2 resultados para 390404 Detection and Prevention of Crime


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this study was to develop a multiplex loop-mediated isothermal amplification (LAMP) method capable of detecting Escherichia coli generally and verocytotoxigenic E. coli (VTEC) specifically in beef and bovine faeces. The LAMP assay developed was highly specific (100%) and able to distinguish between E. coli and VTEC based on the amplification of the phoA, and stx1 and/or stx2 genes, respectively. In the absence of an enrichment step, the limit of detection 50% (LOD50) of the LAMP assay was determined to be 2.83, 3.17 and 2.83-3.17 log CFU/g for E. coli with phoA, stx1 and stx2 genes, respectively, when artificially inoculated minced beef and bovine faeces were tested. The LAMP calibration curves generated with pure cultures, and spiked beef and faeces, suggested that the assay had good quantification capability. Validation of the assay, performed using retail beef and bovine faeces samples, demonstrated good correlation between counts obtained by the LAMP assay and by a conventional culture method, but suggested the possibility of false negative LAMP results for 12.5-14.7% of samples tested. The multiplex LAMP assay developed potentially represents a rapid alternative to culture for monitoring E.coli levels in beef or faeces and it would provide additional information on the presence of VTEC. However, some further optimisation is needed to improve detection sensitivity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.