4 research outputs found

    Valutazione della sicurezza delle comunicazioni con i principali istituti di credito online

    Get PDF
    In questa tesi sono stati studiati in maniera approfondita i protocolli crittografici SSL/TLS mettendone in risalto le potenzialitĂ  cosĂŹ come le debolezze in correlazione all'uso con HTTPS. Sono stati studiati gli aspetti relativi ai certificati, all'infrastruttura a chiave pubblica e sono stati riportati vari tipi di attacchi conosciuti alla sicurezza delle comunicazioni. Successivamente, lo scopo del progetto Ăš stato quello di sviluppare un tool per l'analisi passiva delle comunicazioni HTTPS di un sito web. In particolare il tool ha permesso di individuare ed identificare errate configurazioni e problemi legati alla sicurezza del server web. Infine si Ăš adoperato il tool per analizzare, in anonimato, alcuni istituti di credito italiano

    Honeypot studie av cyberhot riktade mot kritisk infrastruktur

    No full text
    Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. Low-interaction honeypots are emulated systems that try to recreate a real environment by simulating applications and protocols. These types of honeypots still need improvements to be efficient, and during this thesis work the focus has been on the Conpot open-source ICS honeypot. Due to their nature, low-interaction honeypots are less appealing to potential attackers than high-interaction honeypots since they do not provide the same level of realism and can be easier discovered. Earlier works showed ways to increase the ability to attract more visitors and an improved setup of Conpot has been evaluated. Its results have been analyzed and compared with the default installation. Several advancements have been implemented as well as custom features and working functionalities, such as a customized industrial system design, improved logging, and a web API proxy. The goal of this work is to answer the investigated hypothesis which consists in finding out if an improved version of the low-interaction honeypot can yield more significant results. By evaluating the network traffic received, the outcome has been insightful and showcased a distinguished improvement over the original version of the honeypot. The ICS protocols displayed a more considerable number of interactions along with an increased amount of attacks. In conclusion, further development for the Conpot honeypot is desirable which would largely improve its performance and practicality in real-world deployments.Honeypots Àr ett system med avsikten att samla information om potentiella hot och samtidigt avleda uppmÀrksamheten frÄn de verkliga mÄlen. I industriella kontrollsystemsmiljöer spelar honungskrukor en viktig roll och kan leda till ytterligare hotstudier samtidigt som potentiella angripare distraheras frÄn viktiga fysiska system. Honeypots med lÄg interaktion Àr emulerade system som försöker Äterskapa verkliga miljöer genom att simulera applikationer och protokoll. Dessa typer av honeypots behöver fortfarande förbÀttringar för att vara effektiva, och under detta examensarbete har fokus legat pÄ Conpot open source ICS honeypots. PÄ grund av designbegrÀnsningar Àr honeypots med lÄg interaktion mindre tilltalande för potentiella angripare Àn honeypots med hög interaktion. Tidigare arbeten har visat sÀtt att öka möjligheten att locka fler besökare och en förbÀttrad installation av Conpot har utvÀrderats och dess resultat har analyserats och jÀmförts med standardinstallationen. Flera framsteg har implementerats samt anpassade funktioner och fungerande funktioner, sÄsom en anpassad industriell systemdesign, förbÀttrad loggning och en webb-API-proxy. MÄlet med detta arbete Àr att svara pÄ den undersökta hypotesen som gÄr ut pÄ att ta reda pÄ om en förbÀttrad version av honungskrukan med lÄg interaktion kan ge mer signifikanta resultat. Genom att utvÀrdera den mottagna nÀtverkstrafiken har resultatet varit insiktsfullt och visat upp en stor förbÀttring jÀmfört med den ursprungliga versionen av honeypot. ICS-protokollen visade ett större antal interaktioner tillsammans med en ökad mÀngd attacker. Sammanfattningsvis Àr det önskvÀrt med en vidareutveckling av Conpot honeypot som avsevÀrt skulle förbÀttra dess prestanda och praktiska anvÀndning i den verkliga vÀrlden

    Honeypot studie av cyberhot riktade mot kritisk infrastruktur

    No full text
    Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. Low-interaction honeypots are emulated systems that try to recreate a real environment by simulating applications and protocols. These types of honeypots still need improvements to be efficient, and during this thesis work the focus has been on the Conpot open-source ICS honeypot. Due to their nature, low-interaction honeypots are less appealing to potential attackers than high-interaction honeypots since they do not provide the same level of realism and can be easier discovered. Earlier works showed ways to increase the ability to attract more visitors and an improved setup of Conpot has been evaluated. Its results have been analyzed and compared with the default installation. Several advancements have been implemented as well as custom features and working functionalities, such as a customized industrial system design, improved logging, and a web API proxy. The goal of this work is to answer the investigated hypothesis which consists in finding out if an improved version of the low-interaction honeypot can yield more significant results. By evaluating the network traffic received, the outcome has been insightful and showcased a distinguished improvement over the original version of the honeypot. The ICS protocols displayed a more considerable number of interactions along with an increased amount of attacks. In conclusion, further development for the Conpot honeypot is desirable which would largely improve its performance and practicality in real-world deployments.Honeypots Àr ett system med avsikten att samla information om potentiella hot och samtidigt avleda uppmÀrksamheten frÄn de verkliga mÄlen. I industriella kontrollsystemsmiljöer spelar honungskrukor en viktig roll och kan leda till ytterligare hotstudier samtidigt som potentiella angripare distraheras frÄn viktiga fysiska system. Honeypots med lÄg interaktion Àr emulerade system som försöker Äterskapa verkliga miljöer genom att simulera applikationer och protokoll. Dessa typer av honeypots behöver fortfarande förbÀttringar för att vara effektiva, och under detta examensarbete har fokus legat pÄ Conpot open source ICS honeypots. PÄ grund av designbegrÀnsningar Àr honeypots med lÄg interaktion mindre tilltalande för potentiella angripare Àn honeypots med hög interaktion. Tidigare arbeten har visat sÀtt att öka möjligheten att locka fler besökare och en förbÀttrad installation av Conpot har utvÀrderats och dess resultat har analyserats och jÀmförts med standardinstallationen. Flera framsteg har implementerats samt anpassade funktioner och fungerande funktioner, sÄsom en anpassad industriell systemdesign, förbÀttrad loggning och en webb-API-proxy. MÄlet med detta arbete Àr att svara pÄ den undersökta hypotesen som gÄr ut pÄ att ta reda pÄ om en förbÀttrad version av honungskrukan med lÄg interaktion kan ge mer signifikanta resultat. Genom att utvÀrdera den mottagna nÀtverkstrafiken har resultatet varit insiktsfullt och visat upp en stor förbÀttring jÀmfört med den ursprungliga versionen av honeypot. ICS-protokollen visade ett större antal interaktioner tillsammans med en ökad mÀngd attacker. Sammanfattningsvis Àr det önskvÀrt med en vidareutveckling av Conpot honeypot som avsevÀrt skulle förbÀttra dess prestanda och praktiska anvÀndning i den verkliga vÀrlden

    Brazilian consensus for diagnosis, management and treatment of hereditary transthyretin amyloidosis with peripheral neuropathy: second edition

    No full text
    Hereditary transthyretin amyloidosis with peripheral neuropathy (ATTRv-PN) is an autosomal dominant inherited sensorimotor and autonomic polyneuropathy with over 130 pathogenic variants identified in the TTR gene. Hereditary transthyretin amyloidosis with peripheral neuropathy is a disabling, progressive and life-threatening genetic condition that leads to death in ∌ 10 years if untreated. The prospects for ATTRv-PN have changed in the last decades, as it has become a treatable neuropathy. In addition to liver transplantation, initiated in 1990, there are now at least 3 drugs approved in many countries, including Brazil, and many more are being developed. The first Brazilian consensus on ATTRv-PN was held in the city of Fortaleza, Brazil, in June 2017. Given the new advances in the area over the last 5 years, the Peripheral Neuropathy Scientific Department of the Brazilian Academy of Neurology organized a second edition of the consensus. Each panelist was responsible for reviewing the literature and updating a section of the previous paper. Thereafter, the 18 panelists got together virtually after careful review of the draft, discussed each section of the text, and reached a consensus for the final version of the manuscript
    corecore