10 resultados para cyberspace


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Put in place to protect the rights of the child, the Convention on the Rights of the Child is a set of non-negotiable standards. A core principle underpinning the Convention is the child's right to participate fully in social arenas and to access sources of social support without excessive interference. Juxtaposing this is the right of the child to be shielded from harm, abuse and exploitation. Over the past several decades the Internet has emerged as a fast and easily accessible medium for people to connect and communicate. While the Internet provides children with a source of support through chat rooms, online communities and social networking sites, just as equally it can expose vulnerable children to predatory and deviant individuals exacerbating the potential for harm. Upholding the Convention in cyberspace is a challenge. The Internet is not owned or regulated by any governing body and accountability is difficult to enforce. This article discusses some of the difficulties of upholding the Convention online and provides recommendations for policy-makers to protect children as they participate in cyberspace.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article discusses a trial electronic exchange project developed between social work education departments in the Republic of Ireland and the USA. It outlines the contemporary significance and challenges of integrating global content into national social work curricula, which are often strongly tied to statutory or accreditation requirements. The mechanics of the exchange are explained and critiqued in detail. An illustrative example of how the transnational students discussed two questions is analyzed. The article finds that an international electronic exchange has great potential to make global social work real to students by allowing them to cross borders through cyberspace, however it requires careful planning and attention to cultural and educational system differences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increased construction and reconstruction of smart substations has exposed a problem with version management of substation configuration description language (SCL) files due to frequent changes. This paper proposes a comparative approach for differentiation of smart substation SCL configuration files. A comparison model for SCL configuration files is built in this method, which is based on the SCL structure and abstract model defined by IEC 61850. The proposed approach adopts the algorithms of depth-first traversal, sorting, and cross comparison in order to rapidly identify differences of changed SCL configuration files. This approach can also be utilized to detect malicious tampering or illegal manipulation tailoring for SCL files. SCL comparison software is developed using the Qt platform to validate the feasibility and effectiveness of the proposed approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As modern power grids move towards becoming a smart grid, there is an increasing reliance on the data that is transmitted and processed by ICT systems. This reliance introduces new digital attack vectors. Many of the proposed approaches that aim to address this problem largely focus on applying well-known ICT security solutions. However, what is needed are approaches that meet the complex concerns of the smart grid as a cyber-physical system. Furthermore, to support the automatic control loops that exist in a power grid, similarly automatic security and resilience mechanisms are needed that rely on minimal operator intervention. The research proposed in this paper aims to develop a framework that ensures resilient smart grid operation in light of successful cyber-attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the development and deployment of IEC 61850 based smart substations, cybersecurity vulnerabilities of supervisory control and data acquisition (SCADA) systems are increasingly emerging. In response to the emergence of cybersecurity vulnerabilities in smart substations, a test-bed is indispensable to enable cybersecurity experimentation. In this paper, a comprehensive and realistic cyber-physical test-bed has been built to investigate potential cybersecurity vulnerabilities and the impact of cyber-attacks on IEC 61850 based smart substations. This test-bed is close to a real production type environment, and has the ability to carry out end-to-end testing of cyber-attacks and physical consequences. A fuzz testing approach is proposed for detecting IEC 61850 based intelligent electronic devices (IEDs) and validated in the proposed test-bed.