'Come back when you are 65, Sir': discrimination in respect of access to social assistance for the elderly
- Authors: Krüger, Rósaan
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71119 , vital:29786 , http://www.ldd.org.za/images/stories/Ready_for_publication/V10-2_Come_back_65.pdf
- Description: Messrs Roberts, Whitebooi, Casling and Visagie are four elderly gentlemen who live in poverty in Gelvandale, Port Elizabeth. At the end of 2005 they wished to apply for social assistance from the State. At the time of their applications, the men were over the age of 60, but none of them had attained the age of 65. Had they been female, they would have qualified for social assistance in the form of old age pensions at the age of 60. 'These pensions would not have made them rich, but would have enabled them to sustain themselves.
- Full Text:
- Date Issued: 2009
- Authors: Krüger, Rósaan
- Date: 2009
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/71119 , vital:29786 , http://www.ldd.org.za/images/stories/Ready_for_publication/V10-2_Come_back_65.pdf
- Description: Messrs Roberts, Whitebooi, Casling and Visagie are four elderly gentlemen who live in poverty in Gelvandale, Port Elizabeth. At the end of 2005 they wished to apply for social assistance from the State. At the time of their applications, the men were over the age of 60, but none of them had attained the age of 65. Had they been female, they would have qualified for social assistance in the form of old age pensions at the age of 60. 'These pensions would not have made them rich, but would have enabled them to sustain themselves.
- Full Text:
- Date Issued: 2009
Written medicines information for South African HIV/AIDS patients: does it enhance understanding of co-trimoxazole therapy?
- Mansoor, Leila E, Dowse, Roslind
- Authors: Mansoor, Leila E , Dowse, Roslind
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156860 , vital:40059 , https://0-doi.org.wam.seals.ac.za/10.1093/her/cyl039
- Description: Written information to promote patient education is being increasingly recognized as an integral part of quality health care. The main objective of this study was to evaluate the effect of distributing a patient information leaflet (PIL) on knowledge acquisition and recall. Two different PILs were designed for co-trimoxazole tablets: a simple, shorter PIL that incorporated pictograms and text and a text-only PIL that was longer and more complex. Human immunodeficiency virus-positive participants on chronic co-trimoxazole therapy were enrolled from five local primary health care clinics in Grahamstown, South Africa, and were randomly allocated to a Control Group (no PIL), Group A (text-only PIL) or Group B (simple PIL with pictograms).
- Full Text:
- Date Issued: 2007
- Authors: Mansoor, Leila E , Dowse, Roslind
- Date: 2007
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/156860 , vital:40059 , https://0-doi.org.wam.seals.ac.za/10.1093/her/cyl039
- Description: Written information to promote patient education is being increasingly recognized as an integral part of quality health care. The main objective of this study was to evaluate the effect of distributing a patient information leaflet (PIL) on knowledge acquisition and recall. Two different PILs were designed for co-trimoxazole tablets: a simple, shorter PIL that incorporated pictograms and text and a text-only PIL that was longer and more complex. Human immunodeficiency virus-positive participants on chronic co-trimoxazole therapy were enrolled from five local primary health care clinics in Grahamstown, South Africa, and were randomly allocated to a Control Group (no PIL), Group A (text-only PIL) or Group B (simple PIL with pictograms).
- Full Text:
- Date Issued: 2007
Development and validation of a stability-indicating analytical method for the quantitation of oxytocin in pharmaceutical dosage forms
- Chaibva, Faith A, Walker, Roderick B
- Authors: Chaibva, Faith A , Walker, Roderick B
- Date: 2006
- Language: English
- Type: Article
- Identifier: vital:6349 , http://hdl.handle.net/10962/d1006030
- Description: A single stability-indicating assay for oxytocin (OT) in pharmaceutical dosage forms using gradient elution over 21 min has been reported in the literature. Furthermore, published and compendial methods for the analysis of OT containing dosage forms also involve using HPLC with gradient elution and complicated mobile phases that include hydrophobic ion pairing agents. A simple isocratic and stability-indicating assay was developed and validated. The conditions are as follows, column: Phenomenex® C18 Hypersil, 5 μm packing, 4.6 mm × 150 mm with acetonitrile–phosphate buffer (pH 5; 0.08 M) (20:80) as the mobile phase with UV detection at 220 nm The method was found to be specific for OT in the presence of degradation products and chlorbutol (preservative) with an overall analytical run time of 16 min. Accuracy was determined to be 0.77–1.18% bias for all samples tested. Intra-assay precision (repeatability) was found to be 0.22–1.04%R.S.D. while the inter-day precision (intermediate precision) was found to be 1.27–1.68%R.S.D. for the samples studied. The calibration curve was found to be linear with the equation y = 1.81x + 0.02 and a linear regression coefficient of 0.9991 over the range 0.4–12.0 IU/ml. The LOD and the LOQ were determined to be 0.1 and 0.4 IU/ml, respectively. Syntocinon®, a commercially available dosage form of OT was assayed resulting in 100.5–106.6% recovery of the label claim and an average of 10.04 IU/ml.
- Full Text:
- Date Issued: 2006
- Authors: Chaibva, Faith A , Walker, Roderick B
- Date: 2006
- Language: English
- Type: Article
- Identifier: vital:6349 , http://hdl.handle.net/10962/d1006030
- Description: A single stability-indicating assay for oxytocin (OT) in pharmaceutical dosage forms using gradient elution over 21 min has been reported in the literature. Furthermore, published and compendial methods for the analysis of OT containing dosage forms also involve using HPLC with gradient elution and complicated mobile phases that include hydrophobic ion pairing agents. A simple isocratic and stability-indicating assay was developed and validated. The conditions are as follows, column: Phenomenex® C18 Hypersil, 5 μm packing, 4.6 mm × 150 mm with acetonitrile–phosphate buffer (pH 5; 0.08 M) (20:80) as the mobile phase with UV detection at 220 nm The method was found to be specific for OT in the presence of degradation products and chlorbutol (preservative) with an overall analytical run time of 16 min. Accuracy was determined to be 0.77–1.18% bias for all samples tested. Intra-assay precision (repeatability) was found to be 0.22–1.04%R.S.D. while the inter-day precision (intermediate precision) was found to be 1.27–1.68%R.S.D. for the samples studied. The calibration curve was found to be linear with the equation y = 1.81x + 0.02 and a linear regression coefficient of 0.9991 over the range 0.4–12.0 IU/ml. The LOD and the LOQ were determined to be 0.1 and 0.4 IU/ml, respectively. Syntocinon®, a commercially available dosage form of OT was assayed resulting in 100.5–106.6% recovery of the label claim and an average of 10.04 IU/ml.
- Full Text:
- Date Issued: 2006
Identifying and Investigating Intrusive Scanning Patterns by Visualizing Network Telescope Traffic in a 3-D Scatter-plot
- van Riel, Jean-Pierre, Irwin, Barry V W
- Authors: van Riel, Jean-Pierre , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428719 , vital:72531 , https://citeseerx.ist.psu.edu/document?repid=rep1type=pdfanddoi=aeb0738f0e53a8c9f407fee7e55c852643f2644c
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this meth-od. The method entails a combination of network telescope traffic cap-ture and visualisation. Observing traffic from the perspective of a dedi-cated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Compliment-ing this, visual analysis facilitates the rapid review and correlation of events, thereby utilizing human intelligence in the identification of scan-ning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tailor made 3D scatter-plot visualisation. As the results show, the visualisation saliently conveys anomalous patterns, and further analysis reveals that these patterns are indicative of covert network probing activity. By incorporat-ing visual analysis with traditional approaches, such as textual log re-view and the use of an intrusion detection system, this research contrib-utes improved insight into network scanning incidents.
- Full Text:
- Date Issued: 2006
- Authors: van Riel, Jean-Pierre , Irwin, Barry V W
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428719 , vital:72531 , https://citeseerx.ist.psu.edu/document?repid=rep1type=pdfanddoi=aeb0738f0e53a8c9f407fee7e55c852643f2644c
- Description: Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legiti-mate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodology for network monitoring and traffic review; and second, it discusses results from applying this meth-od. The method entails a combination of network telescope traffic cap-ture and visualisation. Observing traffic from the perspective of a dedi-cated sensor network reduces the volume of data and alleviates the concern of confusing malicious traffic with legitimate traffic. Compliment-ing this, visual analysis facilitates the rapid review and correlation of events, thereby utilizing human intelligence in the identification of scan-ning patterns. To demonstrate the proposed method, several months of network telescope traffic is captured and analysed with a tailor made 3D scatter-plot visualisation. As the results show, the visualisation saliently conveys anomalous patterns, and further analysis reveals that these patterns are indicative of covert network probing activity. By incorporat-ing visual analysis with traditional approaches, such as textual log re-view and the use of an intrusion detection system, this research contrib-utes improved insight into network scanning incidents.
- Full Text:
- Date Issued: 2006
Improving the bioremediation of phenolic wastewaters by Trametes versicolor
- Ryan, D, Leukes, W, Burton, Stephanie G
- Authors: Ryan, D , Leukes, W , Burton, Stephanie G
- Date: 2006
- Language: English
- Type: Article
- Identifier: vital:6467 , http://hdl.handle.net/10962/d1005796 , http://dx.doi.org/10.1016/j.biortech.2006.02.001
- Description: The successful bioremediation of a phenolic wastewater by Trametes versicolor was found to be dependent on a range of factors including: fungal growth, culture age and activity and enzyme (laccase) production. These aspects were enhanced by the optimisation of the growth medium used and time of addition of the pollutant to the fungal cultures. Different media containing ‘high’ (20 g/L), ‘low’ (2 g/L) and ‘sufficient’ (10 g/L) concentrations of carbon and nitrogen sources were investigated. The medium containing both glucose and peptone at 10 g/L resulted in the highest Growth Related Productivity (the product of specific yield and μ) of laccase (1.46 Units of laccase activity)/gram biomass/day and was used in all further experiments. The use of the guaiacol as an inducer further increased laccase activity 780% without inhibiting growth; similarly the phenolic effluent studied boosted activity almost 5 times. The timing of the addition of the phenolic effluent was found to have important consequences in its removal and at least 8 days of prior growth was required. Under these conditions, 0.125 g phenol/g biomass and 0.231 g o-cresol/g biomass were removed from solution per day.
- Full Text:
- Date Issued: 2006
- Authors: Ryan, D , Leukes, W , Burton, Stephanie G
- Date: 2006
- Language: English
- Type: Article
- Identifier: vital:6467 , http://hdl.handle.net/10962/d1005796 , http://dx.doi.org/10.1016/j.biortech.2006.02.001
- Description: The successful bioremediation of a phenolic wastewater by Trametes versicolor was found to be dependent on a range of factors including: fungal growth, culture age and activity and enzyme (laccase) production. These aspects were enhanced by the optimisation of the growth medium used and time of addition of the pollutant to the fungal cultures. Different media containing ‘high’ (20 g/L), ‘low’ (2 g/L) and ‘sufficient’ (10 g/L) concentrations of carbon and nitrogen sources were investigated. The medium containing both glucose and peptone at 10 g/L resulted in the highest Growth Related Productivity (the product of specific yield and μ) of laccase (1.46 Units of laccase activity)/gram biomass/day and was used in all further experiments. The use of the guaiacol as an inducer further increased laccase activity 780% without inhibiting growth; similarly the phenolic effluent studied boosted activity almost 5 times. The timing of the addition of the phenolic effluent was found to have important consequences in its removal and at least 8 days of prior growth was required. Under these conditions, 0.125 g phenol/g biomass and 0.231 g o-cresol/g biomass were removed from solution per day.
- Full Text:
- Date Issued: 2006
Integrating Secure RTP into the Open Source VoIP PBX Asterisk
- Clayton, Bradley, Irwin, Barry V W, Terzoli, Alfredo
- Authors: Clayton, Bradley , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428735 , vital:72532 , https://d1wqtxts1xzle7.cloudfront.net/84872934/66_Paper-libre.pdf?1650920302=response-content-disposi-tion=inline%3B+filename%3DIntegrating_Secure_RTP_into_the_Open_Sou.pdfExpires=1714744382Signature=PijjCGW0qcvkqRe-2R55HocKLvz9Ljw8jmhQvRQEi9YqJl7eWSiYnvs9CogY4u4bmDTYTLpvkA-nlfbiszg-s7Cq2nbLn3PUdfJ5cA11ujboi~i7oSoem7smuN1YCVZlg7FnZRd6mOXdTry9UAh8TlWyndF6pY1RXtc7bgb5cWeK4ggJ7~bM0HUXEbUKKa-abCZnGNrAZ59JIdL6CNx1Sht3o5mZTcyRL3PNVSOz17lldXi4FsAOEUwsVV-uv04hzp6pe6Qv5WbAP6tqk7deyoLUwk58A9F-PaJlOLy2gDAVLnbKT8RrxYg8tqv8SuBhPWb32CefBxv486N3F6izZw__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need to transport data in real-time, often at the expense of security. The neglect of secure VoIP is often intentional, as developers are striving to minimise overheads and delays. The Secure Real-Time Protocol (SRTP) has the potential to secure real-time streams without exacting too high a performance price. SRTP is the addition of security to the audio/video profile used in the Real-Time Transport Protocol (RTP). SRTP adds confidentiality, integrity and op-tionaly authenticity to RTP media streams. This paper focuses on the integration of SRTP into Asterisk, an open-source VoIP PBX. SRTP support has recently been added to Asterisk by Mikael Magnusson. This paper analyses Magnusson’s implementation, contrasting it to a proof-of-concept implementation developed independently at Rhodes University. The interoperability of SRTP implementations cannot be taken for granted, given the relatively recent standardization of the pro-tocol, and so Magnusson’s implementation is tested against another SRTP implementation. Finally, the paper highlights a major shortcoming in Magnusson’s implementation, namely that the exchange of encryp-tion keys is done in the clear. It concludes by proposing possible solu-tions, such as TLS, IPSec and MIkey.
- Full Text:
- Date Issued: 2006
- Authors: Clayton, Bradley , Irwin, Barry V W , Terzoli, Alfredo
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428735 , vital:72532 , https://d1wqtxts1xzle7.cloudfront.net/84872934/66_Paper-libre.pdf?1650920302=response-content-disposi-tion=inline%3B+filename%3DIntegrating_Secure_RTP_into_the_Open_Sou.pdfExpires=1714744382Signature=PijjCGW0qcvkqRe-2R55HocKLvz9Ljw8jmhQvRQEi9YqJl7eWSiYnvs9CogY4u4bmDTYTLpvkA-nlfbiszg-s7Cq2nbLn3PUdfJ5cA11ujboi~i7oSoem7smuN1YCVZlg7FnZRd6mOXdTry9UAh8TlWyndF6pY1RXtc7bgb5cWeK4ggJ7~bM0HUXEbUKKa-abCZnGNrAZ59JIdL6CNx1Sht3o5mZTcyRL3PNVSOz17lldXi4FsAOEUwsVV-uv04hzp6pe6Qv5WbAP6tqk7deyoLUwk58A9F-PaJlOLy2gDAVLnbKT8RrxYg8tqv8SuBhPWb32CefBxv486N3F6izZw__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Implementations of Voice over Internet Protocol (VoIP) have focused, up to now, mainly on the need to transport data in real-time, often at the expense of security. The neglect of secure VoIP is often intentional, as developers are striving to minimise overheads and delays. The Secure Real-Time Protocol (SRTP) has the potential to secure real-time streams without exacting too high a performance price. SRTP is the addition of security to the audio/video profile used in the Real-Time Transport Protocol (RTP). SRTP adds confidentiality, integrity and op-tionaly authenticity to RTP media streams. This paper focuses on the integration of SRTP into Asterisk, an open-source VoIP PBX. SRTP support has recently been added to Asterisk by Mikael Magnusson. This paper analyses Magnusson’s implementation, contrasting it to a proof-of-concept implementation developed independently at Rhodes University. The interoperability of SRTP implementations cannot be taken for granted, given the relatively recent standardization of the pro-tocol, and so Magnusson’s implementation is tested against another SRTP implementation. Finally, the paper highlights a major shortcoming in Magnusson’s implementation, namely that the exchange of encryp-tion keys is done in the clear. It concludes by proposing possible solu-tions, such as TLS, IPSec and MIkey.
- Full Text:
- Date Issued: 2006
Medicines information and adherence in HIV/AIDS patients
- Mansoor, Leila E, Dowse, Roslind
- Authors: Mansoor, Leila E , Dowse, Roslind
- Date: 2006
- Language: English
- Type: Article
- Identifier: vital:6395 , http://hdl.handle.net/10962/d1006319
- Description: Background: Providing written medicines information is being legislated in an increasing number of countries worldwide, with the patient information leaflet (PIL) being the most widely used method for conveying health information. The impact of providing such information on adherence to therapy is reportedly unpredictable. Therapy for human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS) and related opportunistic infections usually involves polytherapy and complex regimens, both of which are risk factors for non-adherence. The objective of this study was to assess the impact of medicines information on adherence to chronic co-trimoxazole therapy in low-literate HIV/AIDS patients. Methods: Two different PILs were designed for co-trimoxazole tablets and were available in both English and isiXhosa. Participants were randomly allocated to a control group (receiving no PIL), group A (receiving a 'complex PIL') and group B (receiving a 'simple PIL' incorporating pictograms). At the first interview, demographic data were collected and the time, date and day that the participant would take his/her first tablet of the month's course was also documented. In a follow-up interview adherence to therapy was assessed using two methods; self-report and tablet count. Results: The medicines information materials incorporating simple text and pictograms resulted in significantly improved adherence to therapy in the short term, whereas a non-significant increase in adherence was associated with the availability of the more complex information. This was shown by both the self-reported assessment as well as the tablet count. Conclusion: This research suggests that appropriately designed written material can have a positive impact in improving adherence and, together with verbal consultation, are essential for enabling patients to make appropriate decisions about their medicine taking.
- Full Text:
- Date Issued: 2006
- Authors: Mansoor, Leila E , Dowse, Roslind
- Date: 2006
- Language: English
- Type: Article
- Identifier: vital:6395 , http://hdl.handle.net/10962/d1006319
- Description: Background: Providing written medicines information is being legislated in an increasing number of countries worldwide, with the patient information leaflet (PIL) being the most widely used method for conveying health information. The impact of providing such information on adherence to therapy is reportedly unpredictable. Therapy for human immunodeficiency virus/acquired immune deficiency syndrome (HIV/AIDS) and related opportunistic infections usually involves polytherapy and complex regimens, both of which are risk factors for non-adherence. The objective of this study was to assess the impact of medicines information on adherence to chronic co-trimoxazole therapy in low-literate HIV/AIDS patients. Methods: Two different PILs were designed for co-trimoxazole tablets and were available in both English and isiXhosa. Participants were randomly allocated to a control group (receiving no PIL), group A (receiving a 'complex PIL') and group B (receiving a 'simple PIL' incorporating pictograms). At the first interview, demographic data were collected and the time, date and day that the participant would take his/her first tablet of the month's course was also documented. In a follow-up interview adherence to therapy was assessed using two methods; self-report and tablet count. Results: The medicines information materials incorporating simple text and pictograms resulted in significantly improved adherence to therapy in the short term, whereas a non-significant increase in adherence was associated with the availability of the more complex information. This was shown by both the self-reported assessment as well as the tablet count. Conclusion: This research suggests that appropriately designed written material can have a positive impact in improving adherence and, together with verbal consultation, are essential for enabling patients to make appropriate decisions about their medicine taking.
- Full Text:
- Date Issued: 2006
The Need for Centralised, Cross Platform Information Aggregation
- Otten, Fred, Irwin, Barry V W, Slay, Hannah
- Authors: Otten, Fred , Irwin, Barry V W , Slay, Hannah
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428773 , vital:72535 , https://d1wqtxts1xzle7.cloudfront.net/2355475/8jlt6v8tz4wmhs6.pdf?1425084143=response-content-disposi-tion=inline%3B+filename%3DThe_need_for_centralised_cross_platform.pdfExpires=1714743760Signature=fsImuFaOfYc2FtUC88DqRrK1Anh84~rvBsZt2j46BfPyKMbbmswGZN5E2ajRJ7tZi5SZ4zQJvI5U6L47nmoXlNA0~Vo3pON-sYEo6Kn3TiTLvxwUpPQALnP7IvL-EEhgh11T-OuNZf0Q8QArxk6iqi4zjiOYbHUb~FDWw8MJ7ekH~frNS75mDrjpZ4xL8MqPNRHctaR3E5m~4i71SYO8hfbZw4vu7AhNNNvrRoIhbtLCEUsg-j7TkBDgVHts8LCsM5knmEKwgQTSBQTkLoRuNmXngqYikjvL7jUuHXibjSVaMSD78WRqXE~LDDkT7KXU7EbkPXzjRYJyamQ5qDXa3A__ey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: With the move towards global and multi-national companies, information technology infrastructure requirements are increasing. As the size of these computer networks increases, it becomes more and more difficult to moni-tor, control, and secure them. Network security involves the creation of large amounts of information in the form of logs and messages from a number of diverse devices, sensors, and gateways which are often spread over large geographical areas. This makes the monitoring and control difficult, and hence poses security problems. The aggregation of information is necessary in information audits, intrusion detection, network monitoring and management. The use of different platforms and devices complicates the problem, and makes aggregation more difficult. Network security administrators and security researchers require aggregation to simplify the analysis and comprehension of activity across the entire net-work. Centralised information aggregation will help deal with redundancy, analysis, monitoring and control. This aids the detection of wide spread attacks on global organisational networks, improving intrusion detection and mitigation. This paper discusses and motivates the need for central-ised, cross platform information aggregation in greater detail. It also sug-gests methods which may be used, discusses the security issues, and gives the advantages and disadvantages of aggregation.
- Full Text:
- Date Issued: 2006
- Authors: Otten, Fred , Irwin, Barry V W , Slay, Hannah
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428773 , vital:72535 , https://d1wqtxts1xzle7.cloudfront.net/2355475/8jlt6v8tz4wmhs6.pdf?1425084143=response-content-disposi-tion=inline%3B+filename%3DThe_need_for_centralised_cross_platform.pdfExpires=1714743760Signature=fsImuFaOfYc2FtUC88DqRrK1Anh84~rvBsZt2j46BfPyKMbbmswGZN5E2ajRJ7tZi5SZ4zQJvI5U6L47nmoXlNA0~Vo3pON-sYEo6Kn3TiTLvxwUpPQALnP7IvL-EEhgh11T-OuNZf0Q8QArxk6iqi4zjiOYbHUb~FDWw8MJ7ekH~frNS75mDrjpZ4xL8MqPNRHctaR3E5m~4i71SYO8hfbZw4vu7AhNNNvrRoIhbtLCEUsg-j7TkBDgVHts8LCsM5knmEKwgQTSBQTkLoRuNmXngqYikjvL7jUuHXibjSVaMSD78WRqXE~LDDkT7KXU7EbkPXzjRYJyamQ5qDXa3A__ey-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: With the move towards global and multi-national companies, information technology infrastructure requirements are increasing. As the size of these computer networks increases, it becomes more and more difficult to moni-tor, control, and secure them. Network security involves the creation of large amounts of information in the form of logs and messages from a number of diverse devices, sensors, and gateways which are often spread over large geographical areas. This makes the monitoring and control difficult, and hence poses security problems. The aggregation of information is necessary in information audits, intrusion detection, network monitoring and management. The use of different platforms and devices complicates the problem, and makes aggregation more difficult. Network security administrators and security researchers require aggregation to simplify the analysis and comprehension of activity across the entire net-work. Centralised information aggregation will help deal with redundancy, analysis, monitoring and control. This aids the detection of wide spread attacks on global organisational networks, improving intrusion detection and mitigation. This paper discusses and motivates the need for central-ised, cross platform information aggregation in greater detail. It also sug-gests methods which may be used, discusses the security issues, and gives the advantages and disadvantages of aggregation.
- Full Text:
- Date Issued: 2006
Towards Central Vulnerability Management By Mobile Phone Operators
- Moyo, Thamsanqa, Irwin, Barry V W, Wright, Madeleineh
- Authors: Moyo, Thamsanqa , Irwin, Barry V W , Wright, Madeleineh
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428787 , vital:72536 , https://www.researchgate.net/profile/Barry-Ir-win/publication/237107512_Securing_mobile_commerce_interactions_through_secure_mobile_web_services/links/5b9a5898a6fdccd3cb4ff6cf/Securing-mobile-commerce-interactions-through-secure-mobile-web-services.pdf
- Description: The application of XML-based approaches in passing vulnerability in-formation between vulnerability management devices or software resid-ing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile net-works. Our proposed framework allows for a pro-active central man-agement of vulnerabilities found on mobile stations such as mobile phones. Despite the relatively limited number of reported vulnerabilities on mobile stations, such a pre-emptive approach from mobile operators is necessary to acquire the confidence of early adopters in Mobile Commerce. Given the diverse collection of devices and software that exist on a public land mobile network, XML-based approaches are best able to providing the inter-operability required for vulnerability manage-ment on such a network. Our proposed framework leverages web ser-vices by using the Open Vulnerability Assessment Language (OVAL) to provide vulnerability descriptions, and by securing these descriptions in SOAP messages conforming to the OASIS Web Services Security (WSS) standard. We contribute in three areas: firstly, through this framework we show that mobile operators can carry out centralized vul-nerability management on their public land mobile networks comprising of a wide variety of devices and software. Secondly, the assurance of integrity, confidentiality and non-repudiation inherently lacking in OVAL vulnerability descriptions is achieved through their encapsulation in SOAP messages conforming to the OASIS WSS standard. Thirdly, SOAP-based web service implementations allow for integration with vulnerability management tools and devices that do not conform to OVAL.
- Full Text:
- Date Issued: 2006
- Authors: Moyo, Thamsanqa , Irwin, Barry V W , Wright, Madeleineh
- Date: 2006
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428787 , vital:72536 , https://www.researchgate.net/profile/Barry-Ir-win/publication/237107512_Securing_mobile_commerce_interactions_through_secure_mobile_web_services/links/5b9a5898a6fdccd3cb4ff6cf/Securing-mobile-commerce-interactions-through-secure-mobile-web-services.pdf
- Description: The application of XML-based approaches in passing vulnerability in-formation between vulnerability management devices or software resid-ing on wired networks has been demonstrated. We propose a proof of concept framework for mobile operators that extends this use of XML into the area of vulnerability management on public land mobile net-works. Our proposed framework allows for a pro-active central man-agement of vulnerabilities found on mobile stations such as mobile phones. Despite the relatively limited number of reported vulnerabilities on mobile stations, such a pre-emptive approach from mobile operators is necessary to acquire the confidence of early adopters in Mobile Commerce. Given the diverse collection of devices and software that exist on a public land mobile network, XML-based approaches are best able to providing the inter-operability required for vulnerability manage-ment on such a network. Our proposed framework leverages web ser-vices by using the Open Vulnerability Assessment Language (OVAL) to provide vulnerability descriptions, and by securing these descriptions in SOAP messages conforming to the OASIS Web Services Security (WSS) standard. We contribute in three areas: firstly, through this framework we show that mobile operators can carry out centralized vul-nerability management on their public land mobile networks comprising of a wide variety of devices and software. Secondly, the assurance of integrity, confidentiality and non-repudiation inherently lacking in OVAL vulnerability descriptions is achieved through their encapsulation in SOAP messages conforming to the OASIS WSS standard. Thirdly, SOAP-based web service implementations allow for integration with vulnerability management tools and devices that do not conform to OVAL.
- Full Text:
- Date Issued: 2006
- «
- ‹
- 1
- ›
- »