59 research outputs found
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization’s system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
Malware in the Future? Forecasting of Analyst Detection of Cyber Events
There have been extensive efforts in government, academia, and industry to
anticipate, forecast, and mitigate cyber attacks. A common approach is
time-series forecasting of cyber attacks based on data from network telescopes,
honeypots, and automated intrusion detection/prevention systems. This research
has uncovered key insights such as systematicity in cyber attacks. Here, we
propose an alternate perspective of this problem by performing forecasting of
attacks that are analyst-detected and -verified occurrences of malware. We call
these instances of malware cyber event data. Specifically, our dataset was
analyst-detected incidents from a large operational Computer Security Service
Provider (CSSP) for the U.S. Department of Defense, which rarely relies only on
automated systems. Our data set consists of weekly counts of cyber events over
approximately seven years. Since all cyber events were validated by analysts,
our dataset is unlikely to have false positives which are often endemic in
other sources of data. Further, the higher-quality data could be used for a
number for resource allocation, estimation of security resources, and the
development of effective risk-management strategies. We used a Bayesian State
Space Model for forecasting and found that events one week ahead could be
predicted. To quantify bursts, we used a Markov model. Our findings of
systematicity in analyst-detected cyber attacks are consistent with previous
work using other sources. The advanced information provided by a forecast may
help with threat awareness by providing a probable value and range for future
cyber events one week ahead. Other potential applications for cyber event
forecasting include proactive allocation of resources and capabilities for
cyber defense (e.g., analyst staffing and sensor configuration) in CSSPs.
Enhanced threat awareness may improve cybersecurity.Comment: Revised version resubmitted to journa
Skin -To-Skin Contact After Cesarean Delivery.
1. Skin to Skin
Brittany Cerino, BSN, RN, Julia Gogle, MSN, RNC-OB and Roxann Wagner, MSN, RNC-NI
Characterization of vascular strain during in-vitro angioplasty with high-resolution ultrasound speckle tracking
<p>Abstract</p> <p>Background</p> <p>Ultrasound elasticity imaging provides biomechanical and elastic properties of vascular tissue, with the potential to distinguish between tissue motion and tissue strain. To validate the ability of ultrasound elasticity imaging to predict structurally defined physical changes in tissue, strain measurement patterns during angioplasty in four bovine carotid artery pathology samples were compared to the measured physical characteristics of the tissue specimens.</p> <p>Methods</p> <p>Using computational image-processing techniques, the circumferences of each bovine artery specimen were obtained from ultrasound and pathologic data.</p> <p>Results</p> <p>Ultrasound-strain-based and pathology-based arterial circumference measurements were correlated with an R<sup>2 </sup>value of 0.94 (p = 0.03). The experimental elasticity imaging results confirmed the onset of deformation of an angioplasty procedure by indicating a consistent inflection point where vessel fibers were fully unfolded and vessel wall strain initiated.</p> <p>Conclusion</p> <p>These results validate the ability of ultrasound elasticity imaging to measure localized mechanical changes in vascular tissue.</p
Cyber security incident handling, warning and response system for the european critical information infrastructures (cyberSANE)
This paper aims to enhance the security and resilience of Critical
Information Infrastructures (CIIs) by providing a dynamic collaborative,
warning and response system (CyberSANE system) supporting and guiding security
officers and operators (e.g. Incident Response professionals) to recognize,
identify, dynamically analyse, forecast, treat and respond to their threats and
risks and handle their daily cyber incidents. The proposed solution provides a
first of a kind approach for handling cyber security incidents in the digital
environments with highly interconnected, complex and diverse nature
CSIRTs and Global Cybersecurity: How Technical Experts Support Science Diplomacy
Ongoing efforts by state actors to collaborate on addressing the challenges of global cybersecurity have been slow to yield results. Technical expert communities such as Computer Security and Incident Response Teams (CSIRTs) have played a fundamental role in maintaining the Internet's functional structure through transnational collaboration. Responsible for security incident management and located in diverse constituencies, these coordination centres engage in joint responses and solve day‐to‐day cybersecurity problems through diverse national, regional and international networks. This article argues that CSIRTs form an epistemic community that engages in science diplomacy, at times navigating geopolitical tensions in a way that political actors are not able to. Through interviews with CSIRT representatives, we explain how their collaborative actions, rooted in shared technical knowledge, norms and best practices, contribute to the advancement of international cooperation on cybersecurity
Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide
Cybersecurity Framework Manufacturing Profile Low Security Level Example Implementations Guide
- …
