21 resultados para critical infrastructure security
Resumo:
Active network scanning injects traffic into a network and observes responses to draw conclusions about the network. Passive network analysis works by looking at network meta data or by analyzing traffic as it traverses a fixed point on the network. It may be infeasible or inappropriate to scan critical infrastructure networks. Techniques exist to uniquely map assets without resorting to active scanning. In many cases, it is possible to characterize and identify network nodes by passively analyzing traffic flows. These techniques are considered in particular with respect to their application to power industry critical infrastructure.
Resumo:
As a consequence of increased levels of flooding, largely attributable to urbanization of watersheds (and perhaps climate change, more frequent extreme rainfall events are occurring and threatening existing critical infrastructure. Many of which are short-span bridges over relatively small waterways (e.g., small rivers, streams and canals). Whilst these short-span bridges were designed, often many years ago, to pass relatively minor the then standard return-period floods, in recenttimes the failure incidence of such short-span bridges has been noticeably increasing. This is suggestive of insufficient hydraulic capacity or alternative failure mechanism not envisaged at the time of design e.g. foundation scour or undermining. This paper presen ts, and draws lessons, from bridge failures in Ireland and the USA. For example, in November 2009, the UK and Ireland were subjected to extraordinarily severe weather conditions for several days. The resulting flooding led to the collapse of three UK bridges that were generally 19th century masonry arch bridges, withrelatively shallow foundations. Parallel failure events have been observed in the USA. To date, knowledge of the combined effect of waterway erosion, bridge submergence, and geotechnical collapse has not been adequately studied. Recent research carried out considered the hydraulic analysis of short span bridges under flood conditions, but no consideration was given towards the likely damage to these structures due to erosive coupling of hydraulic and geotechnical factors. Some work has been done to predict the discharge downstream of an inundated arch, focusing onpredicting afflux, as opposed to bridge scour, under both pressurized and free-surface flows, but no ! predictive equation for scour under pressurized conditions was ever considered. The case studies this paper presents will be augmented by the initial findings from the laboratory experiments investigating the effects of surcharged flow and subsequent scour within the vicinity of single span arch bridges. Velocities profiles will be shown within the vicinity of the arch, in addition to the depth of consequent scour, for a series of flows and model spans. The data will be presented and correlated to the most recent predictive equations for submerged contraction and abutment scour. The accuracy of these equations is examined, and the findings used as a basis for developing further studies in relation to short span bridges.
Resumo:
This article argues that Critical Security Studies (CSS), exemplified by Ken Booth’s Theory of World Security, has outlined an ethics of security as emancipation of the ‘human’, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: ‘humanitarian containment’, military intervention and hospitality. Assessing each against Booth’s requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.
Resumo:
Both Northern Ireland and Republic of Ireland governments recognise the current infrastructural deficits in their respective jurisdictions which, if not addressed, will undermine the future economic prosperity of both regions. This paper considers the adoption of a collaborative approach on the island to addressing the deficit, using public private partnerships (PPP) as the delivery vehicle. It presents a critical perspective of the challenges and opportunities posed by adopting such a cross-border approach. Whilst PPPs have the potential to bring about North-South co-operation, bridge gaps in infrastructure capacity and facilitate the advancement of sectoral knowledge, their adoption on a cross border basis will require significant reorganisation and change at administrative and sectoral levels. This review concludes that governments and construction sector representatives in Northern Ireland and the Republic of Ireland have still some work to do in order to enhance the capability and readiness of public and private partners to evolve an all-island PPP infrastructure development approach.
Resumo:
Over the years, build-operate-transfer (BOT) has continuously attracted research interests. Many studies on BOT have been carried out. Variations of BOT such as build-own-operate-transfer and build-own-operate have also been reported in some relevant publications. However, few investigations thus far have been conducted for transfer-operate-transfer (TOT). Therefore, there is a knowledge gap in this particular field. TOT is a new model that is suitable for existing infrastructure and public utility projects formerly funded by the governments and currently operated by state-owned enterprises. It refers to the transfer of a running public project to a foreign business or domestic private entity. Based on four case studies carried out in the Chinese water supply industry, this paper examines why there is an increasing need for TOT projects and identifies the distinctive features of TOT practice in China. This is followed by an introduction of a framework of critical success factors (CSFs) for TOT projects. The most important factors include project profitability, asset quality, fair risk allocation, competitive tendering, internal coordination within government, employment of professional advisors, corporate governance, and government supervision. The identification of CSFs provides a useful guidance to project parties planning to participate in TOT practice.
Resumo:
Policy documents are a useful source for understanding the privileging of particular ideological and policy preferences (Scrase and Ockwell, 2010) and how the language and imagery may help to construct society’s assumptions, values and beliefs. This article examines how the UK Coalition government’s 2010 Green Paper, 21st Century Welfare, and the White Paper, Universal Credit: Welfare that Works, assist in constructing a discourse about social security that favours a renewal and deepening of neo-liberalization in the context of threats to its hegemony. The documents marginalize the structural aspects of persistent unemployment and poverty by transforming these into individual pathologies of benefit dependency and worklessness. The consequence is that familiar neo-liberal policy measures favouring the intensification of punitive conditionality and economic rationality can be portrayed as new and innovative solutions to address Britain’s supposedly broken society and restore economic competitiveness.
Resumo:
This article argues that the terrorist bombings of hotels, pubs and nightclubs in Bali in October 2002, and in Mombasa one month later, were inaugural moments in the post-9/11 securitization of the tourism industry. Although practices of tourism and terrorism seem antithetical – one devoted to travel and leisure, the other to political violence – this article argues that their entanglement is revealed most clearly in the counter-terrorism responses that brought the everyday lives of tourists and tourism workers, as well as the material infrastructure of the tourism industry, within the orbit of a global security apparatus waging a ‘war on terror’. Drawing on critical work in international relations and geography, this article understands the securitization of tourism as part of a much wider logic in which the liberal order enacts pernicious modes of governance by producing a terrorist threat that is exceptional. It explores how this logic is reproduced through a cosmopolitan community symbolized by global travellers, and examines the measures taken by the tourism industry to secure this community (e.g. the physical transformations of hotel infrastructure and the provision of counter-terrorism training).
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.
Resumo:
Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.
Resumo:
This publication traces how asylum seekers are repositioned in the existing European asylum legislation from asylum seekers as victims in need of protection, to criminals . It is argued that this is due to the European legislation concerning the area of freedom, security and justice. The latest asylum legislation seems to undermine the refugee status which -as it is widely known- is safeguarded by the 1951 Geneva Convention relating to the Status of Refugees and its relevant 1967 Protocol. Additionally, in this paper the role of social workers and other social scientists to protect the rights of asylum seekers and question the existing legislation is presented.
Resumo:
On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.
Resumo:
At the formation of the new Republic of Ireland, the construction of new infrastructures was seen as an essential element in the building of the new nation, just as the adoption of international style modernism in architecture was perceived as a way to escape the colonial past. Accordingly, infrastructure became the physical manifestation, the concrete identity of these objectives and architecture formed an integral part of this narrative. Moving between scales and from artefact to context, Infrastructure and the Architectures of Modernity in Ireland 1916-2016 provides critical insights and narratives on what is a complex and hitherto overlooked landscape, one which is often as much international as it is Irish. In doing so, it explores the interaction between the universalising and globalising tendencies of modernisation on one hand and the textures of local architectures on the other.
The book shows how the nature of technology and infrastructure is inherently cosmopolitan. Beginning with the building of the heroic Shannon hydro-electric facility at Ardnacrusha by the German firm of Siemens-Schuckert in the first decade of independence, Ireland became a point of varying types of intersection between imported international expertise and local need. Meanwhile, at the other end of the century, by the year 2000, Ireland had become one of the most globalized countries in the world, site of the European headquarters of multinationals such as Google and Microsoft. Climatically and economically expedient to the storing and harvesting of data, Ireland has subsequently become a repository of digital information farmed in large, single-storey sheds absorbed into anonymous suburbs. In 2013, it became the preferred site for Intel to design and develop its new microprocessor chip: the Galileo. The story of the decades in between, of shifts made manifest in architecture and infrastructure from the policies of economic protectionism, to the opening up of the country to direct foreign investment and the embracing of the EU, is one of the influx of technologies and cultural references into a small country on the edges of Europe as Ireland became both a launch-pad and testing ground for a series of aspects of designed modernity.
Resumo:
The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.