984 resultados para security features
Resumo:
Inside cyber security threats by system administrators are some of the main concerns of organizations about the security of systems. Since operating systems are controlled and managed by fully trusted administrators, they can negligently or intentionally break the information security and privacy of users and threaten the system integrity. In this thesis, we propose some solutions for enhancing the security of Linux OS by restricting administrators’ access to superuser’s privileges while they can still manage the system. We designed and implemented an interface for administrators in Linux OS called Linux Admins’ User Interface (LAUI) for managing the system in secure ways. LAUI along with other security programs in Linux like sudo protect confidentiality and integrity of users’ data and provide a more secure system against administrators’ mismanagement. In our model, we limit administrators to perform managing tasks in secure manners and also make administrators accountable for their acts. In this thesis we present some scenarios for compromising users’ data and breaking system integrity by system administrators in Linux OS. Then we evaluate how our solutions and methods can secure the system against these administrators’ mismanagement.
Resumo:
Within the framework of state security policy, the focus of this dissertation are the relations between how new security threats are perceived and the policy planning and bureaucratic implementation that are designed to address them. In addition, this thesis explores and studies some of the inertias that might exist in the core of the state apparatus as it addresses new threats and how these could be better managed. The dissertation is built on five thematic and interrelated articles highlighting different aspects of when new significant national security threats are detected by different governments until the threats on the policy planning side translate into protective measures within the society. The timeline differs widely between different countries and some key aspects of this process are also studied. One focus concerns mechanisms for adaptability within the Intelligence Community, another on the policy planning process within the Cabinet Offices/National Security Councils and the third focus is on the planning process and how policy is implemented within the bureaucracy. The issue of policy transfer is also analysed, revealing that there is some imitation of innovation within governmental structures and policies, for example within the field of cyber defence. The main findings of the dissertation are that this context has built-in inertias and bureaucratic seams found in most government bureaucratic machineries. As much of the information and planning measures imply security classification of the transparency and internal debate on these issues, alternative assessments become limited. To remedy this situation, the thesis recommends ways to improve the decision-making system in order to streamline the processes involved in making these decisions. Another special focus of the thesis concerns the role of the public policy think tanks in the United States as an instrument of change in the country’s national security decision-making environment, which is viewed from the perspective as being a possible source of new ideas and innovation. The findings in this part are based on unique interviews data on how think tanks become successful and influence the policy debate in a country such as the United States. It appears clearly that in countries such as the United States think tanks smooth the decision making processes, and that this model with some adaptations also might be transferrable to other democratic countries.
Resumo:
Vascular adhesion protein-1 (VAP-1), which belongs to the copper amine oxidases (CAOs), is a validated drug target in inflammatory diseases. Inhibition of VAP-1 blocks the leukocyte trafficking to sites of inflammation and alleviates inflammatory reactions. In this study, a novel set of potent pyridazinone inhibitors is presented together with their X-ray structure complexes with VAP-1. The crystal structure of serum VAP-1 (sVAP-1) revealed an imidazole binding site in the active site channel and, analogously, the pyridazinone inhibitors were designed to bind into the channel. This is the first time human VAP-1 has been crystallized with a reversible inhibitor and the structures reveal detailed information of the binding mode on the atomic level. Similarly to some earlier studied inhibitors of human VAP-1, the designed pyridazinone inhibitors bind rodent VAP-1 with a lower affinity than human VAP-1. Therefore, we made homology models of rodent VAP-1 and compared human and rodent enzymes to determine differences that might affect the inhibitor binding. The comparison of the crystal structures of the human VAP-1 and the mouse VAP-1 homology model revealed key differences important for the species specific binding properties. In general, the channel in mouse VAP-1 is more narrow and polar than the channel in human VAP-1, which is wider and more hydrophobic. The differences are located in the channel leading to the active site, as well as, in the entrance to the active site channel. The information obtained from these studies is of great importance for the development and design of drugs blocking the activity of human VAP-1, as rodents are often used for in vivo testing of candidate drugs. In order to gain more insight into the selective binding properties of the different CAOs in one species a comprehensive evolutionary study of mammalian CAOs was performed. We found that CAOs can be classified into sub-families according to the residues X1 and X2 of the Thr/Ser-X1-X2-Asn-Tyr-Asp active site motif. In the phylogenetic tree, CAOs group into diamine oxidase, retina specific amine oxidase and VAP-1/serum amine oxidase clades based on the residue in the position X2. We also found that VAP-1 and SAO can be further differentiated based on the residue in the position X1. This is the first large-scale comparison of CAO sequences, which explains some of the reasons for the unique substrate specificities within the CAO family.
Resumo:
The number of security violations is increasing and a security breach could have irreversible impacts to business. There are several ways to improve organization security, but some of them may be difficult to comprehend. This thesis demystifies threat modeling as part of secure system development. Threat modeling enables developers to reveal previously undetected security issues from computer systems. It offers a structured approach for organizations to find and address threats against vulnerabilities. When implemented correctly threat modeling will reduce the amount of defects and malicious attempts against the target environment. In this thesis Microsoft Security Development Lifecycle (SDL) is introduced as an effective methodology for reducing defects in the target system. SDL is traditionally meant to be used in software development, principles can be however partially adapted to IT-infrastructure development. Microsoft threat modeling methodology is an important part of SDL and it is utilized in this thesis to find threats from the Acme Corporation’s factory environment. Acme Corporation is used as a pseudonym for a company providing high-technology consumer electronics. Target for threat modeling is the IT-infrastructure of factory’s manufacturing execution system. Microsoft threat modeling methodology utilizes STRIDE –mnemonic and data flow diagrams to find threats. Threat modeling in this thesis returned results that were important for the organization. Acme Corporation now has more comprehensive understanding concerning IT-infrastructure of the manufacturing execution system. On top of vulnerability related results threat modeling provided coherent views of the target system. Subject matter experts from different areas can now agree upon functions and dependencies of the target system. Threat modeling was recognized as a useful activity for improving security.
Resumo:
Finnish Defence Studies is published under the auspices of the National Defence College, and the contributions reflect the fields of research and teaching of the College. Finnish Defence Studies will occasionally feature documentation on Finnish Security Policy. Views expressed are those of the authors and do not necessarily imply endorsement by the National Defence College.