12 resultados para cyber security
em WestminsterResearch - UK
Resumo:
This work explores the development of MemTri. A memory forensics triage tool that can assess the likelihood of criminal activity in a memory image, based on evidence data artefacts generated by several applications. Fictitious illegal suspect activity scenarios were performed on virtual machines to generate 60 test memory images for input into MemTri. Four categories of applications (i.e. Internet Browsers, Instant Messengers, FTP Client and Document Processors) are examined for data artefacts located through the use of regular expressions. These identified data artefacts are then analysed using a Bayesian Network, to assess the likelihood that a seized memory image contained evidence of illegal activity. Currently, MemTri is under development and this paper introduces only the basic concept as well as the components that the application is built on. A complete description of MemTri coupled with extensive experimental results is expected to be published in the first semester of 2017.
Resumo:
This article describes findings from research funded by the Metropolitan Police and Crimestoppers which aimed to explore children's online experiences. A non-random, stratified sample of 200 London school children aged 10- 13 participated in focus groups. Preliminary findings are also presented from unpublished ongoing PhD research, which seeks to explore sex offender behaviour online and the policing of the internet (Martellozzo, 2005 ongoing). The findings are discussed in the context of sex offender's use of the internet. This research indicates that children do have some basic knowledge about 'stranger danger' but are not necessarily applying these lessons to cyberspace. The children in this study had sufficient awareness to not give personal details to strangers on the internet, and would not arrange to meet them. However, they made a distinction between 'strangers' and 'virtual friends' and this is an important point. Preliminary findings also highlight the difficulty of policing the internet and serve to illustrate the manner in which the Sexual Offences Act 2003 is applied to internet sexual offending in practice.
Resumo:
This paper explores the prospects and challenges of achieving human security through United Nations (UN) human rights law. The paper does not aim to pronounce definitively on the achievement of human security by way of UN human rights law that is, to assess the achievement of human security per se 'as a future end state'. Rather the focus of the paper is firmly placed on the capacity of UN human rights law to achieve human security. The paper departs from the premise that if human rights define human security, international human rights law and UN human rights law in particular should have something to say about the achievement of human security.
Resumo:
It has been suggested human female breast size may act as signal of fat reserves, which in turn indicates access to resources. Based on this perspective, two studies were conducted to test the hypothesis that men experiencing relative resource insecurity should perceive larger breast size as more physically attractive than men experiencing resource security. In Study 1, 266 men from three sites in Malaysia varying in relative socioeconomic status (high to low) rated a series of animated figures varying in breast size for physical attractiveness. Results showed that men from the low socioeconomic context rated larger breasts as more attractive than did men from the medium socioeconomic context, who in turn perceived larger breasts as attractive than men from a high socioeconomic context. Study 2 compared the breast size judgements of 66 hungry versus 58 satiated men within the same environmental context in Britain. Results showed that hungry men rated larger breasts as significantly more attractive than satiated men. Taken together, these studies provide evidence that resource security impacts upon men’s attractiveness ratings based on women’s breast size.
Resumo:
The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants - insulated from the minutiae of hardware maintenance - rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.
Resumo:
This article challenges those perspectives which assert first, that the Security Council’s engagement with the Responsibility to Protect (R2P) during the Arab Spring evidences a generally positive trend, and second, that the response to the Arab Spring, particularly Syria, highlights the need for veto restraint. With respect to the first point, the evidence presented in this article suggests that the manner in which R2P has been employed by the Security Council during this period evidences three key trends: first, a willingness to invoke R2P only in the context of Pillar I; second, a pronounced lack of consensus surrounding Pillar III; and third, the persistent prioritisation of national interests over humanitarian concerns. With respect to veto restraint, this article argues that there is no evidence that this idea will have any significant impact on decision-making at the Security Council; the Council’s response to the Arab Spring suggests that national interests continue to trump humanitarian need.