Cyber-Security Intelligence Gathering

Author(s):  
Ezer Osei Yeboah-Boateng ◽  
Elvis Akwa-Bonsu

Recently, KM has found applications in cyber-security. Though the actionable information gathered is intangible, they are used to improve knowledge sharing in organizations. Key cyber-security objectives are to prevent, detect and respond to threats. Using open-sharing of vulnerabilities and exploits, cyber risks could be mitigated through info-sharing. Cyber-intelligence is perceived as a process and a product, with outcomes being alerts that solicit explicit responses, leading to mitigation of possible threats. Using the Scrum approach, relevant articles and databases were reviewed, towards improving mitigation strategies. A virtual machine experiment utilized various tools to gather intelligence. Results from footprinting were used to design a KM-based Cyber-Intelligence Gathering model that incorporates Lewin's Change Theory. It is intuitive and serves as an effective mitigation strategy for most organizations, especially SMEs. The implication is that knowledge sharing could be harnessed to create a pool of mitigation resources for most enterprises in developing economies.

2018 ◽  
pp. 1454-1478
Author(s):  
Ezer Osei Yeboah-Boateng ◽  
Elvis Akwa-Bonsu

Recently, KM has found applications in cyber-security. Though the actionable information gathered is intangible, they are used to improve knowledge sharing in organizations. Key cyber-security objectives are to prevent, detect and respond to threats. Using open-sharing of vulnerabilities and exploits, cyber risks could be mitigated through info-sharing. Cyber-intelligence is perceived as a process and a product, with outcomes being alerts that solicit explicit responses, leading to mitigation of possible threats. Using the Scrum approach, relevant articles and databases were reviewed, towards improving mitigation strategies. A virtual machine experiment utilized various tools to gather intelligence. Results from footprinting were used to design a KM-based Cyber-Intelligence Gathering model that incorporates Lewin's Change Theory. It is intuitive and serves as an effective mitigation strategy for most organizations, especially SMEs. The implication is that knowledge sharing could be harnessed to create a pool of mitigation resources for most enterprises in developing economies.


Author(s):  
Veronica Malizia ◽  
Federica Giardina ◽  
Carolin Vegvari ◽  
Sumali Bajaj ◽  
Kevin McRae-McKee ◽  
...  

Abstract Background On 1 April 2020, the WHO recommended an interruption of all activities for the control of neglected tropical diseases, including soil-transmitted helminths (STH), in response to the COVID-19 pandemic. This paper investigates the impact of this disruption on the progress towards the WHO 2030 target for STH. Methods We used two stochastic individual-based models to simulate the impact of missing one or more preventive chemotherapy (PC) rounds in different endemicity settings. We also investigated the extent to which this impact can be lessened by mitigation strategies, such as semiannual or community-wide PC. Results Both models show that without a mitigation strategy, control programmes will catch up by 2030, assuming that coverage is maintained. The catch-up time can be up to 4.5 y after the start of the interruption. Mitigation strategies may reduce this time by up to 2 y and increase the probability of achieving the 2030 target. Conclusions Although a PC interruption will only temporarily impact the progress towards the WHO 2030 target, programmes are encouraged to restart as soon as possible to minimise the impact on morbidity. The implementation of suitable mitigation strategies can turn the interruption into an opportunity to accelerate progress towards reaching the target.


2012 ◽  
Vol 37 (4) ◽  
pp. 19-28
Author(s):  
Rob Marsh

Climate change means that buildings must greatly reduce their energy consumption. It is however paradoxical that climate mitigation in Denmark has created negative energy and indoor climate problems in housing that may be made worse by climate change. A literature review has been carried out of housing schemes where climate mitigation was sought through reduced space heating demand, and it is shown that extensive problems with overheating exist. A theoretical study of regulative and design strategies for climate mitigation in new build housing has therefore been carried out, and it is shown that reducing space heating with high levels of thermal insulation and passive solar energy results in overheating and a growing demand for cooling. Climate change is expected to reduce space heating and increase cooling demand in housing. An analysis of new build housing using passive solar energy as a climate mitigation strategy has therefore been carried out in relation to future climate change scenarios. It is shown that severe indoor comfort problems can occur, questioning the relevance of passive solar energy as a climate mitigation strategy. In conclusion, a theoretical study of the interplay between climate adaptation and mitigation strategies is carried out, with a cross-disciplinary focus on users, passive design and active technologies. It is shown that the cumulative use of these strategies can create an adaptation buffer, thus eliminating problems with overheating and reducing energy consumption. New build housing should therefore be designed in relation to both current and future climate scenarios to show that the climate mitigation strategies ensure climate adaptation.


2014 ◽  
Vol 8 (2) ◽  
pp. 146-167 ◽  
Author(s):  
Manya Jaura ◽  
Snejina Michailova

Purpose – The purpose of this paper is to examine the influence of cognition on knowledge sharing between members of the acquiring and acquired organisations in the post-acquisition integration process. It specifically analyses differentiation between in-groups and out-groups, the perception of organisational identity and interaction among members of the acquired and acquiring organisations and how these three factors affect knowledge sharing. Design/methodology/approach – The authors develop theoretical propositions and conduct an explorative pilot study on the basis of original interview data conducted with ten respondents in four Indian IT companies that have acquired firms abroad. Findings – The authors find evidence for supporting the negative effect of in- and out-groups differentiation and the positive effect of interpersonal interaction on knowledge sharing among employees of the acquired and acquiring organisations. There was indicative, but less compelling, evidence for the negative influence of inter-group competition and the positive influence of perceived shared organisational identity on knowledge sharing. Different from the established view, the authors find that when Indian firms acquire firms abroad, they immediately initiate knowledge flows from the targets rather than going through a long period of integration prior to acquiring knowledge from the targets. Research limitations/implications – The paper contributes to the scholarly conversation on cognition and knowledge sharing and argues that firms that are located in developing economies and that acquire firms abroad behave in a way somewhat different from what Western literature postulates. This invites for further studies, both theoretical and empirical, to shed light on this phenomenon. The present paper is focused only on one country, India, and on a single industry, the IT industry. It is limited in its empirical part, mainly due to enormous difficulties in getting access to the field. Practical implications – The study demonstrates how central individuals are to the process of knowledge sharing and the accomplishment of organisational objectives in a post-acquisition context. Managers should understand that the knowledge their employees possess is a strategic asset, and therefore how they use it is influential in attaining organisational goals in general, and acquisition integration objectives in particular. The creation of task- and project-related communities or groups can help in establishing a shared organisational identity, especially after the turbulent event of one company acquiring another one. The creation of communities or groups where socialisation is encouraged can lead to employees interacting with one another and developing a sense of belongingness with the community or group. Over time, this belongingness can translate into a shared organisational identity, which is beneficial for the organisation. The findings suggest that the creation of task- or project-oriented communities and groups is a powerful way to achieve that. Originality/value – The contribution of the paper is fourfold. First, while macro orientation dominates literature on the growth of the Indian IT industry, this study is conducted at the individual level of analysis, by focusing on managers in acquiring Indian IT firms. Second, whereas studies that have examined cognition and knowledge sharing have done so mainly through social capital lenses, this paper focuses on factors that are based on the inherent tendency of human beings to categorise themselves and other individuals. Third, the paper examines the links between cognition and knowledge sharing in an exciting context, namely, post-acquisition integration. Finally, while research on both post-acquisition integration and knowledge sharing is biased towards a Western context, this study investigates knowledge sharing and post-acquisition integration in the context of a major non-Western emerging economy.


2021 ◽  
Vol 6 (1) ◽  
pp. 72-82
Author(s):  
Faiz Iman Djufri ◽  
Charles Lim

Cyber Security is an interchange between attackers and defenders, a non-static balancing force. The increasing trend of novel security threats and security incidents, which does not seem to be stopping, prompts the need to add another line of security defences. This is because the risk management and risk detection has become virtually impossible due to the limited access towards user data and the variations of modern threat taxonomies. The traditional strategy of self-discovery and signature detection which has a static nature is now obsolete in facing threats of the new generation with a dynamic nature; threats which are resilient, complex, and evasive. Therefore, this thesis discusses the use of MISP and The Triad Investigation approach to share the Indicator of Compromise on Cyber Intelligence Sharing Platform to be able to address the newt threats.


2021 ◽  
Author(s):  
Mark Grutters ◽  
Sameer Punnapala ◽  
Dalia Salem Abdallah ◽  
Zaharia Cristea ◽  
Hossam El Din Mohamed El Nagger ◽  
...  

Abstract Asphaltene deposition is a serious and re-occurring flow assurance problem in several of the ADNOC onshore oilfields. Fluids are intrinsically unstable with respect to asphaltene precipitation, and operating conditions are such that severe deposition occurs in the wellbore. Wells in ADNOC are generally not equipped with downhole chemical injection lines for continuous inhibition, and protection of the wells require frequent shut-in and intervention by wireline and coiled tubing to inspect and clean up. Since some of the mature fields are under EOR recovery strategies, like miscible hydrocarbon WAG and CO2 flood, which exacerbates the asphaltene precipitation and deposition problems, a more robust mitigation strategy is required. In this paper the results of two different mitigation strategies will be discussed; continuous injection of asphaltene inhibitor via a capillary line in the tubular and asphaltene inhibitor formation squeeze. Three asphaltene inhibitors from different suppliers were pre-qualified and selected for field trial. Each inhibitor was selected for a formation squeeze in both one horizontal and one vertical well, and one of the inhibitors was applied via thru-tubing capillary string. The field trials showed that continuous injection in remote wells with no real-time surveillance options (e.g. gauges, flow meters) is technically challenging. The continuous injection trial via the capillary string was stopped due to technical challenges. From the six formation squeezes four were confirmed to be effective. Three out of fours squeezes significantly extended the production cycle, from approximately 1.4 to 6 times the normal uninhibited flow period. The most successful squeezes were in the vertical wells. The results of the trial were used to model the economic benefit of formation squeeze, compared to a ‘do-nothing’ approach where the wells are subject to shut-in and cleanup once the production rates drop below a threshold value. The model clearly indicates that the squeezes applied in ADNOC Onshore are only cost-effective if it extends the normal flow period by approximately three times. However, a net gain can be achieved already if the formation squeeze extends the flow cycle by 15 to 20%, due to reduction of shut-in days required for intervention. Therefore, the results in this paper illustrate that an asphaltene inhibitor formation squeeze can be an attractive mitigation strategy, both technically and economically.


Author(s):  
Jeffrey Kurebwa ◽  
Kundai Lillian Matenga

This chapter is based on a study that sought to understand the threats of cyber warfare in Zimbabwe. The effects of cyber warfare, cyber intelligence mechanisms in place, and the status of the harmonization of laws and collaboration of SADC countries in efforts to address cyber threats were also covered. Qualitative research methodology was used to conduct the study. A total of 15 key respondents drawn from information technology experts, academia, top military personnel, and lawyers participated in the study. The study revealed that Zimbabwe was vulnerable to cyber warfare due to increased use of technology and failure to keep up with technological advancements. The study noted that the current legislation does not explicitly address cyber warfare threats but focuses more on cybercrime. The study recommended that Zimbabwe enact effective legislation to curtail cyber warfare in order to enhance cyber security. Investment in cyber security in terms of research and human capital development should also be prioritized.


2016 ◽  
Author(s):  
Kerstin Engström ◽  
Mats Lindeskog ◽  
Stefan Olin ◽  
John Hassler ◽  
Benjamin Smith

Abstract. Reducing greenhouse gas emissions to limit climate change-induced damage to the global economy and secure the livelihoods of future generations requires ambitious mitigation strategies. The introduction of a global carbon tax on fossil fuels is tested here as a mitigation strategy to reduce atmospheric CO2 concentrations and radiative forcing. Taxation of fossil fuels potentially leads to changed composition of energy sources, including a larger relative contribution from bioenergy. Further, the introduction of a mitigation strategy reduces climate change-induced damage to the global economy, and thus can indirectly affect consumption patterns and investments in agricultural technologies and yield enhancement. Here we assess the implications of changes in bioenergy demand as well as the indirectly caused changes in consumption and crop yields for global and national cropland area and terrestrial biosphere carbon balance. We apply a novel integrated assessment modelling framework, combining a climate-economy model, a socio-economic land-use model and an ecosystem model. We develop reference and mitigation scenarios based on the Shared Socio-economic Pathways (SSPs) framework. Taking emissions from the land-use sector into account, we find that the introduction of a global carbon tax on the fossil fuel sector is an effective mitigation strategy only for scenarios with low population development and strong sustainability criteria (SSP1 "Taking the green road"). For scenarios with high population growth, low technological development and bioenergy production the high demand for cropland causes the terrestrial biosphere to switch from being a carbon sink to a source by the end of the 21st century.


Author(s):  
Timothy P. Hanratty ◽  
E. Allison Newcomb ◽  
Robert J. Hammell II ◽  
John T. Richardson ◽  
Mark R. Mittrick

Data for military intelligence operations are increasing at astronomical rates. As a result, significant cognitive and temporal resources are required to determine which information is relevant to a particular situation. Soft computing techniques, such as fuzzy logic, have recently been applied toward decision support systems to support military intelligence analysts in selecting relevant and reliable data within the military decision making process. This article examines the development of one such system and its evaluation using a constructive simulation and human performance model to provided critical understanding of how this conceptual information system might interact with personnel, organizational, and system architectures. In addition, similarities between military intelligence analysts and cyber intelligence analysts are detailed along with a plan for transitioning the current fuzzy-based system to the cyber security domain.


Sign in / Sign up

Export Citation Format

Share Document