From the article: This paper describes the external IT security analysis of an international corporate organization, containing a technical and a social perspective, resulting in a proposed repeatable approach and lessons learned for applying this approach. Part of the security analysis was the utilization of a social engineering experiment, as this could be used to discover employee related risks. This approach was based on multiple signals that indicated a low IT security awareness level among employees as well as the results of a preliminary technical analysis. To carry out the social engineering experiment, two techniques were used. The first technique was to send phishing emails to both the system administrators and other employees of the company. The second technique comprised the infiltration of the office itself to test the physical security, after which two probes were left behind. The social engineering experiment proved that general IT security awareness among employees was very low. The results allowed the research team to infiltrate the network and have the possibility to disable or hamper crucial processes. Social engineering experiments can play an important role in conducting security analyses, by showing security vulnerabilities and raising awareness within a company. Therefore, further research should focus on the standardization of social engineering experiments to be used in security analyses and further development of the approach itself. This paper provides a detailed description of the used methods and the reasoning behind them as a stepping stone for future research on this subject. van Liempd, D., Sjouw, A., Smakman, M., & Smit, K. (2019). Social Engineering As An Approach For Probing Organizations To Improve It Security: A Case Study At A Large International Firm In The Transport Industry. 119-126. https://doi.org/10.33965/es2019_201904l015
MULTIFILE
In this episode of “Learning to Think Like a Cyber Security Specialist,” we explore how investing in Security and Privacy is crucial for building trust with clients. We contrast different company approaches to handling personal data, from transparent and protective to invasive and careless. The episode emphasizes that true trust arises from empowering clients with control over their information, highlighting that robust privacy and security measures are not just ethical but also vital for a company’s reputation and client relationships.
VIDEO
This essay explores the notion of resilience by providing a theoretical context and subsequently linking it to the management of safety and security. The distinct worlds of international security, industrial safety and public security have distinct risks as well as distinct ‘core purposes and integrities’ as understood by resilience scholars. In dealing with risks one could argue there are three broad approaches: cost-benefit analysis, precaution and resilience. In order to distinguish the more recent approach of resilience, the idea of adaptation will be contrasted to mitigation. First, a general outline is provided of what resilience implies as a way to survive and thrive in the face of adversity. After that, a translation of resilience for the management of safety and security is described. LinkedIn: https://www.linkedin.com/in/juul-gooren-phd-cpp-a1180622/
Many lithographically created optical components, such as photonic crystals, require the creation of periodically repeated structures [1]. The optical properties depend critically on the consistency of the shape and periodicity of the repeated structure. At the same time, the structure and its period may be similar to, or substantially below that of the optical diffraction limit, making inspection with optical microscopy difficult. Inspection tools must be able to scan an entire wafer (300 mm diameter), and identify wafers that fail to meet specifications rapidly. However, high resolution, and high throughput are often difficult to achieve simultaneously, and a compromise must be made. TeraNova is developing an optical inspection tool that can rapidly image features on wafers. Their product relies on (a) knowledge of what the features should be, and (b) a detailed and accurate model of light diffraction from the wafer surface. This combination allows deviations from features to be identified by modifying the model of the surface features until the calculated diffraction pattern matches the observed pattern. This form of microscopy—known as Fourier microscopy—has the potential to be very rapid and highly accurate. However, the solver, which calculates the wafer features from the diffraction pattern, must be very rapid and precise. To achieve this, a hardware solver will be implemented. The hardware solver must be combined with mechatronic tracking of the absolute wafer position, requiring the automatic identification of fiduciary markers. Finally, the problem of computer obsolescence in instrumentation (resulting in security weaknesses) will also be addressed by combining the digital hardware and software into a system-on-a-chip (SoC) to provide a powerful, yet secure operating environment for the microscope software.
The utilization of drones in various industries, such as agriculture, infrastructure inspection, and surveillance, has significantly increased in recent years. However, navigating low-altitude environments poses a challenge due to potential collisions with “unseen” obstacles like power lines and poles, leading to safety concerns and equipment damage. Traditional obstacle avoidance systems often struggle with detecting thin and transparent obstacles, making them ill-suited for scenarios involving power lines, which are essential yet difficult to perceive visually. Together with partners that are active in logistics and safety and security domains, this project proposal aims at conducting feasibility study on advanced obstacle detection and avoidance system for low-flying drones. To that end, the main research question is, “How can AI-enabled, robust and module invisible obstacle avoidance technology can be developed for low-flying drones? During this feasibility study, cutting-edge sensor technologies, such as LiDAR, radar, camera and advanced machine learning algorithms will be investigated to what extent they can be used be to accurately detect “Not easily seen” obstacles in real-time. The successful conclusion of this project will lead to a bigger project that aims to contribute to the advancement of drone safety and operational capabilities in low-altitude environments, opening new possibilities for applications in industries where low-flying drones and obstacle avoidance are critical.
In het project onderzoeken we hoe je mensen op de werkvloer kan helpen om zich digitaal veiliger te gedragen door middel van gebruikersgericht ontwerp.Doel Het doel van dit project is om een gebruikersgerichte aanpak voor bruikbare cybersecurity ontwikkelen op basis van wetenschappelijk inzichten over gedrag en design, toegepast op de praktijk. Resultaten Het resultaat zal een handelingskader zijn die een weergave geeft van een gebruikersgerichte aanpak om te komen tot bruikbare cybersecurity. Het is een handige manier om te begrijpen hoe digitale handelingen veiliger gemaakt kunnen worden door het ontwerp van beveiligingsmaatregelen Looptijd 01 oktober 2022 - 01 oktober 2023 Aanpak Aan de hand van een praktijkopdracht en literatuur worden inzichten verworven in bruikbare cybersecurity. Deze inzichten worden gebruikt als leidraad voor het creëren van gebruiksvriendelijke ontwerpen tijdens een co-creatie sessie met experts. De ontwerpen die hieruit voortkomen worden getest en de opgedane kennis wordt in een bredere context gezet.