1,056 research outputs found

    Dynamic cyber-incident response

    Get PDF
    Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE.Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation

    NASA/RAE collaboration on nonlinear control using the F-8C digital fly-by-wire aircraft

    Get PDF
    Design procedures are reviewed for variable integral control to optimize response (VICTOR) algorithms and results of preliminary flight tests are presented. The F-8C aircraft is operated in the remotely augmented vehicle (RAV) mode, with the control laws implemented as FORTRAN programs on a ground-based computer. Pilot commands and sensor information are telemetered to the ground, where the data are processed to form surface commands which are then telemetered back to the aircraft. The RAV mode represents a singlestring (simplex) system and is therefore vulnerable to a hardover since comparison monitoring is not possible. Hence, extensive error checking is conducted on both the ground and airborne computers to prevent the development of potentially hazardous situations. Experience with the RAV monitoring and validation procedures is described

    Scottish enlightenment and the development of accounting

    Get PDF
    This article outlines the lives and background of the main writers who were active in the 18th century period of \u27scottish Ascendancy\u27 in accounting texts. The impressive publications produced by this group are detailed and the question of why this phenomenon should have occurred in Scotland is considered. It is suggested that the Scottish Ascendancy in accounting texts can be considered as part of the achievements of the Scottish Enlightenment and as complementary to the more renowned works in economics, law and philosophy, which are generally recognized as an important component of that movement

    An Early Beaker funerary monument at Porton Down, Wiltshire

    No full text
    Excavation of an Early Beaker-Early Bronze Age funerary monument at Porton Down revealed an unusually complex burial sequence of 12 individuals, spanning four centuries, including eight neonates or infants and only one probable male, surrounded by a segmented ring-ditch. In the centre was a large grave which contained the disturbed remains of an adult female, accompanied by a Beaker, which had probably been placed within a timber chamber and later ‘revisited’ on one or more occasions. This primary burial and an antler pick from the base of the ring-ditch provided identical Early Beaker radiocarbon dates. Two burials were accompanied by a Food Vessel and a miniature Collared Urn respectively, others were unaccompanied, and there was a single and a double cremation burial, both within inverted Collared Urns. A C-shaped enclosure nearby may have been contemporary with the funerary monument, but its date and function are uncertain. Other features included an Early Neolithic pit which contained a significant assemblage of worked flint, and several Middle Bronze Age ditches and a Late Bronze Age ‘Wessex Linear’ ditch that reflect later prehistoric land divisions probably related to stock control

    Accounting control: An historical note

    Get PDF
    Over the centuries, control has expanded from its origins as a specialized accounting technique to cover many forms of regulatory activity in any area and its emphasis has expanded from that of ex post accountability to include ex ante planning and budgeting. Although financial control continues as a vital feature of accounting systems, accountants now frequently go outside their own discipline when they describe the major features of control systems. The accounting origins of control lay buried in the pages of The Oxford English Dictionary
    corecore