Current Search: exploitation (x)
View All Items
- Title
- A(&)nbsp;Framework For Modeling Attacker Capabilities with Deception.
- Creator
-
Hassan, Sharif, Guha, Ratan, Bassiouni, Mostafa, Chatterjee, Mainak, DeMara, Ronald, University of Central Florida
- Abstract / Description
-
In this research we built a custom experimental range using opensource emulated and custom pure honeypots designed to detect or capture attacker activity. The focus is to test the effectiveness of a deception in its ability to evade detection coupled with attacker skill levels. The range consists of three zones accessible via virtual private networking. The first zone houses varying configurations of opensource emulated honeypots, custom built pure honeypots, and real SSH servers. The second...
Show moreIn this research we built a custom experimental range using opensource emulated and custom pure honeypots designed to detect or capture attacker activity. The focus is to test the effectiveness of a deception in its ability to evade detection coupled with attacker skill levels. The range consists of three zones accessible via virtual private networking. The first zone houses varying configurations of opensource emulated honeypots, custom built pure honeypots, and real SSH servers. The second zone acts as a point of presence for attackers. The third zone is for administration and monitoring. Using the range, both a control and participant-based experiment were conducted. We conducted control experiments to baseline and empirically explore honeypot detectability amongst other systems through adversarial testing. We executed a series of tests such as network service sweep, enumeration scanning, and finally manual execution. We also selected participants to serve as cyber attackers against the experiment range of varying skills having unique tactics, techniques and procedures in attempting to detect the honeypots. We have concluded the experiments and performed data analysis. We measure the anticipated threat by presenting the Attacker Bias Perception Profile model. Using this model, each participant is ranked based on their overall threat classification and impact. This model is applied to the results of the participants which helps align the threat to likelihood and impact of a honeypot being detected. The results indicate the pure honeypots are significantly difficult to detect. Emulated honeypots are grouped in different categories based on the detection and skills of the attackers. We developed a framework abstracting the deceptive process, the interaction with system elements, the use of intelligence, and the relationship with attackers. The framework is illustrated by our experiment case studies and the attacker actions, the effects on the system, and impact to the success.
Show less - Date Issued
- 2019
- Identifier
- CFE0007467, ucf:52659
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007467
- Title
- ACCOMPLISHMENT OF DUAL FOCUS IN EXPLORATION AND EXPLOITATION: THE INFLUENTIAL ROLE OF THE CUSTOMER RELATIONSHIP MANAGEMENT (CRM) PROCESS.
- Creator
-
Tinoco, Janet, Ganesh, Jai, University of Central Florida
- Abstract / Description
-
Organizations that can successfully develop both radical and incremental innovations positively impact sustained competitive advantage, dramatically improving their chances of survival and success in both dynamic and stable environments (Han et al. 2001; Tushman and O'Reilly 1996). Experimentation and radical innovation are mandatory knowledge assets for competitive play in emerging markets, but efficiency and incremental innovation are essential for mature markets (He and Wong 2004;...
Show moreOrganizations that can successfully develop both radical and incremental innovations positively impact sustained competitive advantage, dramatically improving their chances of survival and success in both dynamic and stable environments (Han et al. 2001; Tushman and O'Reilly 1996). Experimentation and radical innovation are mandatory knowledge assets for competitive play in emerging markets, but efficiency and incremental innovation are essential for mature markets (He and Wong 2004; Tushman and O'Reilly 1996). The attainment of dual focus between radical and incremental innovation is challenging and calls for organizational architectures of sometimes conflicting processes, structure, and culture (cf, Tushman and O'Reilly 1996; Wind and Mahajan 1997). While prior research has investigated the structural and cultural determinants (Duncan 1976; Gibson and Birkenshaw 2004), there is a significant lack of research addressing the third major element of business processes. Without winning business processes in place that influence both exploration and exploitation, a successful portfolio mix of radical and incremental product innovations that maximize customer value and benefits will not be fully realized, and firm performance will suffer. Through core business processes, marketing's role and influence is significant in increasing customer value creation in the resulting product innovations. By mapping the "inside-out" and "outside-in" processes of a market-driven organization (Day 1994) into the Srivastava et al. (1999) core business process framework, this dissertation develops and tests a model of business process influence on dual focus in innovation strategies in the context of the high technology manufacturing environment. Each of these processes is critical in generating maximum customer value and is an explicit input into strategic choices and decisions (Srivastava et al. 1999). Specifically, it is argued and proposed that the Product Development Management (PDM) process, comprised of the processes of market experimentation, technology monitoring, and technology competence, predominantly influences exploration while the Supply Chain Management (SCM) process, comprised of the processes of channel bonding and quality process management, predominantly influences exploitation. The Customer Relationship Management (CRM) process, encompassing the processes of lead user collaboration, competitor benchmarking, and current customer knowledge process, acts as a moderator to add dual focus to these extremes by interacting with PDM processes to enhance exploitation and with SCM processes to enhance exploration. Furthermore, it is proposed that firms successfully achieving a dual focus have greater firm performance than firms entrenched in either extreme. Hypotheses were tested with data collected from a nationwide sample of high technology manufacturers. The results largely supported the main effect hypotheses of the PDM processes and SCM processes on exploration and exploitation. Additionally, the hypothesis of a positive interaction between exploration and exploitation on firm performance was also supported, however no visible support was garnered for the moderating impacts of CRM processes on PDM and SCM processes as hypothesized. Post hoc analyses were performed, bringing additional insight into dual focus based on the successful implementation of opposing businesses processes. Specifically, dual focus firms were shown to have multiple processes in place that impact both types of innovation strategies and that these firms implement these processes to a greater extent than those firms operating in the more extreme positions. Academic and managerial implications are discussed, as well as study limitations and exciting future research directions.
Show less - Date Issued
- 2007
- Identifier
- CFE0001573, ucf:47114
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001573
- Title
- AN EXAMINATION OF THE INSTABILITY AND EXPLOITATION IN CONGO FROM KING LEOPOLD II'S FREE STATE TO THE SECOND CONGO WAR.
- Creator
-
Beal, Baldwin, Walker, Ezekiel, University of Central Florida
- Abstract / Description
-
This thesis will analyze the Congo from King Leopold II's Free State to the 2nd Congo War. After a thorough investigation of the colonial period, this thesis will analyze the modern period. This thesis contends that the underdevelopment of the Congo, and its continuing warfare and poverty are the consequences of an exploitative colonial history. To be sure, King Leopold II of Belgium created the template for administering the Congo through the installation of concessionary companies that were...
Show moreThis thesis will analyze the Congo from King Leopold II's Free State to the 2nd Congo War. After a thorough investigation of the colonial period, this thesis will analyze the modern period. This thesis contends that the underdevelopment of the Congo, and its continuing warfare and poverty are the consequences of an exploitative colonial history. To be sure, King Leopold II of Belgium created the template for administering the Congo through the installation of concessionary companies that were more interested in harvesting huge profits than creating the conditions for a self-sustaining Congolese economy. Indeed, the policies implemented by King Leopold not only created the framework for the exploitation of the Congo after the cessation of the Free State, and set the stage for Congo's current state of instability of warfare.
Show less - Date Issued
- 2014
- Identifier
- CFH0004728, ucf:45352
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004728
- Title
- SOCIAL WORK STUDENT PERCEPTIONS OF LABOR TRAFFICKING.
- Creator
-
Mulhern, Margaret, Leon, Ana, University of Central Florida
- Abstract / Description
-
Human Trafficking in Florida is a growing issue that affects individuals and communities on a micro, mezzo, and macro level. Although legislative efforts and changes in agency policies have raised awareness about this problem, limited awareness and research examines awareness of labor trafficking as one form of human trafficking. This exploratory-descriptive study used a convenience sampling technique to explore the perceptions of 45 Bachelors (BSW) and Masters (MSW) level social work...
Show moreHuman Trafficking in Florida is a growing issue that affects individuals and communities on a micro, mezzo, and macro level. Although legislative efforts and changes in agency policies have raised awareness about this problem, limited awareness and research examines awareness of labor trafficking as one form of human trafficking. This exploratory-descriptive study used a convenience sampling technique to explore the perceptions of 45 Bachelors (BSW) and Masters (MSW) level social work students on the prevalence and nature of labor trafficking. The findings from the research show students have a general idea of labor trafficking and believe in equal access to human rights for victims. However, majority of students were unaware of current legislation to aid victims in Florida, and the prevalence of men as victims. Implications from this study show a need for further education within social work policies that aid labor trafficking victims, and a need for additional research to identify specific ways students can learn about human trafficking.
Show less - Date Issued
- 2014
- Identifier
- CFH0004581, ucf:45202
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004581