Refine
Institute
Document Type
- Conference Proceeding (11)
- Article (6)
- Book (1)
- Part of a Book (1)
Keywords
- Conpot (1)
- ICS (1)
- cybersecurity (1)
- honeynet (1)
- honeypot (1)
Background: One of the most prominent neurobiological models of alexithymia assumes an altered function of the anterior cingulate cortex (ACC) as the crucial neural correlate of alexithymia. So far functional imaging studies have yielded inconclusive results. Therefore, we tested this hypothesis in healthy alexithymics and nonalexithymics in an event-related fMRI study.
Methods: Thirty high- and 30 low-alexithymic right-handed male subjects (selected by the 20-item Toronto Alexithymia Scale, TAS-20) were investigated with event-related fMRI using a picture viewing paradigm. The stimuli consisted of happy, fearful and neutral facial expressions (Ekman-Friesen) as well as positive, negative and neutral pictures from the International Affective Picture System.
Results: Contrasting the high-alexithymic with the low-alexithymic group we observed increased activation of the supragenual ACC for different emotional valences as well as for different emotional stimuli. Moreover, there was a positive correlation of the ACC with the individual TAS-20 scores but no correlations with the individual Beck Depression Inventory scores. Additionally, there was no difference in activity of the amygdala.
Conclusions: We demonstrated that the supragenual ACC is constantly activated more strongly in alexithymic subjects and that this activation is related to the symptoms of alexithymia and not to associated symptoms such as depression. Therefore, our findings support the hypothesis of an altered function of the ACC in alexithymia.
Differential modulation of valence and arousal in high-alexithymic and low-alexithymic individuals
(2010)
High-alexithymic individuals are characterized by an impaired ability to identify and communicate emotions whereas low-alexithymic individuals have a wide-ranging ability to deal with emotions. This study examined the hypothesis that valence and arousal modifications of emotional stimuli differentially modulate cortical regions in high-alexithymic and low-alexithymic individuals. To this end, 28 high-alexithymic and 25 low-alexithymic individuals were investigated with event-related fMRI using visual emotional stimuli. We found differential neural activations in the dorsal anterior cingulate, the insula and the amygdala. We suggest that these differences may account for the impaired ability of high-alexithymic individuals to appropriately handle emotional stimuli.
Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbehörden immer häufiger gegenüberstehen.
Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden
geführt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei müssen die Ermittler möglichst
schnell und gezielt erkennen können, ob eine App tatsächlich schadhaft manipuliert wurde, was
manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen
zwar bei der generellen Erkennung schadhafter Software, sind aber für die polizeiliche Praxis nicht
geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen berücksichtigt
und so für den Einsatz in der Strafverfolgung in Frage kommt.
Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.