2 resultados para Figurations
em Queensland University of Technology - ePrints Archive
Resumo:
Using Elias and Scotson's (1994) account of established-outsider relations, this article examines how the organisational capacity of specific social groups is significant in determining the quality of crime-talk in isolated and rural settings. In particular, social 'oldness' and notions of what constitutes 'community' are significant in determining what activities and individuals are salient within crime-talk. Individual and gorup interviews, conducted in a West Australian mining town, revealed how crime-talk is an artefact of specific social figurations and the relative ability of groups to act as cohesive and integrated networks. We argue that anxieties regarding crime are a product of specific social figurations and the shifting power ratios of groups within such figurations.
Resumo:
The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols to control national infrastructure. The move from point-to-point serial connections to Ethernet-based network architectures, allowing for large and complex critical infrastructure networks. However, networks and con- figurations change, thus auditing tools are needed to aid in critical infrastructure network discovery. In this paper we present a series of intrusive techniques used for reconnaissance on DNP3 critical infrastructure. Our algorithms will discover DNP3 outstation slaves along with their DNP3 addresses, their corresponding master, and class object configurations. To validate our presented DNP3 reconnaissance algorithms and demonstrate it’s practicality, we present an implementation of a software tool using a DNP3 plug-in for Scapy. Our implementation validates the utility of our DNP3 reconnaissance technique. Our presented techniques will be useful for penetration testing, vulnerability assessments and DNP3 network discovery.