37 resultados para TERRORIST ATTACKS
Resumo:
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.
Resumo:
This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks usinga trustworthiness model based on a distributed certification authority. Digital signatures and hash chains are used to ensure the correctness of the protocol. The protocol is compared with other alternatives in terms of security strength, energy efficiency and time delay. Both computational and transmission costs are considered and it is shown that the secure protocol overhead is not a critical factor compared to the high network interface cost.
Resumo:
Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.
Resumo:
El uso de imágenes procedentes de sensores multiespectrales de resolución media como es el caso de Landsat TM ha sido ampliamente utilizado desde décadas para detectar, entre otras variables, el decaimiento y la defoliación provocada por plagas y enfermedades forestales. El presente trabajo evalúa la utilidad del uso de estas imágenes en la detección de rodales de pino laricio (Pinus nigra Arn.) y pino silvestre (Pinus sylvestris L.) afectados por escolítidos. El área de estudio se localizó en el Solsonés (prepirineo de Lleida) seleccionando 34 áreas de entrenamiento (17 rodales afectados por la plaga y 17 rodales sanos). El análisis exploratorio de las imágenes se realizó mediante el programa ERDAS® IMAGINE 8.x. Los resultados del estudio mostraron una significación espectral en 5 de las 7 bandas analizadas, siendo TM5 y TM7 las que mejor comportamiento presentaron. Los niveles digitales obtenidos y los espacios de características creados señalaron sendas tendencias al agrupamiento de rodales afectados versus sanos, consiguiéndose plantear mejoras en el procedimiento metodológico.
Resumo:
The Ebro Delta holds a large seabird community, including a common tern (Sterna hirundo) local population of 3,085 pairs in 2000 which breeds scattered in several colonies. At El Canalot colony, 1,178 (1999) and 1,156 pairs (2000) of this species bred distributed in 32 and 38 sub-colonies respectively. These sub-colonies varied in size from 1 to 223 pairs and were placed near the main breeding colonies of yellow-legged gulls (Larus cachinnans) and Audouin´s gulls (L. audouinii), which are potential egg-predators of terns. We studied egg predation during 1999 (6 sub-colonies) and 2000 (27 sub-colonies). Overall, we found that 10.6% of the nests in 1999 and 16.7% in 2000 suffered partial or total egg predation, being total in 81.1% of the predatory events. Predation was significantly higher in small sub-colonies (< 11 pairs): 49.4% in 1999 and 75.5% in 2000. Only attacks from yellow-legged gulls were observed, and defence behaviour of terns was significantly more frequent against this gull species (40.5 hours of observation), suggesting that in most cases the egg predation recorded was due to this species. Probability of egg predation was significantly and negatively correlated with distance to the nearest yellow-legged gull sub-colony, although this relationship was no more significant after adjustment for sub-colony size. On the other hand, distance to the nearest Audouin´s gull sub-colony did not show any effect. Our results suggest that the impact of large gulls (at least yellow-legged gulls) upon smaller seabirds breeding in the area might be important, especially when they are breeding in small sub-colonies. Further studies are needed to analyse the general impact of large gulls upon the breeding populations of other colonial bird species in the area.
Resumo:
Core capabilities are under the above mission areas as outlined in the National Preparedness Goal. Planning, Public Information and Warning, and Operational Coordination cut across all five mission areas. Without these three cross-cutting capabilities, the other capabilities might not be achieved or could be weakened. Other core capabilities are aligned under a specific mission area, based on where it had the most relevance. Core capabilities alignment: Prevention capabilities focus on things related to preventing an imminent terrorist attack; by imminent, we mean an attack that is about to happen ; Protection capabilities focus on security— making sure things, systems, and people are protected ; Mitigation capabilities focus on risk, resilience and building a culture of preparedness; Response capabilities focus on meeting a community’s immediate needs when disaster strikes and finally, recovery capabilities focus on getting communities back on their feet.
Resumo:
An efficient approach for organizing large ad hoc networks is to divide the nodesinto multiple clusters and designate, for each cluster, a clusterhead which is responsible forholding intercluster control information. The role of a clusterhead entails rights and duties.On the one hand, it has a dominant position in front of the others because it manages theconnectivity and has access to other node¿s sensitive information. But on the other hand, theclusterhead role also has some associated costs. Hence, in order to prevent malicious nodesfrom taking control of the group in a fraudulent way and avoid selfish attacks from suitablenodes, the clusterhead needs to be elected in a secure way. In this paper we present a novelsolution that guarantees the clusterhead is elected in a cheat-proof manner.