A Comparative Study of Attacks Against Corporate IIS and Apache Web Servers
It has been suggested that an attacker will specifically target the Windows operating system. This research has shown that rather than this being the case an attacker will in fact not target Microsoft Windows, but rather seeks to avoid attacking Linux.
A critical review of De Callatay, 2005. The Graeco-Roman economy in the super long-run: lead, copper, and shipwrecks.
De Callatay (2005) provided an in-depth analysis of methodologies that can extend the analysis of shipwrecks of the Greco-Roman period. In this analysis, the author has provided the seeds of a system that could be expanded using new technologies into paths to conduct further analysis. The following paper provides an analysis of work by De Callatay, 2005.
A Distribution Protocol for Dealerless Secret Distribution
As the value of bitcoin increases, more incidents such as those involving Mt Gox and Bitfinex will occur in standard centralized systems. The addition of group based threshold cryptography with the ability to be deployed without a dealer and which supports the non-interactive signing of messages provides for the division of private keys into shares that can be distributed to individuals and groups to provide additional security.
A Preamble Into Aligning Systems Engineering and Information Security Risk Measures
For many years information security and risk management has been an art rather than a science. This has resulted in the reliance on experts whose methodologies and results can vary widely and which have led to the growth of fear, uncertainty and doubt within the community. At the same time, the failure to be able to effectively expend resources in securing systems has created a misalignment of controls and a waste of scare resources with alternative uses.
A Proof of Turing Completeness in Bitcoin Script
The concept of a Turing machine has been well defined. It would be sufficient to show that Bitcoin uses a dual stack architecture that acts as a dual counter machine. Such systems have already been demonstrated as being Turing complete.
A Quantitative Analysis into the Economics of Correcting Software Bugs
Using a quantitative study of in-house coding practices, we demonstrate the notion that programming needs to move from “Lines of Code per day” as a productivity measure to a measure that takes debugging and documentation into account. This could be something such as “Lines of clean, simple, correct, well-documented code per day”, but with bugs propagating into the 6th iteration of patches, a new paradigm needs to be developed
A Question of Platinum Plus
To act rationally requires that we forecast the future with inadequate information using the past as a guide for all its flaws. We make decisions in the absence of knowledge.
A Step-by-Step Introduction to Using the AUTOPSY Forensic Browser
This is a brief tutorial on how to use the Autopsy Forensic Browser as a front end for the Sleuthkit. This tool is an essential for Linux forensics investigations and can be used to analyze Windows images. We will start with the presumption that you have the Forensic Toolkit Installed (whether through the use of a Live CD such as Helix or if it is installed on a Forensic Workstation). Autopsy is built into the SANS Investigative Forensic Toolkit Workstation (SIFT Workstation) that you can download from forensics.sans.org.
A Taxonomy of Information Systems Audits, Assessments and Reviews
Common misconceptions plague information systems audit as to the nature of security,
audit and assessment types and definitions. The dissertation aims at being a definitive
guide to define the terminology and detail the related methodologies across the range of
information assurance services.
Agent-Based Turing-Complete Transactions Integrating Feedback Within a Blockchain System
The proposed system relates generally to blockchain implementations, and is suited for, but not limited to, use with the Bitcoin blockchain. It can be used for the implementation of automated processes such as device/system control, process control, distributed computing, storage, and others. The system provides a solution which uses a blockchain to control a process executing on a computing resource. In a preferred implementation, the computing resource, running simultaneously and in parallel to the blockchain, manages a loop-based operation. The computing resource continuously monitors the state of the blockchain and any other off-blockchain input data or source.