidence (PDE) which may be needed during a post‐event response process. The benefit of applying a CFRaaS model in a cloud environment, is that, it is designed to prevent the modification/tampering of the cloud architectures or the infrastructure during the reactive process, which if it could, may end up having far‐reaching implications. The authors of this article present the reactive process as a very costly exercise when the infrastructure must be reprogrammed every time the process is conducted. This may hamper successful investigation from the forensic experts and law enforcement agencies perspectives. The CFRaaS model, in its current state, has not been presented in a way that can help to classify or visualize the different types of potential evidence in all the cloud deployable models, and this may limit the expectations of what or how the required PDE may be collected. To address this problem, the article presents the CFRaaS from a holistic ontology‐driven perspective, which allows the forensic experts to be able to apply the CFRaaS based on its simplicity of the concepts, relationship or semantics between different form of potential evidence, as well as how the security of a digital environment being investigated could be upheld. The CFRaaS in this context follows a fundamental ontology engineering approach that is based on the classical Resource Description Framework. The proposed ontology‐driven approach to CFRaaS is, therefore, a knowledge‐base that uses layer‐dependencies, which could be an essential toolkit for digital forensic examiners and other stakeholders in cloud‐security. The implementation of this approach could further provide a platform to develop other knowledge base components for cloud forensics and security
    • 

    corecore