37 resultados para TERRORIST ATTACKS
Resumo:
L'objectiu d'aquest projecte és dissenyar i implementar una utilitat que permeti xifrar (i posteriorment desxifrar) carpetes i fitxers fent servir claus basades en contrasenyes, la qual haurà de ser informada per l'usuari. Aquesta relació entre clau i contrasenya haurà de garantir que el sistema sigui prou segur davant d'atacs criptogràfics.
Resumo:
This paper estimates the effect of piracy attacks on shipping costs using a unique data set on shipping contracts in the dry bulk market. We look at shipping routes whose shortest path exposes them to piracy attacks and find that the increase in attacks in 2008 lead to around a ten percent increase in shipping costs. We use this estimate to get a sense of the welfare loss imposed by piracy. Our intermediate estimate suggests that the creation of $120 million of revenue for pirates in the Somalia area led to a welfare loss of over $1.5 billion.
Resumo:
This working – paper will be focused on three key issues: • How will affect the enlargement to the Justice and Home Affairs Cooperation. Especially, the absortion of Schenguen Agreements and the overall JHA by the candidate countries. • The enlargement impact over the European Immigraton Policy and the specific policies carried out by the EU Member States. The main question is the free movement of persons safeguard, in order to protect external borders of European Union. • An analysis of September, 11 attacks against U.S.A might be necessary to understand the future changes on JHA policy.
Resumo:
Cobre Las Cruces is a renowned copper mining company located in Sevilla, with unexpected problems in wireless communications that have a direct affectation in production. Therefore, the main goals are to improve the WiFi infrastructure, to secure it and to detect and prevent from attacks and from the installation of rogue (and non-authorized) APs. All of that integrated with the current ICT infrastructure.This project has been divided into four phases, although only two of them have been included into the TFC; they are the analysis of the current situation and the design of a WLAN solution.Once the analysis part was finished, some weaknesses were detected. Subjects such as lack of connectivity and control, ignorance about installed WiFi devices and their localization and state and, by and large, the use of weak security mechanisms were some of the problems found. Additionally, due to the fact that the working area became larger and new WiFi infrastructures were added, the first phase took more time than expected.As a result of the detailed analysis, some goals were defined to solve and it was designed a centralized approach able to cope with them. A solution based on 802.11i and 802.1x protocols, digital certificates, a probe system running as IDS/IPS and ligthweight APs in conjunction with a Wireless LAN Controller are the main features.
Resumo:
For the last decade Europe has perceived itself to be under a constant threat from jihadistinspired terrorism. Terrorist organizations motivated by other ideologies are still active throughout the European Union, but the 2010 Europol annual report clearly states that “Islamist terrorism is still perceived as the biggest threat to most Member States,” and statements from the highest-ranking officials in most European countries confirm this observation (EUROPOL, 2010, p. 6). Authorities base their assessment on the extensive intelligence and investigative activities directed against jihadist networks taking place in virtually every European country. On average, in fact, European authorities arrest some 200 individuals and thwart a handful of plots of jihadist inspiration every year (EUROPOL, 2009). Keeping the global scenario in mind, European authorities deem this dynamic likely to continue in the foreseeable future.
Resumo:
El propòsit d'aquesta investigació és conèixer, descriure i interpretar el sistema educatiu palestí per saber si una situació de conflicte afecta -i en quina mesura- el funcionament, estructura, resultats i comprensió del concepte educatiu en una regió. Per assolir-ho, s'ha cercat informació bibliogràfica en diferents fonts, a més de la observació in situ de la realitat educativa palestina, fent entrevistes a diferents agents de la regió. Cal esmentar que el treball teòric és general però la descripció pràctica és contextualitzada a Nablus, una ciutat de Cisjordània. Els resultats obtinguts en aquesta investigació educativa de la branca de l'Educació Comparada han estat diversos, concretar-se en diferents conclusions: les conseqüències d'una guerra silenciosa que fa més de 60 anys que es perllonga en el temps implica dificultats econòmiques i administratives que afecten directament al sistema educatiu de la regió; objectius del govern palestí encarats a desenvolupar la població amb una aplicació pràctica real que els acompleix; importància de l'imaginari social de la nació per comprendre la importància del concepte d'Educació i les accions i atacs que rep aquest concepte per part de l'Estat d'Israel i on la comunitat internacional no es posiciona; la necessitat de crear un Estat Independent Palestí
Resumo:
The first generation models of currency crises have often been criticized because they predict that, in the absence of very large triggering shocks, currency attacks should be predictable and lead to small devaluations. This paper shows that these features of first generation models are not robust to the inclusion of private information. In particular, this paper analyzes a generalization of the Krugman-Flood-Garber (KFG) model, which relaxes the assumption that all consumers are perfectly informed about the level of fundamentals. In this environment, the KFG equilibrium of zero devaluation is only one of many possible equilibria. In all the other equilibria, the lack of perfect information delays the attack on the currency past the point at which the shadow exchange rate equals the peg, giving rise to unpredictable and discrete devaluations.
Resumo:
This paper presents a case study of a well-informed investor in the South Sea bubble. We argue that Hoare's Bank, a fledgling West End London banker, knew that a bubble was in progress and nonetheless invested in the stock; it was profitable to "ride the bubble." Using a unique dataset on daily trades, we show that this sophisticated investor was not constrained by institutional factors such as restrictions on short sales or agency problems. Instead, this study demonstrates that predictable investor sentiment can prevent attacks on a bubble; rational investors may only attack when some coordinating event promotes joint action.
Resumo:
This chapter, originally written as a consequence of the terrorist attacksof September 11, 2001, provides an elementary, everyday introduction tothe concepts of risk and insurance. Conceptually, risk has two dimensions:a potential loss, and the chance of that loss being realized. People can,however, transfer risk to insurance companies against the payment ofso-called premiums. In practice, however, one needs accurate assessmentsof both losses and probabilities to judge whether premiums are appropriate.For many risks, this poses little problem (e.g., life insurance); however,it is difficult to assess risks of many other kinds of events such as actsof terrorism. It is emphasized, that through evolution and learning, peopleare able to handle many of the common risks that they face in life. Butwhen people lack experience (e.g., new technologies, threats of terrorism),risk can only be assessed through imagination. Not surprisingly, insurancecompanies demand high prices when risks are poorly understood. In particular,the cost of insurance against possible acts of terrorism soared afterSeptember 11. How should people approach risk after the events of that day?Clearly, the world needs to protect itself from the acts of terrorists andother disturbed individuals. However, it is also important to address the root causes of such antisocial movements. It is, therefore, suggested thatprograms addressed at combatting ignorance, prejudice, and socialinequalities may be more effective premiums for reducing the risk ofterrosrtism than has been recognized to date.
Resumo:
Este artículo pretende estudiar la relación entre periodistas y políticos en situacionescríticas. Los autores han analizado la información emitida por las cadenas de televisión:Televisión Española, Antena 3 y Tele 5 en los días 11, 12 y 13 de marzo de 2004, coincidiendocon el atentado de Madrid. De esta investigación, se concluye que los periodistasactuaron con poca capacidad crítica, en connivencia con los políticos, en la propagaciónde determinadas tesis poco o nada argumentadas y de ciertos tópicos y expresionesgratuitas.
Resumo:
Many audio watermarking schemes divide the audio signal into several blocks such that part of the watermark is embedded into each of them. One of the key issues in these block-oriented watermarking schemes is to preserve the synchronisation, i.e. to recover the exact position of each block in the mark recovery process. In this paper, a novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the Discrete Fourier Transform (DFT or FFT) domain. The combined scheme provides excellent imperceptibility results whilst achieving robustness against typical attacks. Furthermore, the execution of the scheme is fast enough to be used in real-time applications. The excellent transparency of the embedding algorithm makes it particularly useful for professional applications, such as the embedding of monitoring information in broadcast signals. The scheme is also compared with some recent results of the literature.
Resumo:
Cognitive radio is a wireless technology aimed at improvingthe efficiency use of the radio-electric spectrum, thus facilitating a reductionin the load on the free frequency bands. Cognitive radio networkscan scan the spectrum and adapt their parameters to operate in the unoccupiedbands. To avoid interfering with licensed users operating on a givenchannel, the networks need to be highly sensitive, which is achieved byusing cooperative sensing methods. Current cooperative sensing methodsare not robust enough against occasional or continuous attacks. This articleoutlines a Group Fusion method that takes into account the behavior ofusers over the short and long term. On fusing the data, the method is basedon giving more weight to user groups that are more unanimous in their decisions.Simulations have been performed in a dynamic environment withinterferences. Results prove that when attackers are present (both reiterativeor sporadic), the proposed Group Fusion method has superior sensingcapability than other methods.
Resumo:
This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.
Resumo:
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
Resumo:
La radio cognitiva es una tecnología inalámbrica propuesta para usar eficientemente los recursos del espectro radioeléctrico permitiendo así reducir la carga existente en las bandas de frecuencia de uso libre.Las redes de radio cognitiva son capaces de escanear el espectro y adaptar sus parámetros para operar en las bandas no ocupadas. Para evitar interferir con usuarios con licencia que operan en un determinado canal, la sensibilidad de las redes tiene que ser muy alta. Ello se consigue con métodos de detección cooperativos. Los métodos de detección cooperativa actuales tienen una carencia de robustez ya sea frente a ataques puntuales o continuos.En este artículo presentamos un método de fusión por grupos que tiene presente el comportamiento de los usuarios a corto y largo plazo. Al realizar la fusión de los datos, el método se basa en dar mayor peso a los grupos de usuarios con mayor unanimidad en sus decisiones.Los resultados de las simulaciones prueban que en presencia de atacantes el método de fusión por grupos propuesto consigue una detección superior a otros métodos, cumpliendo los requisitos de sensibilidad mínimos de las redes de radio cognitiva incluso con un 12 de usuarios reiteradamente maliciosos o un 10 de atacantes puntuales.