181 resultados para cyber-terrorism


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 2012 killing of three French soldiers and four Jewish civilians by a 23-year-old petty criminal turned neojihadist simultaneously manifested some of contemporary French society's worst fears, namely the radicalisation of its youth and home-grown terrorism. The attacks were the final step in Mohamed Merah's radicalisation, a process influenced during his family, accelerated during his time in prison and nurtured by divides within French society. This article aims to shed light on his radicalisation by examining the social and familial milieux he grew up in and the impact incarceration had on his identity and beliefs. More broadly, this article will demonstrate how in a country where the ultra-Right's hijacking of the Republican notion of secularity or laïcité is leading to an increasingly divided society, neojihadism is providing some Muslim youth with an alternative source of identity.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Around one billion people access the Internet using their mobile phones today, and many of the mobile phones are prone to be compromised by hackers due to their inherited vulnerability. It is critical to identify these compromised mobile phones to effectively eliminate cyber attacks. However, we see few research works in the field. In order to address this desperate situation, we design a practical traceback framework to identify active compromised mobiles in the mobile Internet environment in this letter. In the proposed framework, we creatively use the IMEI number of mobile hardware as unique marks for the traceback purpose. Two-layer traceback tables are designed to collect global attack information and identify local attacking bots, respectively. Our analysis and simulation demonstrate that the proposed traceback method is effective and feasible, and it can identify every possible attacking mobile in the current mobile Internet environment with single packet marking.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In large-scale systems, user authentication usually needs the assistance from a remote central authentication server via networks. The authentication service however could be slow or unavailable due to natural disasters or various cyber attacks on communication channels. This has raised serious concerns in systems which need robust authentication in emergency situations. The contribution of this paper is two-fold. In a slow connection situation, we present a secure generic multi-factor authentication protocol to speed up the whole authentication process. Compared with another generic protocol in the literature, the new proposal provides the same function with significant improvements in computation and communication. Another authentication mechanism, which we name stand-alone authentication, can authenticate users when the connection to the central server is down. We investigate several issues in stand-alone authentication and show how to add it on multi-factor authentication protocols in an efficient and generic way.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The nexus between religion and violence has been widely debated in the public sphere at the turn of the twenty-first century. Much of these discourses have centered on direct violence, and on terrorism in particular. Yet, structural violence also remains endemic within many religious traditions, including Buddhism. Buddhist women, and men, continue to challenge these gender inequalities in various ways, notably Sakyadita, the International Association of Buddhist Women founded in 1987, is committed to improving conditions for Buddhist women worldwide. This article investigates how Sakyadhita is promoting gender equity in global Buddhism. It explores Sakyadhita’s origin, and focuses on the 13th Sakyadhita Conference, to examine the role of religious social movements in advancing gender parity. It also proposes an innovative ultramodern Buddhism framework for understanding contemporary global Buddhism, building on existing Buddhist studies, critical feminist and sociological theories. While focused on a Buddhist women’s social movement, this article provides new knowledge that may assist diverse religious communities in addressing gender disparities both locally and internationally.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The vision of a smart grid is to provide a modern, resilient, and secure electric power grid as it boasts up with a highly reliable and efficient environment through effective use of its information and communication technology (ICT). Generally, the control and operation of a smart grid which integrate the distributed energy resources (DERs) such as, wind power, solar power, energy storage, etc., largely depends on a complex network of computers, softwares, and communication infrastructure superimposed on its physical grid architecture facilitated with the deployment of intelligent decision support system applications. In recent years, multi-agent system (MAS) has been well investigated for wide area power system applications and specially gained a significant attention in smart grid protection and security due to its distributed characteristics. In this chapter, a MAS framework for smart grid protection relay coordination is proposed, which consists of a number of intelligent autonomous agents each of which are embedded with the protection relays. Each agent has its own thread of control that provides it with a capability to operate the circuit breakers (CBs) using the critical clearing time (CCT) information as well as communicate with each other through high speed communication network. Besides physical failure, since smart grid highly depends on communication infrastructure, it is vulnerable to several cyber threats on its information and communication channel. An attacker who has knowledge about a certain smart grid communication framework can easily compromise its appliances and components by corrupting the information which may destabilize a system results a widespread blackout. To mitigate such risk of cyber attacks, a few innovative counter measuring techniques are discussed in this chapter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The potential for criminals and terrorism financiers to secure lucrativegovernment contracts poses a risk to Australia’s anti-money laundering,anti-corruption and counter-terrorism financing objectives. This articlecompares the customer due diligence measures that banks are required to implement to prevent money laundering and terrorism financing with the general supplier due diligence practices and processes of key Australian government departments and agencies. It identifies various weaknesses in current procurement practices relating to standard contracts and argues that these render Australian public procurement vulnerable to criminal abuse, threaten compliance with its sanctions regime and potentially undermine the crime combating objectives of its money laundering and terrorism financinglaws. The article recommends that the national interest calls for awhole-of-government approach to improve supplier due diligence in public procurement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hanif Kureishi: Contemporary Critical Perspectives brings together leading scholars of contemporary British fiction and culture to reassess the full range of the author's writings, from novels such as The Black Album, My Son the Fanatic and Something to Tell You to films such as Sammy and Rosie Get Laid, My Son the Fanatic and Venus. As well as exploring Kureishi's handling of such themes as Thatcherism, terrorism, race, class and sexuality, the book move moves beyond sociological and psychoanalytical approaches, examining the stylistic features of his most recent novel, The Last Word. The volume includes interviews with Stephen Frears, the director of My Beautiful Launderette, and with Hanif Kureishi himself, as well as a foreword by Roger Michell, who has directed several of the author's screenplays, most recently Le Week-End.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The public intellectual, by their very definition, aims to reach a large sector of the public or publics. This requires proficiency, or at least the capacity to communicate in a variety of forms. As a large proportion of the public, to which the public intellectual appeals, is an online or cyber public, the importance of blogs in a computer-literate public cannot be under-estimated. The immediacy of the blog and the way in which an online presence facilitates immediate communication between the public and the public intellectual through the posting of comments online allow for a broad recognition of the intellectual in the public arena. My arguments will hinge on my interviews with contemporary American public intellectuals (Noam Chomsky, Howard Zinn, Todd Gitlin, Camille Paglia and Stephen Greenblatt) and their views on communication in a society experiencing a decline in the publication of print media.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PEN Melbourne has produced two essays that examine deep concerns around recent legislative challenges to freedom of expression in Australia. In this second essay, Dr Ben Eltham interrogates and responds to the Australian government’s recently introduced ‘anti-terror legislation’ and the ‘metadata bill’.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

© 2015, IGI Global. The chapter investigates the security and ethical issues relating to privacy and security. This chapter also examines the ethical issues of new forms of bullying that are being played out weekly in the media: cyber bulling, specifically on SNS such as Facebook. The traditional and direct forms of bullying are being replaced by consistent abuse via SNS due to the ease and accessibility of these new forms of communications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the development of the cyber-physical systems (CPS), the security analysis of the data therein becomes more and more important. Recently, due to the advantage of joint encryption and compression for data transmission in CPS, the emerging compressed sensing (CS)-based cryptosystem has attracted much attention, where security is of extreme importance. The existing methods only analyze the security of the plaintext under the assumption that the key is absolutely safe. However, for sparse plaintext, the prior sparsity knowledge of the plaintext could be exploited to partly retrieve the key, and then the plaintext, from the ciphertext. So, the existing methods do not provide a satisfactory security analysis. In this paper, it is conducted in the information theory frame, where the plaintext sparsity feature and the mutual information of the ciphertext, key, and plaintext are involved. In addition, the perfect secrecy criteria (Shannon-sense and Wyner-sense) are extended to measure the security. While the security level is given, the illegal access risk is also discussed. It is shown that the CS-based cryptosystem achieves the extended Wyner-sense perfect secrecy, but when the key is used repeatedly, both the plaintext and the key could be conditionally accessed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vehicular Cyber-Physical System (VCPS) provides CPS services via exploring the sensing, computing and communication capabilities on vehicles. VCPS is deeply influenced by the performance of the underlying vehicular network with intermittent connections, which make existing routing solutions hardly to be applied directly. Epidemic routing, especially the one using random linear network coding, has been studied and proved as an efficient way in the consideration of delivery performance. Much pioneering work has tried to figure out how epidemic routing using network coding (ERNC) performs in VCPS, either by simulation or by analysis. However, none of them has been able to expose the potential of ERNC accurately. In this paper, we present a stochastic analytical framework to study the performance of ERNC in VCPS with intermittent connections. By novelly modeling ERNC in VCPS using a token-bucket model, our framework can provide a much more accurate results than any existing work on the unicast delivery performance analysis of ERNC in VCPS. The correctness of our analytical results has also been confirmed by our extensive simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Botnets have become major engines for malicious activities in cyberspace nowadays. To sustain their botnets and disguise their malicious actions, botnet owners are mimicking legitimate cyber behavior to fly under the radar. This poses a critical challenge in anomaly detection. In this paper, we use web browsing on popular web sites as an example to tackle this problem. First of all, we establish a semi-Markov model for browsing behavior. Based on this model, we find that it is impossible to detect mimicking attacks based on statistics if the number of active bots of the attacking botnet is sufficiently large (no less than the number of active legitimate users). However, we also find it is hard for botnet owners to satisfy the condition to carry out a mimicking attack most of the time. With this new finding, we conclude that mimicking attacks can be discriminated from genuine flash crowds using second order statistical metrics. We define a new fine correntropy metrics and show its effectiveness compared to others. Our real world data set experiments and simulations confirm our theoretical claims. Furthermore, the findings can be widely applied to similar situations in other research fields.