2 resultados para Protection barriers
em Research Open Access Repository of the University of East London.
Resumo:
A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.
Resumo:
Three decades in to the HIV pandemic, the issues affecting people with disabilities remains less known. Increasing attention has been given to this overlooked population when it comes to HIV prevention, treatment and care. This is related to the significant unmet sexual and reproductive health care needs facing people with disabilities worldwide. This article discusses the barriers to sexual health for people with disabilities in Africa, and presents an argument about how mainstream HIV prevention work and research does not adequately attend to the sorts of systemic barriers that exclude people with disabilities, which a more targeted, and critical approach could.