scholarly journals Vulnerability and risk assessment for operating system (OS) with framework STRIDE: comparison between VulnOS and Vulnix

Author(s):  
Adityas Widjajarto ◽  
Muharman Lubis ◽  
Vreseliana Ayuningtyas

<p><span lang="EN-US">The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the </span><span lang="EN-US">national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing.</span></p>

2021 ◽  
Vol 4 ◽  
pp. 98-100
Author(s):  
Semen Gorokhovskyi ◽  
Yelyzaveta Pyrohova

With the rapid development of applications for mobile platforms, developers from around the world already understand the need to impress with new technologies and the creation of such applications, with which the consumer will plunge into the world of virtual or augmented reality. Some of the world’s most popular mobile operating systems, Android and iOS, already have some well-known tools to make it easier to work with the machine learning industry and augmented reality technology. However, it cannot be said that their use has already reached its peak, as these technologies are at the stage of active study and development. Every year the demand for mobile application developers increases, and therefore more questions arise as to how and from which side it is better to approach immersion in augmented reality and machine learning. From a tourist point of view, there are already many applications that, with the help of these technologies, will provide more information simply by pointing the camera at a specific object.Augmented Reality (AR) is a technology that allows you to see the real environment right in front of us with a digital complement superimposed on it. Thanks to Ivan Sutherland’s first display, created in 1968 under the name «Sword of Damocles», paved the way for the development of AR, which is still used today.Augmented reality can be divided into two forms: based on location and based on vision. Location-based reality provides a digital picture to the user when moving through a physical area thanks to a GPS-enabled device. With a story or information, you can learn more details about a particular location. If you use AR based on vision, certain user actions will only be performed when the camera is aimed at the target object.Thanks to advances in technology that are happening every day, easy access to smart devices can be seen as the main engine of AR technology. As the smartphone market continues to grow, consumers have the opportunity to use their devices to interact with all types of digital information. The experience of using a smartphone to combine the real and digital world is becoming more common. The success of AR applications in the last decade has been due to the proliferation and use of smartphones that have the capabilities needed to work with the application itself. If companies want to remain competitive in their field, it is advisable to consider work that will be related to AR.However, analyzing the market, one can see that there are no such applications for future entrants to higher education institutions. This means that anyone can bring a camera to the university building and learn important information. The UniApp application based on the existing Swift and Watson Studio technologies was developed to simplify obtaining information on higher education institutions.


Abdimisi ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 128
Author(s):  
Adam Sugiarto ◽  
Rahmatullah Rusli ◽  
Mudzakir Mudzakir ◽  
Fathudin Ali ◽  
Nurjaya Nurjaya

Various social problems that arise in social life, especially among adolescents who are influenced by the rapid development of technology from time to time, the world of adolescents is an easy target of the bad influence of this technology because they can easily get everything from their gadgets, starting from the open. the breadth of the world of friendship to easy access to negative content such as pornography, radicalism, which can then drag teenagers to promiscuity, drugs, brawl and so on. The lack of knowledge of orangutans in understanding and overcoming these problems makes them unable to direct their children to avoid various negative influences of association and technology. On the basis of the desire to share and provide solutions to this, this PKM is carried out with the aim of increasing understanding and knowledge of parents in overcoming and fortifying their children from the negative influence of socialization and technology by strengthening tauhid education in the family.Keywords: Teaching; Tawheed; Youth; Family<p


2020 ◽  
Vol 99 (6) ◽  
pp. 32-51
Author(s):  
L.S. Namazova-Baranova ◽  
◽  
A.A. Baranov ◽  
◽  

A year ago, the world heard about an outbreak of a new severe coronavirus infection in China, which later, after its rapid spread across the globe, WHO defined as a pandemic. Pediatricians, of course, expected the worst-case scenario and mass illness of the most vulnerable patients – children and people of older age groups with a new infectious disease. From the immunological point of view, everything is obvious – the new pathogen is most dangerous for those who have not yet formed a defense against it, or for those with weakened defense. But it quickly became clear that, unlike, for example, a flu pandemic, there is an unexpected situation when adults, including elderly and senile patients, become seriously ill and die, and children remain practically outside the spread of the infectious process. During a year of living «in a new reality», not only physicians, but all of humanity learned to respond to a new infectious challenge, empirically looking for possible therapeutic or diagnostic interventions and at the same time trying to plan and implement scientific research that would help shed light on the questions posed. For the first time, the international medical community united to perform serious clinical trials of drugs that were proposed for the treatment or prevention of COVID-19. As a result of actions of scientists and clinicians around the world, answers to some questions were obtained, however, most of the information on the impact of the new coronavirus on the human body, including children, is still unavailable to medical practitioners. The review presents latest data on the causative agent of the new coronavirus infection, its effect on the body of children and adults, describes peculiarities of immune response to the new virus, and outlines basic principles of managing such patients in real clinical practice.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Justin K Haner ◽  
Robert K Knake

Abstract Malicious networks of botnets continue to grow in strength as millions of new users and devices connect to the internet each day, many becoming unsuspectingly complicit in cyber-attacks or unwitting accomplices to cybercrimes. Both states and nonstate actors use botnets to surreptitiously control the combined computing power of infected devices to engage in espionage, hacking, and to carry out distributed denial of service attacks to disable internet-connected targets from businesses and banks to power grids and electronic voting systems. Although cybersecurity professionals have established a variety of best practices to fight botnets, many important questions remain concerning why levels of botnet infections differ sharply from country to country, as relatively little empirical testing has been done to establish which policies and approaches to cybersecurity are actually the most effective. Using newly available time-series data on botnets, this article outlines and tests the conventionally held beliefs and cybersecurity strategies at every level—individual, technical, isolationist, and multilateral. This study finds that wealthier countries are more vulnerable than less wealthy countries; that technical solutions, including patching software, preventing spoofing, and securing servers, consistently outperform attempts to educate citizens about cybersecurity; and that countries which favor digital isolation and restrictions on internet freedom are not actually better protected than those who embrace digital freedom and multilateral approaches to cybersecurity. This latter finding is of particular importance as China’s attempts to fundamentally reshape the internet via the “Digital Silk Road” component of the Belt and Road Initiative will actually end up making both China and the world less secure. Due to the interconnected nature of threats in cyberspace, states should instead embrace multilateral, technical solutions to better govern this global common and increase cybersecurity around the world.


Author(s):  
Lewis Holt

Seemingly overnight, on the 12th of March 2020, healthcare systems the world over changed as the World Health Organisation deemed COVID-19 a worldwide pandemic. I was moved directly into the fourth year of my medical studies without examination, and applied to work in one of the few field hospitals set up across the United Kingdom, designed to handle to worst case scenario of COVID-19. Here I tended to the most basic needs of patients as a care support worker and witness first hand the relentlessness of this awful disease.  Being able to help and work in a role I was not familiar with has given me great insight into the needs of patient’s whether they are going home or in their final days of life.  As the pandemic cools down and the incidence curve flattens, we have all been put on standby, hopefully not to be required again.


Author(s):  
Nicolo Giuseppe Biavardi

Many students around the world have been wondering how their life will change since the very first outbreak of Covid-19. In my experience article I have tried to give a flavor of how has the academic world changed in quarantine. Difficulties and opportunities have been analyzed. Questions regarding the validity of e-learning have been posed. In an arduous period as the one we are experiencing, having an idea of what life could be in worst case scenario could be helpful.


2021 ◽  
Author(s):  
Héctor Beade-Pereda

<p>The design of footbridges, paradigmatic cases of human transformation of the environment, should go beyond their main function as pieces of infrastructure, always aspiring to improve the quality of the built world. How a design relates to its specific context and its evolution through time is crucial to that respect. A positive response to the context in the design can lead to footbridges that are, for example, fitting additions to valuable environments, or catalysers for the transformation of declining areas. A less successful response, on the contrary, may just lead to crossings without further contribution to the site or, in the unfortunately not unusual worst-case scenario, to elements in conflict with the built environment from various points of view.</p><p>The article describes different strategies to successfully respond to the particularities of different contexts in footbridge design, using examples of the author’s experience ranging from first designed pieces of ambitious urban transformation projects, to a footbridge in a natural environment nearby a historic crossing, or a movable footbridge in one of the main financial districts in the world.</p>


Author(s):  
Shigeki Kaji

The aim of this chapter is to lay a foundation so as to  consider the issue of language endangerment in the world. Approximately 30 years ago, various scholars stated that in the worst-case scenario, 90%–95% of the present living languages of the world would become defunct by the end of the 21st century. The assumption of this argument was that minority languages may become defunct easily. However, in this chapter, this thesis is questioned by taking into account the language situations in Africa where most languages, whether small or large, are vigorously spoken. In African countries, people do not impose majority languages on other people. More importantly, African people in general esteem others because they understand their value to them.


Author(s):  
Kheyri Umudova, Leyla Yusifova, Konul Azizova

One of the main problems facing organizations that exist today is adapting to the conditions of market economy and to protect the position it has reached in the market. Recently, as the main result of the rapid development of science and technology the world economy put the high quality of produced products and offered services to enterprises as the main requirement. Therefore, entrepreneurs prefer the use of International Standards that have been tested successfully by many enterprises in many developed countries around the world. Compliance with these requirements will give the company the advantages of increasing image, profits, reducing production costs and losses, as well as access to the international market. High quality of the product, its competitiveness and very easy access to foreign markets are achieved by implementing the requirements of International standards such as ISO 9001, GOST P ISO 9001, EQS, GMP, HACCP, QS 9000, OHSAS 18001 etc.


AI ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 68-91 ◽  
Author(s):  
Meng-Leong How ◽  
Yong Jiet Chan

According to the World Health Organization (WHO) and the World Bank, malnutrition is one of the most serious but least-addressed development challenges in the world. Malnutrition refers to the malfunction or imbalance of nutrition, which could be influenced not only by under-nourishment, but also by over-nourishment. The significance of this paper is that it shows how artificial intelligence (AI) can be democratized to enable analysts who are not trained in computer science to also use human-centric explainable-AI to simulate the possible dynamics between malnutrition, health and population indicators in a dataset collected from 180 countries by the World Bank. This AI-based human-centric probabilistic reasoning approach can also be used as a cognitive scaffold to educe (draw out) AI-Thinking in analysts to ask further questions and gain deeper insights. In this study, a rudimentary beginner-friendly AI-based Bayesian predictive modeling approach was used to demonstrate how human-centric probabilistic reasoning could be utilized to analyze the dynamics of global malnutrition and optimize conditions for achieving the best-case scenario. Conditions of the worst-case “Black Swan” scenario were also simulated, and they could be used to inform stakeholders to prevent them from happening. Thus, the nutritional and health status of vulnerable populations could be ameliorated.


Sign in / Sign up

Export Citation Format

Share Document