Targeted attack detection by means of free and open source solutions
- Authors: Bernardo, Louis F
- Date: 2019
- Subjects: Computer networks -- Security measures , Information technology -- Security measures , Computer security -- Management , Data protection
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/92269 , vital:30703
- Description: Compliance requirements are part of everyday business requirements for various areas, such as retail and medical services. As part of compliance it may be required to have infrastructure in place to monitor the activities in the environment to ensure that the relevant data and environment is sufficiently protected. At the core of such monitoring solutions one would find some type of data repository, or database, to store and ultimately correlate the captured events. Such solutions are commonly called Security Information and Event Management, or SIEM for short. Larger companies have been known to use commercial solutions such as IBM's Qradar, Logrythm, or Splunk. However, these come at significant cost and arent suitable for smaller businesses with limited budgets. These solutions require manual configuration of event correlation for detection of activities that place the environment in danger. This usually requires vendor implementation assistance that also would come at a cost. Alternatively, there are open source solutions that provide the required functionality. This research will demonstrate building an open source solution, with minimal to no cost for hardware or software, while still maintaining the capability of detecting targeted attacks. The solution presented in this research includes Wazuh, which is a combination of OSSEC and the ELK stack, integrated with an Network Intrusion Detection System (NIDS). The success of the integration, is determined by measuring postive attack detection based on each different configuration options. To perform the testing, a deliberately vulnerable platform named Metasploitable will be used as a victim host. The victim host vulnerabilities were created specifically to serve as target for Metasploit. The attacks were generated by utilising Metasploit Framework on a prebuilt Kali Linux host.
- Full Text:
- Date Issued: 2019
- Authors: Bernardo, Louis F
- Date: 2019
- Subjects: Computer networks -- Security measures , Information technology -- Security measures , Computer security -- Management , Data protection
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/92269 , vital:30703
- Description: Compliance requirements are part of everyday business requirements for various areas, such as retail and medical services. As part of compliance it may be required to have infrastructure in place to monitor the activities in the environment to ensure that the relevant data and environment is sufficiently protected. At the core of such monitoring solutions one would find some type of data repository, or database, to store and ultimately correlate the captured events. Such solutions are commonly called Security Information and Event Management, or SIEM for short. Larger companies have been known to use commercial solutions such as IBM's Qradar, Logrythm, or Splunk. However, these come at significant cost and arent suitable for smaller businesses with limited budgets. These solutions require manual configuration of event correlation for detection of activities that place the environment in danger. This usually requires vendor implementation assistance that also would come at a cost. Alternatively, there are open source solutions that provide the required functionality. This research will demonstrate building an open source solution, with minimal to no cost for hardware or software, while still maintaining the capability of detecting targeted attacks. The solution presented in this research includes Wazuh, which is a combination of OSSEC and the ELK stack, integrated with an Network Intrusion Detection System (NIDS). The success of the integration, is determined by measuring postive attack detection based on each different configuration options. To perform the testing, a deliberately vulnerable platform named Metasploitable will be used as a victim host. The victim host vulnerabilities were created specifically to serve as target for Metasploit. The attacks were generated by utilising Metasploit Framework on a prebuilt Kali Linux host.
- Full Text:
- Date Issued: 2019
The use of filter-feeding fish (Clarias gariepinus and Oreochromis mossambicus) to remove microalgae from brewery effluent treatment ponds
- Authors: Nombembe, Lwazi
- Date: 2019
- Subjects: Clarias gariepinus -- Food , Mozambique tilapia -- Food , Water -- Purification -- South Africa , Algae -- Biotechnology -- South Africa , Microalgae -- Biotechnology-- South Africa , Brewery waste -- South Africa , Fish culture -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/95745 , vital:31194
- Description: The removal of microalgae from high rate algal ponds (HRAP) in waste-water treatment systems remains a constraint to their use in effluent treatment systems. Conventional algae harvesting methods often have high energy demands, take up lots of space, are expensive to operate or are time consuming. The aim of the study was to determine if fish such as Clarias gariepinus and Oreochromis mossambicus, could be used to remove microalgae from waste-water treatment ponds (in the absence/presence of a flocculent in the former and in the absence or presence of pH moderation in the latter), and to investigate the subsequent influence of algae concentration on several water quality parameters. The age of Clarias gariepinus (3-12 months) had a positive relationship with the distance between gill rakers (98.27 to 163.34 μm; y=90.576+4.823*x: R²=0.549; F(1,18)=21.867; p<0.001) and these data suggested that these fish might be efficient at removing algae from HRAP effluent. However, this was not the case, even with flocculent application (but this result might have been confounded by very high pH readings, at which flocculation is less likely to occur). Oreochromis mossambicus removed some of this algae, but the pH was too high for tilapia culture. It was not possible to moderate the increase in pH by keeping tanks in the dark and thus preventing photosynthesis; but pH fluctuation in HRAP effluent could be moderated using CO2 sparging in an attempt to make the environment more hospitable for tilapia (the average pH that was moderated with CO2 was 8.43±0.06, whereas the unmoderated average was 10.65±0.06). However, pH moderation using CO2 sparging did not increase the rate at which algae were removed by O. mossambicus; rather, it compromised O2 concentration which dropped to 4.17±1.26 mg/l after five hours of CO2 sparging, whereas it increased to 20.50±1.41 mg/l in treatments with unadjusted pH over the same period. Fish can be used to remove algae from treated effluent, and Oreochromis mossambicus remains a recommended species. Future work needs to investigate moderating fluctuations in pH and O2 concentration to further facilitate this method of algae removal.
- Full Text:
- Date Issued: 2019
- Authors: Nombembe, Lwazi
- Date: 2019
- Subjects: Clarias gariepinus -- Food , Mozambique tilapia -- Food , Water -- Purification -- South Africa , Algae -- Biotechnology -- South Africa , Microalgae -- Biotechnology-- South Africa , Brewery waste -- South Africa , Fish culture -- South Africa
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/95745 , vital:31194
- Description: The removal of microalgae from high rate algal ponds (HRAP) in waste-water treatment systems remains a constraint to their use in effluent treatment systems. Conventional algae harvesting methods often have high energy demands, take up lots of space, are expensive to operate or are time consuming. The aim of the study was to determine if fish such as Clarias gariepinus and Oreochromis mossambicus, could be used to remove microalgae from waste-water treatment ponds (in the absence/presence of a flocculent in the former and in the absence or presence of pH moderation in the latter), and to investigate the subsequent influence of algae concentration on several water quality parameters. The age of Clarias gariepinus (3-12 months) had a positive relationship with the distance between gill rakers (98.27 to 163.34 μm; y=90.576+4.823*x: R²=0.549; F(1,18)=21.867; p<0.001) and these data suggested that these fish might be efficient at removing algae from HRAP effluent. However, this was not the case, even with flocculent application (but this result might have been confounded by very high pH readings, at which flocculation is less likely to occur). Oreochromis mossambicus removed some of this algae, but the pH was too high for tilapia culture. It was not possible to moderate the increase in pH by keeping tanks in the dark and thus preventing photosynthesis; but pH fluctuation in HRAP effluent could be moderated using CO2 sparging in an attempt to make the environment more hospitable for tilapia (the average pH that was moderated with CO2 was 8.43±0.06, whereas the unmoderated average was 10.65±0.06). However, pH moderation using CO2 sparging did not increase the rate at which algae were removed by O. mossambicus; rather, it compromised O2 concentration which dropped to 4.17±1.26 mg/l after five hours of CO2 sparging, whereas it increased to 20.50±1.41 mg/l in treatments with unadjusted pH over the same period. Fish can be used to remove algae from treated effluent, and Oreochromis mossambicus remains a recommended species. Future work needs to investigate moderating fluctuations in pH and O2 concentration to further facilitate this method of algae removal.
- Full Text:
- Date Issued: 2019
Enabling e-learning 2.0 in information security education: a semantic web approach
- Authors: Goss, Ryan Gavin
- Date: 2009
- Subjects: Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9771 , http://hdl.handle.net/10948/909 , Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Description: The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
- Full Text:
- Date Issued: 2009
- Authors: Goss, Ryan Gavin
- Date: 2009
- Subjects: Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9771 , http://hdl.handle.net/10948/909 , Data protection , Computers -- Access control , Electronic data processing -- Security measures , Electronic data processing departments -- Security measures
- Description: The motivation for this study argued that current information security ed- ucation systems are inadequate for educating all users of computer systems world wide in acting securely during their operations with information sys- tems. There is, therefore, a pervasive need for information security knowledge in all aspects of modern life. E-Learning 2.0 could possi- bly contribute to solving this problem, however, little or no knowledge currently exists regarding the suitability and practicality of using such systems to infer information security knowledge to learners.
- Full Text:
- Date Issued: 2009
Framing the other : representations of Africa in The Japan Times/Online between January and December 2000 : a case study
- Authors: Ngoro, Blackman Rodrick
- Date: 2004
- Subjects: Africa -- In mass media -- Japan , Newspapers -- Japan , Japan Times/Online , Africa -- Foreign public opinion, Japanese
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3476 , http://hdl.handle.net/10962/d1002931 , Africa -- In mass media -- Japan , Newspapers -- Japan , Japan Times/Online , Africa -- Foreign public opinion, Japanese
- Description: The aim of this study is to find out, against the news genre norms, how representations of particular regions are produced in the structure of newspaper reporting in the foreign news sub-genre. The study focuses on news reports concerning Africa, or African countries, in one Tokyo-based newspaper: The Japan Times/Online. The study is theoretically informed by Cultural Studies – a field of study concerned with the study of ideology and power in discourse – and investigates how Africa and African countries are represented as “other” than developed countries. This is a textual study that focuses on the production moment using Critical Discourse Analysis methods. Critical discourse analysis is interested in the study of ideological forms that have become naturalised over time, so that ideology has become common sense. The first part of the study analyses headlines and reveals evidence of ideological positions adopted by The Japan Times/Online in the representation of, firstly, home or Japanese actors, which is very different to the representation of African actors. The second part of the analysis examines the structures of the texts and the language used therein. The evidence from this analysis shows how Africa is represented as a Third World entity through various crises, including a health epidemic, perceptions of political instability and economic instability, an inadequate business image, as well as market and managerial skills, and wars and conflict. The study concludes with a discussion of the representation of Africa and African countries as a part of the Third World entity. This representation reflects and naturalises social inequality between developed countries and those of the Third World, of which Africa is a part. The representation of Africa as a Third World entity also naturalises the social, health, economic and political conditions said to be characteristic of African countries. It is this process of representation that reveals the power relations between Japan as a First World country and Africa as part of the Third World.
- Full Text:
- Date Issued: 2004
- Authors: Ngoro, Blackman Rodrick
- Date: 2004
- Subjects: Africa -- In mass media -- Japan , Newspapers -- Japan , Japan Times/Online , Africa -- Foreign public opinion, Japanese
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:3476 , http://hdl.handle.net/10962/d1002931 , Africa -- In mass media -- Japan , Newspapers -- Japan , Japan Times/Online , Africa -- Foreign public opinion, Japanese
- Description: The aim of this study is to find out, against the news genre norms, how representations of particular regions are produced in the structure of newspaper reporting in the foreign news sub-genre. The study focuses on news reports concerning Africa, or African countries, in one Tokyo-based newspaper: The Japan Times/Online. The study is theoretically informed by Cultural Studies – a field of study concerned with the study of ideology and power in discourse – and investigates how Africa and African countries are represented as “other” than developed countries. This is a textual study that focuses on the production moment using Critical Discourse Analysis methods. Critical discourse analysis is interested in the study of ideological forms that have become naturalised over time, so that ideology has become common sense. The first part of the study analyses headlines and reveals evidence of ideological positions adopted by The Japan Times/Online in the representation of, firstly, home or Japanese actors, which is very different to the representation of African actors. The second part of the analysis examines the structures of the texts and the language used therein. The evidence from this analysis shows how Africa is represented as a Third World entity through various crises, including a health epidemic, perceptions of political instability and economic instability, an inadequate business image, as well as market and managerial skills, and wars and conflict. The study concludes with a discussion of the representation of Africa and African countries as a part of the Third World entity. This representation reflects and naturalises social inequality between developed countries and those of the Third World, of which Africa is a part. The representation of Africa as a Third World entity also naturalises the social, health, economic and political conditions said to be characteristic of African countries. It is this process of representation that reveals the power relations between Japan as a First World country and Africa as part of the Third World.
- Full Text:
- Date Issued: 2004
An assessment of employment opportunities created by the Keiskamma Irrigation Scheme
- Authors: Nightingale, Fiona Mary
- Date: 1983
- Subjects: Economic development projects -- South Africa --Ciskei , Job creation -- South Africa -- Ciskei , Irrigation -- South Africa -- Ciskei , Agriculture -- Economic aspects -- South Africa -- Ciskei , Black people -- Employment -- South Africa -- Ciskei
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:4862 , http://hdl.handle.net/10962/d1006912 , Economic development projects -- South Africa --Ciskei , Job creation -- South Africa -- Ciskei , Irrigation -- South Africa -- Ciskei , Agriculture -- Economic aspects -- South Africa -- Ciskei , Black people -- Employment -- South Africa -- Ciskei
- Description: Preface: "The need for development as observed today is a problem peculiar to the 20th century. The current situation is characterised by the fact that there are no more empty places on the earth, while our use of dwindling resources is curbed by environmental constraint." (Mouly and Costa, 1974, 155). The need for development is not equally felt by all nations as disparities in income and standards of living on a national basis have dissected the world into developed and underdeveloped countries. Disparities also exist within nations. These divisions are not simply determined nor are the terms related to development clearly defined - a matter that will be discussed in Chapter Two. Impetus to developing underdeveloped countries may be provided by various means, such as a general injection of capital or by more specific development projects. The purpose of these projects is to initiate changes that are intended to promote rapid development of an area. An interest has been shown by Geographers in the ability of these projects to stimulate economic growth in surrounding areas (Silberfein, 1976). The resulting success of development projects is closely related, if not determined, in large measure, by the aims. In view of the need for the aims of development projects to be successfully fulfilled, research into what constitute constructive developmental aims would be beneficial. Previous studies have revealed problems encountered with conflicting aims and objectives (Mountjoy, 1971); poorly defined aims (de Wilde, 1967); and inadequate groundwork prior to initiating the project (Berry, 1976). It is the intention of the study to examine the impact made by a development project in an underdeveloped area, and thereby assess the extent to which the development aims have been carried out. In order to carry out an examination of a development project in an underdeveloped area, an area in need of development had to be selected; a project within the area chosen for study; and the particular aim of the project examined. The Ciskei, a Homeland in South Africa, was chosen as a suitable area for study. A number of factors contribute towards it being an area in need of development, particularly as the Ciskei is a small country and dependent on South Africa, which is explained in the overview of the Ciskei in Chapter One. Three characteristics of underdevelopment noted by Seers (1972) are poverty, inequality and underemployment. Of these three factors it was decided to focus on unemployment as the indication of the extent to which development has taken place. The reduction of unemployment was one of the aims of the Keiskammahoek Irrigation Scheme, the project chosen for study. The overview concludes with a presentation of the Keiskamma Irrigation Scheme.
- Full Text:
- Date Issued: 1983
- Authors: Nightingale, Fiona Mary
- Date: 1983
- Subjects: Economic development projects -- South Africa --Ciskei , Job creation -- South Africa -- Ciskei , Irrigation -- South Africa -- Ciskei , Agriculture -- Economic aspects -- South Africa -- Ciskei , Black people -- Employment -- South Africa -- Ciskei
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:4862 , http://hdl.handle.net/10962/d1006912 , Economic development projects -- South Africa --Ciskei , Job creation -- South Africa -- Ciskei , Irrigation -- South Africa -- Ciskei , Agriculture -- Economic aspects -- South Africa -- Ciskei , Black people -- Employment -- South Africa -- Ciskei
- Description: Preface: "The need for development as observed today is a problem peculiar to the 20th century. The current situation is characterised by the fact that there are no more empty places on the earth, while our use of dwindling resources is curbed by environmental constraint." (Mouly and Costa, 1974, 155). The need for development is not equally felt by all nations as disparities in income and standards of living on a national basis have dissected the world into developed and underdeveloped countries. Disparities also exist within nations. These divisions are not simply determined nor are the terms related to development clearly defined - a matter that will be discussed in Chapter Two. Impetus to developing underdeveloped countries may be provided by various means, such as a general injection of capital or by more specific development projects. The purpose of these projects is to initiate changes that are intended to promote rapid development of an area. An interest has been shown by Geographers in the ability of these projects to stimulate economic growth in surrounding areas (Silberfein, 1976). The resulting success of development projects is closely related, if not determined, in large measure, by the aims. In view of the need for the aims of development projects to be successfully fulfilled, research into what constitute constructive developmental aims would be beneficial. Previous studies have revealed problems encountered with conflicting aims and objectives (Mountjoy, 1971); poorly defined aims (de Wilde, 1967); and inadequate groundwork prior to initiating the project (Berry, 1976). It is the intention of the study to examine the impact made by a development project in an underdeveloped area, and thereby assess the extent to which the development aims have been carried out. In order to carry out an examination of a development project in an underdeveloped area, an area in need of development had to be selected; a project within the area chosen for study; and the particular aim of the project examined. The Ciskei, a Homeland in South Africa, was chosen as a suitable area for study. A number of factors contribute towards it being an area in need of development, particularly as the Ciskei is a small country and dependent on South Africa, which is explained in the overview of the Ciskei in Chapter One. Three characteristics of underdevelopment noted by Seers (1972) are poverty, inequality and underemployment. Of these three factors it was decided to focus on unemployment as the indication of the extent to which development has taken place. The reduction of unemployment was one of the aims of the Keiskammahoek Irrigation Scheme, the project chosen for study. The overview concludes with a presentation of the Keiskamma Irrigation Scheme.
- Full Text:
- Date Issued: 1983
- «
- ‹
- 1
- ›
- »