195 research outputs found
Land Grant Application- Storer, William (Hiram)
Land grant application submitted to the Maine Land Office on behalf of William Storer for service in the Revolutionary War, by their widow Sarah.https://digitalmaine.com/revolutionary_war_me_land_office/1866/thumbnail.jp
Enhancing security incident response follow-up efforts with lightweight agile retrospectives
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents. The final phase within many security incident response approaches is the feedback/follow-up phase. It is within this phase that an organization is expected to use information collected during an investigation in order to learn from an incident, improve its security incident response process and positively impact the wider security environment. However, recent research and security incident reports argue that organizations find it difficult to learn from incidents.
A contributing factor to this learning deficiency is that industry focused security incident response approaches, typically, provide very little practical information about tools or techniques that can be used to extract lessons learned from an investigation. As a result, organizations focus on improving technical security controls and not examining or reassessing the effectiveness or efficiency of internal policies and procedures. An additional hindrance, to encouraging improvement assessments, is the absence of tools and/or techniques that organizations can implement to evaluate the impact of implemented enhancements in the wider organization. Hence, this research investigates the integration of lightweight agile retrospectives and meta-retrospectives, in a security incident response process, to enhance feedback and/or follow-up efforts. The research contribution of this paper is twofold. First, it presents an approach based on lightweight retrospectives as a means of enhancing security incident response follow-up efforts. Second, it presents an empirical evaluation of this lightweight approach in a Fortune 500 Financial organization's security incident response team
Security Incident Response Criteria: A Practitioner's Perspective
Industrial reports indicate that security incidents continue to inflict large financial losses on organizations.
Researchers and industrial analysts contend that there are fundamental problems with existing security
incident response process solutions. This paper presents the Security Incident Response Criteria (SIRC)
which can be applied to a variety of security incident response approaches. The criteria are derived from
empirical data based on in-depth interviews conducted within a Global Fortune 500 organization and
supporting literature. The research contribution of this paper is twofold. First, the criteria presented in this
paper can be used to evaluate existing security incident response solutions and second, as a guide, to
support future security incident response improvement initiatives
Rethinking Security Incident Response: The Integration of Agile Principles
In today's globally networked environment, information security incidents can
inflict staggering financial losses on organizations. Industry reports indicate
that fundamental problems exist with the application of current linear
plan-driven security incident response approaches being applied in many
organizations. Researchers argue that traditional approaches value containment
and eradication over incident learning. While previous security incident
response research focused on best practice development, linear plan-driven
approaches and the technical aspects of security incident response, very little
research investigates the integration of agile principles and practices into
the security incident response process. This paper proposes that the
integration of disciplined agile principles and practices into the security
incident response process is a practical solution to strengthening an
organization's security incident response posture.Comment: Paper presented at the 20th Americas Conference on Information
Systems (AMCIS 2014), Savannah, Georgi
Evaluation of a plasmid delivery system for production of GnRH and GHRH in the horse and goat
The efficacy of a novel plasmid delivery system was assessed for long-term expression of gonadotropin releasing hormone (GnRH) and growth hormone releasing hormone (GHRH) in horses and goats. The efficacy of the technology was demonstrated using 3 novel plasmids: pSEAP [expressing secreted embryonic alkaline phosphatase (SEAP)], pGHRH (expressing GHRH), and pGnRH (expressing GnRH). Geldings were electroporated with a reporter plasmid expressing SEAP in 3 muscle sites. Expression of SEAP, measured from jugular plasma samples, indicated muscle specificity for uptake and expression of the plasmid. Concentrations of SEAP were greatest (P \u3c 0.05) after pectoralis injection, which was chosen as the site for electroporation in subsequent studies. In a second experiment, stallions were electroporated with pGHRH or pSEAP to evaluate the effect of long-term GHRH treatment on the growth hormone (GH) axis and testicular function. Stallions treated with pGHRH had increased (P \u3c 0.05) plasma concentrations of IGF-I, increased (P \u3c 0.05) volume of accessory sex gland fluid, and increased (P \u3c 0.05) number of normal spermatozoa in the ejaculate relative to controls. In the third experiment, stallions were electroporated with pGnRH or pSEAP to test the effects of GnRH on the reproductive axis. Treatment with pGnRH increased (P \u3c 0.05) plasma testosterone concentrations to d 56 and increased (P \u3c 0.01) the LH response to GnRH on d 21, but did not alter (P \u3e 0.1) seminal characteristics evaluated after 36 d of treatment. In a final experiment, goat does were treated with pGnRH or pSEAP to assess the effects of GnRH treatment on the reproductive axis during seasonal anestrus. Plasma concentrations of LH and FSH were not affected (P \u3e 0.1) by treatment through d 56. Plasma progesterone measurements indicated that ovulation did not occur in does treated with pGnRH or pSEAP. Does treated with pSEAP had increased (P \u3c 0.05) plasma SEAP concentrations. In conclusion, electroporatic plasmid delivery of peptide hormones may serve as an effective technique for expression of protein hormones in the horse and goat
The effects of growth hormone or melatonin on the reproductive axis of stallions
Two experiments were conducted to determine the effects of growth hormone (GH) or melatonin on the reproductive axis of the stallion. In Experiment 1, nine stallions were treated with GH (20 µg/kg BW) or saline for 21 d starting in January. During the last week of treatment, stallions were subjected to low and high dose injections of luteinizing hormone (LH), as well as low and high dose combined injections of gonadotropin releasing hormone (GnRH) and thyrotropin releasing hormone (TRH). Two months after the onset of GH treatment, semen was collected from all stallions every other day for 2 weeks. Treatment with recombinant equine GH increased (P \u3c 0.001) daily IGF-I concentrations, but had no effect (P \u3e 0.1) on concentrations of LH, follicle stimulating hormone (FSH), or testosterone. The testosterone responses to injections of LH were similar (P \u3e 0.1) between treatments. Likewise, the LH, FSH, prolactin, and testosterone responses to the injections of GnRH/TRH were similar (P \u3e 0.1) between groups. Stallions treated with GH exhibited greater volumes of gel-free semen (P \u3c 0.01) and gel (P \u3c 0.05) and had decreased time until ejaculation (P \u3c 0.05). In Experiment 2, nine stallions were given corn syrup containing either melatonin (0.06 mg/kg BW) or nothing for 90 d starting in July. Between d 68 and 75 of treatment, stallions were given injections of LH and combined injections of GnRH and TRH, similar to Experiment I. Semen was collected from all stallions for three days during the last week of treatment. Treated stallions exhibited decreased daily concentrations of prolactin (P \u3c 0.01) and FSH (P \u3c 0.05), and tended to have lower (P = 0.07) LH concentrations for the first 30 d. Testosterone concentrations were similar between groups. In treated stallions, the low dose administration of GnRH/TRH was not as effective (P \u3c 0.01) at increasing plasma concentrations of FSH and testosterone, and the response in plasma prolactin concentrations to a high dose administration of GnRH/TRH was decreased (P \u3c 0.01). Melatonin treatment did not alter seminal characteristics or libido. In conclusion, GH may alter the long-term accessory gland contribution to seminal volume, but does not appear to interact with other constituents of the reproductive axis in the stallion. Long-term melatonin administration decreases plasma concentrations of gonadotropins and prolactin, but the role of melatonin in perturbation of hypothalamic interaction with the pituitary deserves further study
In-the-wild residual data research and privacy
As the world becomes increasingly dependent on technology, researchers endeavor to understand how technology is used, the impact it has on everyday life and the life-cycle and span of digital information. In doing so, researchers are
increasingly gathering `real-world' or `in the wild' residual data, obtained from a variety of sources without the explicit consent of the original owners.
This data gathering raises significant concerns regarding privacy, ethics and legislation, as well as practical considerations concerning investigator training, data storage, overall security and disposal. This paper surveys recent studies of residual data gathered in the wild and analyses the challenges that were faced. Taking these insights, the paper presents a compendium of practices
for addressing the issues that arise in in the wild residual data research. The practices presented in this paper can be used to critique current projects and assess the feasibility of proposed future research
Security Incident Response Criteria: A Practitioner\u27s Perspective
Industrial reports indicate that security incidents continue to inflict large financial losses on organizations. Researchers and industrial analysts contend that there are fundamental problems with existing security incident response process solutions. This paper presents the Security Incident Response Criteria (SIRC) which can be applied to a variety of security incident response approaches. The criteria are derived from empirical data based on in-depth interviews conducted within a Global Fortune 500 organization and supporting literature. The research contribution of this paper is twofold. First, the criteria presented in this paper can be used to evaluate existing security incident response solutions and second, as a guide, to support future security incident response improvement initiatives
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations
An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, and recorded in relevant datastores. One potential source supplying these datastores is an organization’s security incident response team. However, researchers have argued that these teams focus more on eradication and recovery and less on providing feedback to enhance organizational security. This prompts the idea that data collected during security incident investigations may be of insufficient quality for threat intelligence analysis. While previous discussions focus on data quality issues from threat intelligence sharing perspectives, minimal research examines the data generated during incident response investigations. This paper presents the results of a case study identifying data quality challenges in a Fortune 500 organization’s incident response team. Furthermore, the paper provides the foundation for future research regarding data quality concerns in security incident response
IMPACT OF SCENARIO BASED EXERCISE ON ORGANISATION RESILIENCE IN CRITICAL INFRASTRUCTURE ORGANISATIONS
Critical infrastructures are organisations that deliver vital services like telecommunication, energy and water suppliers to the community. Today, threats on critical infrastructure are differs from natural disasters, technical failures, man-made and cyber-attacks. Any disruptions on critical infrastructures could create a catastrophic damage. Protecting critical infrastructures and cultivating resilience has become a main agenda in many countries. Collaboration effort between public and private in crisis management through Scenario Based Exercise (SBE) was part of the agenda. SBE also known as Scenario Based Training (SBT) is a management tool used to train decision makers in crisis situations. However crisis management exercises through SBE appear to produce indistinct learning results which very limited in applicability. Using benchmark tool developed by Resilient Organisations Research at the University of Canterbury in New Zealand, this paper attempt investigate how SBE reflects the organisation resilience and determine the correlations between SBE and organisation resilience in critical infrastructures organisations
- …