684 resultados para Cyber-rencontre
Resumo:
The main drivers for the development and evolution of Cyber Physical Systems (CPS) are the reduction of development costs and time along with the enhancement of the designed products. The aim of this survey paper is to provide an overview of different types of system and the associated transition process from mechatronics to CPS and cloud-based (IoT) systems. It will further consider the requirement that methodologies for CPS-design should be part of a multi-disciplinary development process within which designers should focus not only on the separate physical and computational components, but also on their integration and interaction. Challenges related to CPS-design are therefore considered in the paper from the perspectives of the physical processes, computation and integration respectively. Illustrative case studies are selected from different system levels starting with the description of the overlaying concept of Cyber Physical Production Systems (CPPSs). The analysis and evaluation of the specific properties of a sub-system using a condition monitoring system, important for the maintenance purposes, is then given for a wind turbine.
Resumo:
Critical infrastructures are based on complex systems that provide vital services to the nation. The complexities of the interconnected networks, each managed by individual organisations, if not properly secured, could offer vulnerabilities that threaten other organisations’ systems that depend on their services. This thesis argues that the awareness of interdependencies among critical sectors needs to be increased. Managing and securing critical infrastructure is not isolated responsibility of a government or an individual organisation. There is a need for a strong collaboration among critical service providers of public and private organisations in protecting critical information infrastructure. Cyber exercises have been incorporated in national cyber security strategies as part of critical information infrastructure protection. However, organising a cyber exercise involved multi sectors is challenging due to the diversity of participants’ background, working environments and incidents response policies. How well the lessons learned from the cyber exercise and how it can be transferred to the participating organisations is still a looming question. In order to understand the implications of cyber exercises on what participants have learnt and how it benefits participants’ organisation, a Cyber Exercise Post Assessment (CEPA) framework was proposed in this research. The CEPA framework consists of two parts. The first part aims to investigate the lessons learnt by participants from a cyber exercise using the four levels of the Kirkpatrick Training Model to identify their perceptions on reaction, learning, behaviour and results of the exercise. The second part investigates the Organisation Cyber Resilience (OCR) of participating sectors. The framework was used to study the impact of the cyber exercise called X Maya in Malaysia. Data collected through interviews with X Maya 5 participants were coded and categorised based on four levels according to the Kirkpatrick Training Model, while online surveys distributed to ten Critical National Information Infrastructure (CNII) sectors participated in the exercise. The survey used the C-Suite Executive Checklist developed by World Economic Forum in 2012. To ensure the suitability of the tool used to investigate the OCR, a reliability test conducted on the survey items showed high internal consistency results. Finally, individual OCR scores were used to develop the OCR Maturity Model to provide the organisation cyber resilience perspectives of the ten CNII sectors.
Resumo:
This thesis presents security issues and vulnerabilities in home and small office local area networks that can be used in cyber-attacks. There is previous research done on single vulnerabilities and attack vectors, but not many papers present full scale attack examples towards LAN. First this thesis categorizes different security threads and later in the paper methods to launch the attacks are shown by example. Offensive security and penetration testing is used as research methods in this thesis. As a result of this thesis an attack is conducted using vulnerabilities in WLAN, ARP protocol, browser as well as methods of social engineering. In the end reverse shell access is gained to the target machine. Ready-made tools are used in the attack and their inner workings are described. Prevention methods are presented towards the attacks in the end of the thesis.
Resumo:
The increasing dependency of everyday life on mobile devices also increases the number and complexity of computing tasks to be supported by these devices. However, the inherent requirement of mobility restricts them from being resources rich both in terms of energy (battery capacity) and other computing resources such as processing capacity, memory and other resources. This thesis looks into cyber foraging technique of offloading computing tasks. Various experiments on android mobile devices are carried out to evaluate offloading benefits in terms of sustainability advantage, prolonging battery life and augmenting the performance of mobile devices. This thesis considers two scenarios of cyber foraging namely opportunistic offloading and competitive offloading. These results show that the offloading scenarios are important for both green computing and resource augmentation of mobile devices. A significant advantage in battery life gain and performance enhancement is obtained. Moreover, cyber foraging is proved to be efficient in minimizing energy consumption per computing tasks. The work is based on scavenger cyber foraging system. In addition, the work can be used as a basis for studying cyber foraging and other similar approaches such as mobile cloud/edge computing for internet of things devices and improving the user experiences of applications by minimizing latencies through the use of potential nearby surrogates.
Resumo:
Cybercrime is a growing and worrisome problem, particularly when it involves minors. Cyber-aggression among adolescents in particular can result in negative legal and psychological consequences for people involved. Therefore, it is important to have instruments to detect these incidents early and understand the problem to propose effective measures for prevention and treatment. This paper aims to design a new self-report, the Cyber-Aggression Questionnaire for Adolescents (CYBA), to evaluate the extent to which the respondent conducts aggressions through a mobile phone or the internet and analyse the factorial and criterion validity and reliability of their scores in a sample of adolescents from Asturias, Spain. The CYBA was administered to 3,148 youth aged between 12 and 18 years old along with three self-reports to measure aggression at school, impulsivity, and empathy. Regarding factorial validity, the model that best represents the structure of the CYBA consists of three factors (Impersonation, Visual-sexual Cyber-aggression, and Verbal Cyber-aggression and Exclusion) and four additional indicators of Visual Cyber-aggression-Teasing/Happy Slapping. Regarding criterion validity, the score on the CYBA correlates positively with aggression at school and impulsivity and negatively with empathy. That is the way cyber-aggression correlates with these three variables, according to previous empirical evidence. The reliability of the scores on each item and factor of the CYBA are adequate. Therefore, the CYBA offers a valid and reliable measure of cyber-aggression in adolescents.
Resumo:
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente denominado como ciberespaço – tem um lado negro. Este lado negro tem várias dimensões, nomeadamente perda de produtividade, crime financeiro, furto de propriedade intelectual, de identidade, bullying e outros. Empresas, governos e outras entidades são cada vez mais alvo de ataques de terceiros com o fim de penetrarem as suas redes de dados e sistemas de informação. Estes vão desde os adolescentes a grupos organizados e extremamente competentes, sendo existem indicações de que alguns Estados têm vindo a desenvolver “cyber armies” com capacidades defensivas e ofensivas. Legisladores, políticos e diplomatas têm procurado estabelecer conceitos e definições, mas apesar da assinatura da Convenção do Conselho da Europa sobre Cibercrime em 2001 por vários Estados, não existiram novos desenvolvimentos desde então. Este artigo explora as várias dimensões deste domínio e enfatiza os desafios que se colocam a todos aqueles que são responsáveis pela proteção diária da informação das respetivas organizações contra ataques de origem e objetivos muitas vezes desconhecidos.
Resumo:
Part 7: Cyber-Physical Systems
Resumo:
Part 7: Cyber-Physical Systems
Resumo:
La sorveglianza di massa è sempre più utilizzata ai fini dell'anti-terrorismo e determina necessariamente una limitazione della protezione dei dati personali e l'intrusione nella sfera privata. Ovviamente non abbiamo la presunzione di pensare di poter trovare una soluzione al problema terrorismo, o anche al continuo contrasto tra terrorismo e privacy. Lo scopo di questa tesi è principalmente quello di analizzare cosa è stato fatto negli ultimi anni (più precisamente dal 2001 ad oggi), capire perché i governi sono stati finora “inefficienti” e cosa potrebbe succedere nel prossimo futuro.
Resumo:
Developing Cyber-Physical Systems requires methods and tools to support simulation and verification of hybrid (both continuous and discrete) models. The Acumen modeling and simulation language is an open source testbed for exploring the design space of what rigorousbut- practical next-generation tools can deliver to developers of Cyber- Physical Systems. Like verification tools, a design goal for Acumen is to provide rigorous results. Like simulation tools, it aims to be intuitive, practical, and scalable. However, it is far from evident whether these two goals can be achieved simultaneously. This paper explains the primary design goals for Acumen, the core challenges that must be addressed in order to achieve these goals, the “agile research method” taken by the project, the steps taken to realize these goals, the key lessons learned, and the emerging language design.
Resumo:
Cet essai est divisé en quatre chapitres et porte sur la conception, l'expérimentation et l'adaptation d'un modèle de rédaction d'un manuel de référence de facture constructiviste. Cette modélisation servira de guide à la rédaction d'un manuel en santé dentaire publique à l'intention des étudiantes) en techniques d'hygiène dentaire. L'hygiéniste dentaire en santé publique travaille prioritairement auprès des enfants et de leur milieu familial. Elle fait partie intégrante d'un programme national de santé dentaire publique établi à l'intérieur de chaque Centre de santé et services sociaux. Au Québec, les enfants les plus vulnérables à la carie dentaire sont de l'ordre de 25 % et cumulent à eux seuls plus de 65 % des problèmes de carie dentaire (Payette et coll., 1989). C'est à partir d'un programme créé par le ministère de la Santé et des Services sociaux que l'hygiéniste dentaire procède à un dépistage scientifique qui lui permet de prédire que certains enfants seront susceptibles à la carie dentaire avant même l'apparition des dents permanentes et de classer ces enfants. Par la suite, ces enfants, parmi les plus vulnérables, sont suivis pour changer le cours de leur histoire dentaire et leur permettre d'avoir la même chance que leurs camarades. Ces rencontres de suivi visent à sensibiliser l'enfant et les parents à l'hygiène buccodentaire ainsi qu'à l'application de la thérapie clinique à l'école (applications de fluorure, d'agents de scellement des dents, etc.). Selon les particularités de chaque région du Québec, les hygiénistes dentaires interviendront auprès de différentes clientèles. Bien que la majorité des diplômées en techniques d'hygiène dentaire exerceront leur profession en clinique privée, quelques finissantes travailleront dans les CSSS. Pour permettre aux étudiantes d'acquérir la compétence en santé dentaire publique, le programme de formation prévoit un cours et un stage totalisant environ 135 heures réparties sur deux trimestres, selon la spécificité propre à chaque collège. À Saint-Hyacinthe, le cours et les laboratoires sont d'une durée de 90 heures. Le stage de 45 heures est effectué en majeure partie auprès des hygiénistes dentaires des CSSS. On peut aisément conclure que le nombre d'heures prévu au programme est à peine suffisant face à la complexité de la tâche et au type de responsabilités que l'hygiéniste dentaire doit assumer en santé publique et comprendre l'importance d'offrir un outil de référence complet et adapté à l'apprentissage et aux besoins du marché du travail. Le présent ouvrage est divisé en quatre parties permettant une réflexion sur la possibilité d'intégrer une approche constructiviste à l'intérieur d'un manuel scolaire. La première partie traite d'abord notre cheminement à titre d'auteure de cet essai. Par la suite, elle expose la problématique à laquelle nous sommes confrontée à titre de rédactrice scientifique. Nous présenterons les compétences visées par le programme de la discipline concernée, l'écart ressenti avec la pratique en classe et l'écriture d'un manuel scolaire au collégial. Nous tenterons de dégager des étapes et des conditions à respecter pour en greffer ensuite un style d'écriture applicable dans une perspective constructiviste. La deuxième partie s'intéresse à la recension des écrits et dégage des définitions relatives au constructivisme. Elle couvre les fondements qui permettent d'entrevoir la possibilité d'écrire différemment le manuel scolaire. Le troisième chapitre concerne la méthodologie utilisée durant l'expérimentation didactique. Nous présentons le modèle choisi pour concevoir notre chapitre expérimental. Nous avons aussi sélectionné des activités à facture constructiviste. Nous avons présenté des principes pour appuyer l'écriture d'un manuel scolaire afin de dégager un modèle d'écriture constructiviste. Nous avons procédé à l'écriture du chapitre en conformité avec ces principes et nous avons vérifié la fécondité de cette écriture auprès d'expertes et d'étudiantes du milieu collégial. Dans le quatrième chapitre, la présentation et l'analyse des résultats font état de l'estimation d'une écriture constructiviste jugée souhaitable pour l'écriture de notre chapitre. La préoccupation centrale est de dégager des caractéristiques qui s'articulent autour de notre pratique constructiviste. Il s'agit aussi de discuter sur les possibilités d'application de ces principes en exposant sommairement les impacts d'un tel changement de paradigme de l'écriture.
Resumo:
John Frazer's architectural work is inspired by living and generative processes. Both evolutionary and revolutionary, it explores informatin ecologies and the dynamics of the spaces between objects. Fuelled by an interest in the cybernetic work of Gordon Pask and Norbert Wiener, and the possibilities of the computer and the "new science" it has facilitated, Frazer and his team of collaborators have conducted a series of experiments that utilize genetic algorithms, cellular automata, emergent behaviour, complexity and feedback loops to create a truly dynamic architecture. Frazer studied at the Architectural Association (AA) in London from 1963 to 1969, and later became unit master of Diploma Unit 11 there. He was subsequently Director of Computer-Aided Design at the University of Ulter - a post he held while writing An Evolutionary Architecture in 1995 - and a lecturer at the University of Cambridge. In 1983 he co-founded Autographics Software Ltd, which pioneered microprocessor graphics. Frazer was awarded a person chair at the University of Ulster in 1984. In Frazer's hands, architecture becomes machine-readable, formally open-ended and responsive. His work as computer consultant to Cedric Price's Generator Project of 1976 (see P84)led to the development of a series of tools and processes; these have resulted in projects such as the Calbuild Kit (1985) and the Universal Constructor (1990). These subsequent computer-orientated architectural machines are makers of architectural form beyond the full control of the architect-programmer. Frazer makes much reference to the multi-celled relationships found in nature, and their ongoing morphosis in response to continually changing contextual criteria. He defines the elements that describe his evolutionary architectural model thus: "A genetic code script, rules for the development of the code, mapping of the code to a virtual model, the nature of the environment for the development of the model and, most importantly, the criteria for selection. In setting out these parameters for designing evolutionary architectures, Frazer goes beyond the usual notions of architectural beauty and aesthetics. Nevertheless his work is not without an aesthetic: some pieces are a frenzy of mad wire, while others have a modularity that is reminiscent of biological form. Algorithms form the basis of Frazer's designs. These algorithms determine a variety of formal results dependent on the nature of the information they are given. His work, therefore, is always dynamic, always evolving and always different. Designing with algorithms is also critical to other architects featured in this book, such as Marcos Novak (see p150). Frazer has made an unparalleled contribution to defining architectural possibilities for the twenty-first century, and remains an inspiration to architects seeking to create responsive environments. Architects were initially slow to pick up on the opportunities that the computer provides. These opportunities are both representational and spatial: computers can help architects draw buildings and, more importantly, they can help architects create varied spaces, both virtual and actual. Frazer's work was groundbreaking in this respect, and well before its time.
Resumo:
Information and communication technologies (ICTs) had occupied their position on knowledge management and are now evolving towards the era of self-intelligence (Klosterman, 2001). In the 21st century ICTs for urban development and planning are imperative to improve the quality of life and place. This includes the management of traffic, waste, electricity, sewerage and water quality, monitoring fire and crime, conserving renewable resources, and coordinating urban policies and programs for urban planners, civil engineers, and government officers and administrators. The handling of tasks in the field of urban management often requires complex, interdisciplinary knowledge as well as profound technical information. Most of the information has been compiled during the last few years in the form of manuals, reports, databases, and programs. However frequently, the existence of these information and services are either not known or they are not readily available to the people who need them. To provide urban administrators and the public with comprehensive information and services, various ICTs are being developed. In early 1990s Mark Weiser (1993) proposed Ubiquitous Computing project at the Xerox Palo Alto Research Centre in the US. He provides a vision of a built environment which digital networks link individual residents not only to other people but also to goods and services whenever and wherever they need (Mitchell, 1999). Since then the Republic of Korea (ROK) has been continuously developed national strategies for knowledge based urban development (KBUD) through the agenda of Cyber Korea, E-Korea and U-Korea. Among abovementioned agendas particularly the U-Korea agenda aims the convergence of ICTs and urban space for a prosperous urban and economic development. U-Korea strategies create a series of U-cities based on ubiquitous computing and ICTs by a means of providing ubiquitous city (U-city) infrastructure and services in urban space. The goals of U-city development is not only boosting the national economy but also creating value in knowledge based communities. It provides opportunity for both the central and local governments collaborate to U-city project, optimize information utilization, and minimize regional disparities. This chapter introduces the Korean-led U-city concept, planning, design schemes and management policies and discusses the implications of U-city concept in planning for KBUD.
Resumo:
The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.
Resumo:
Children and adolescents now communicate online to form and/or maintain relationships with friends, family, and strangers. Relationships in “real life” are important for children’s and adolescents’ psychosocial development; however, they can be difficult for those who experience feelings of loneliness and/or social anxiety. The aim of this study was to investigate differences in usage of online communication patterns between children and adolescents with and without self-reported loneliness and social anxiety. Six hundred and twenty-six students aged between 10-16 years completed a survey on the amount of time they spent communicating online, the topics they discussed, the partners they engaged with, and their purposes for communicating over the Internet. Participants were administered a shortened version of the UCLA Loneliness Scale and an abbreviated sub-scale of the Social Anxiety Scale for Adolescents (SAS-A). Additionally, age and gender differences in usage of the aforementioned online communication patterns were examined across the entire sample. Findings revealed that children and adolescents who self-reported being lonely communicated online significantly more frequently about personal things and intimate topics than did those who did not self-report being lonely. The former were motivated to use online communication significantly more frequently to compensate for their weaker social skills to meet new people. Results suggest that Internet usage allows them to fulfill critical needs of social interactions, self-disclosure, and identity exploration. Future research, however, should explore whether or not the benefits derived from online communication may also facilitate lonely children’s and adolescents’ offline social relationships.