2 resultados para Critical clearing time
Resumo:
Science reported in the media is an authentic source material to explore science research and innovation, to learn how science works and to consolidate science literacy skills.
Media reports intended to communicate science research and innovation provide opportunities for teachers to develop among their pupils the critical reading skills that are essential for promoting literacy in science.
This study focuses on a curricular intervention with upper primary pupils (age 11 years) and uses science reported in the media to facilitate science directed learning in the primary curriculum.
The study suggests that the use of science based media reports can be a positive learning experience for pupils. Strategies and teaching approaches can be used to boost pupils’ confidence and competence to adopt critical reading strategies when they encounter science-based media.
Critical reading and reasoning strategies vary in their degree of difficulty. This study would suggest that, when using media-based resources, teachers need approaches that systematically address the different levels of cognative challenge presented by media resources and create opportunities within the curriculum to revisit, consolidate and develop pupils’ critical reasoning skills.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.