701 resultados para Political of security
Resumo:
Considerable time, research money and expertise has been spent exploring the complex reality of ethno nationalist conflict and the role that public management plays in supporting the transition from violent conflict to stability, order and prosperity (Esman 1999; Guelke and Milton-Edwards 2000; Brinkerhoff 2005; Brinkerhoff, Wetterberg et al. 2012; Rao 2014). However, there seems to be a gap in relation to the practical challenges of managing change within, through and beyond such conflict. This paper aims to begin the process of putting a framework around the real experience of public management in conflict and transition by shifting the lens of analysis from macros concerns about sequencing interventions (Rao 2014) and legitimate requirements of security, stability and service delivery (Brinkerhoff, Wetterberg et al. 2012) to a micro analysis of the attitudes, behaviours, challenges and compromises held and faced by those public servants on the front line of conflict management and conflict transformation processes. Using senior managers as the unit of analysis and Northern Ireland as an embryonic case study, this paper discusses the links between ethno nationalist societal conflict, public sector reform and manager behaviour. In doing so, it highlights some initial data from an early pilot study into the experiences of individuals in significant public service roles at various stages of the NI conflict / peace process and draws some tentative conclusions about the viability of a wider study.
Resumo:
This article assesses the effect that leveraging civilian defense force militias has on the dynamics of violence in civil war. We argue that the delegation of security and combat roles to local civilians shifts the primary targets of insurgent violence toward civilians, in an attempt to deter future defections, and re-establish control over the local population. This argument is assessed through an analysis of the Sunni Awakening and ancillary Sons of Iraq paramilitary program. The results suggest that at least in the Al-Anbar province of Iraq, the utilization of the civilian population in counterinsurgent roles had significant implications for the targets of insurgent violence.
Resumo:
Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.
Resumo:
A importância económica, social e política do setor do turismo é uma realidade inquestionável. A sua expressão e capacidade de induzir o desenvolvimento económico em termos de outros setores, é cada vez mais importante. Apesar da dinâmica demonstrada, o setor do turismo enfrenta uma série de problemas estruturais que devem ser resolvidos. Nos últimos anos, o turismo em Portugal tem vindo a crescer em quantidade, mas às vezes sem muita qualidade. O desempenho económico do setor deve ser devidamente analisado, desde a análise do número de entradas de visitantes até questões como o volume de receitas obtido. Para além disso, é possível observar a existência de casos de concentração espacial excessiva em certas áreas do território. A política de turismo precisa de dimensão, de ser forte, bem estruturada e orientada. "Esta política deve promover sinergias entre redes de diferentes atores para criar uma base sólida de segurança e confiança para o investimento privado." (Costa, 2000) É importante avaliar o investimento e o sistema de financiamento no setor do turismo, para entender a filosofia e os objetivos que norteiam todo o sistema (política estratégica) e as dinâmicas territoriais e setoriais das empresas do turismo.
Resumo:
More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
Resumo:
This article explores policy approaches to educating populations for potential critical infrastructure collapse in five different countries: the UK, the US, Germany, Japan and New Zealand. ‘Critical infrastructure’ is not always easy to define, and indeed is defined slightly differently across countries – it includes entities vital to life, such as utilities (water, energy), transportation systems and communications, and may also include social and cultural infrastructure. The article is a mapping exercise of different approaches to critical infrastructure protection and preparedness education by the five countries. The exercise facilitates a comparison of the countries and enables us to identify distinctive characteristics of each country’s approach. We argue that contrary to what most scholars of security have argued, these national approaches diverge greatly, suggesting that they are shaped more by internal politics and culture than by global approaches.
Resumo:
Induced pluripotent stem cells (iPSc) have great potential for applications in regenerative medicine, disease modeling and basic research. Several methods have been developed for their derivation. The original method of Takahashi and Yamanaka involved the use of retroviral vectors which result in insertional mutagenesis, presence in the genome of potential oncogenes and effects of residual transgene expression on differentiation bias of each particular iPSc line. Other methods have been developed, using different viral vectors (adenovirus and Sendai virus), transient plasmid transfection, mRNA transduction, protein transduction and use of small molecules. However, these methods suffer from low efficiencies; can be extremely labor intensive, or both. An additional method makes use of the piggybac transposon, which has the advantage of inserting its payload into the host genome and being perfectly excised upon re-expression of the transposon transposase. Briefly, a policistronic cassette expressing Oct4, Sox2, Klf4 and C-Myc flanked by piggybac terminal repeats is delivered to the cells along with a plasmid transiently expressing piggybac transposase. Once reprogramming occurs, the cells are re-transfected with transposase and subclones free of tranposon integrations screened for. The procedure is therefore very labor intensive, requiring multiple manipulations and successive rounds of cloning and screening. The original method for reprogramming with the the PiggyBac transposon was created by Woltjen et al in 2009 (schematized here) and describes a process with which it is possible to obtain insert-free iPSc. Insert-free iPSc enables the establishment of better cellular models of iPS and adds a new level of security to the use of these cells in regenerative medicine. Due to the fact that it was based on several low efficiency steps, the overall efficiency of the method is very low (<1%). Moreover, the stochastic transfection, integration, excision and the inexistence of an active way of selection leaves this method in need of extensive characterization and screening of the final clones. In this work we aime to develop a non-integrative iPSc derivation system in which integration and excision of the transgenes can be controlled by simple media manipulations, avoiding labor intensive and potentially mutagenic procedures. To reach our goal we developed a two vector system which is simultaneously delivered to original population of fibroblasts. The first vector, Remo I, carries the reprogramming cassette and GFP under the regulation of a constitutive promoter (CAG). The second vector, Eneas, carries the piggybac transposase associated with an estrogen receptor fragment (ERT2), regulated in a TET-OFF fashion, and its equivalent reverse trans-activator associated with a positive-negative selection cassette under a constitutive promoter. We tested its functionality in HEK 293T cells. The protocol is divided in two the following steps: 1) Obtaining acceptable transfection efficiency into human fibroblasts. 2) Testing the functionality of the construct 3) Determining the ideal concentration of DOX for repressing mPB-ERT2 expression 4) Determining the ideal concentration of TM for transposition into the genome 5) Determining the ideal Windows of no DOX/TM pulse for transposition into the genome 6) 3, 4 and 5) for transposition out of the genome 7) Determination of the ideal concentration of GCV for negative selection We successfully demonstrated that ENEAS behaved as expected in terms of DOX regulation of the expression of mPB-ERT2. We also demonstrated that by delivering the plasmid into 293T HEK cells and manipulating the levels of DOX and TM in the medium, we could obtain puromycin resistant lines. The number of puromycin resistant colonies obtained was significantly higher when DOX as absent, suggesting that the colonies resulted from transposition events. Presence of TM added an extra layer of regulation, albeit weaker. Our PCR analysis, while not a clean as would be desired, suggested that transposition was indeed occurring, although a background level of random integration could not be ruled out. Finally, our attempt to determine whether we could use GVC to select clones that had successfully mobilized PB out of the genome was unsuccessful. Unexpectedly, 293T HEK cells that had been transfected with ENEAS and selected for puromycin resistance were insensitive to GCV.
Resumo:
The provision of reserves in power systems is of great importance in what concerns keeping an adequate and acceptable level of security and reliability. This need for reserves and the way they are defined and dispatched gain increasing importance in the present and future context of smart grids and electricity markets due to their inherent competitive environment. This paper concerns a methodology proposed by the authors, which aims to jointly and optimally dispatch both generation and demand response resources to provide the amounts of reserve required for the system operation. Virtual Power Players are especially important for the aggregation of small size demand response and generation resources. The proposed methodology has been implemented in MASCEM, a multi agent system also developed at the authors’ research center for the simulation of electricity markets.
Resumo:
Outrora dominado por ameaças provenientes de Estados-nação, o cenário global actual, dominado por uma rápida mudança de poderes que nos apresenta uma interacção complexa entre múltiplos actores, onde inimigos desconhecidos, anteriormente bem identificados, é actualmente controlado por grupos terroristas bem preparados e bem organizados. Hezbollah é reconhecido como um dos grupos terroristas mais capazes, com uma extensa rede fora do Líbano dedicada a tráfico de droga, armas e seres humanos, tal como o branqueamento de capitais para financiar o terrorismo, representando um grande foco de instabilidade à segurança. Como instrumento de Estado, os serviços de informações detêm a capacidade de estar na linha da frente na prevenção e combate ao terrorismo. Todavia, para compreender este fenómeno é necessário analisar os actores desta ameaça. À luz desta conjuntura, esta dissertação está dividida em três capítulos principais que visam responder às seguintes questões fundamentais: O que é o terrorismo? Como opera um grupo terrorista transnacional? Será que os serviços de informações têm as ferramentas necessárias para prevenir e combater estas ameaças?
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
La visée de ce mémoire est d’expliquer les récents changements des lois sur l’immigration et l’asile. À prime abord, le moment de ces changements suggère une influence des attentats du 11 septembre 2001. La littérature avance toutefois que ces changements dateraient plutôt de la fin de la Guerre froide. Nous avons donc vérifié deux hypothèses, la première étant que les changements législatifs découlent de l’évolution des flux migratoires, et la seconde voulant qu’ils résultent d’une « connexion sécurité‐migration ». Nous avons d’abord eu recours aux écrits sur les changements institutionnels et les politiques d’immigration et d’asile et sur la constitution des migrations comme enjeu sécuritaire. Ensuite, nous avons étudié le contenu des lois sur l’immigration et l’asile de pays membres de l’OCDE de 1989 à 2008. Deux typologies ont été construites pour évaluer l’effet des flux migratoires sur lesdits changements législatifs. Enfin, une analyse lexicométrique nous a permis d’évaluer le poids des enjeux sécuritaires dans les lois sur l’immigration et l’asile depuis 1989. Nous avons noté l’absence de corrélation entre changements législatifs et flux migratoires mais la présence d’un lien entre ces changements et la « connexion sécurité‐migration ». Le rôle joué par le 11 septembre et d’autres attaques terroristes a été vérifié pour les États‐Unis, le Royaume‐Uni et l’Union européenne. Ce mémoire démontre ainsi la mutation des lois sur l’immigration et l’asile qui sont passées du statut de « régulateur des migrations internationales » à celui de « garant de la sécurité nationale ».
Resumo:
Ce mémoire a pour objectif d’analyser la pertinence d’une culture stratégique particulière, celle de l’Inde. Au moins quatre variables culturelles à dimension sécuritaire – l’identité, les valeurs, les normes et les perceptions – permettent d’expliquer la conception de la sécurité et du pouvoir indiens. L’hypothèse avancée dans ce mémoire est la suivante : à cause de l’influence de la culture stratégique indienne, l’océan Indien est perçu par l’élite indienne comme l’endroit où réside la principale menace à la sécurité de l’Inde. En outre, cette perception particulière de la menace permet de mieux comprendre les ambitions maritimes de l’Inde dans l’océan Indien à l’aube du 21e siècle. Afin de confirmer l’hypothèse, nous analysons l’influence de la culture stratégique indienne sur les approches stratégiques privilégiées par les décideurs Indiens au sein de l’océan Indien. Nous concluons, sur la base de l’étude cas, que l’objectif stratégique de New Delhi est de devenir la puissance maritime dominante de l’océan Indien. Le moyen privilégié est la création d’une marine océanique puissante, capable de maintenir en permanence une escadre en patrouille loin de ses bases navales. Sur le plan théorique, les actions indiennes – qui ont surtout un caractère défensif – sont justifiées par une doctrine de non-ingérence des grandes puissances dans les affaires indiennes, doctrine calquée sur la doctrine Monroe. Selon la doctrine indienne, seules les puissances régionales sont à même de préserver la stabilité dans la région de l’océan Indien. Conséquemment, le Gouvernement indien œuvre à réduire l’ingérence des marines de guerre étrangères au sein de l’océan Indien.
Resumo:
Le Conseil de sécurité est l’organe principal du système onusien chargé du maintien de la paix et de la sécurité internationales. Face à une situation illégale, il ne peut donc l’ignorer et s’en désintéresser. Cependant, la perpétration d’un acte à la légalité controversée par l’un ou plusieurs de ses membres permanents peut nous laisser entendre que l’organe politique onusien aura des difficultés à remplir son rôle. Les membres permanents vont tenter d’instrumentaliser le Conseil de sécurité afin de diminuer l’illégalité de la situation. Ceci pose avec acuité le problème du contrôle de son activité en matière de maintien de la paix. L’accomplissement d’un acte illégal par un ou plusieurs membres permanents du Conseil de sécurité nécessite alors de réfléchir à des moyens d’ordre juridique pour limiter son pouvoir. Cette réflexion s’avère particulièrement pressante lorsque le Conseil est confronté à une occupation de guerre impliquant ses membres permanents ou, lorsqu’il crée ou autorise des opérations de paix de grandes envergures suite à un conflit armé impliquant ses membres permanents. Afin de limiter les prérogatives du Conseil de sécurité, le régime juridique de l’occupation tel qu’énoncé par le Règlement de La Haye (IV) de 1907 et la IVe Convention de Genève de 1949 devrait être appliquer par l’organe politique onusien lorsqu’il intervient dans une situation d’occupation de guerre impliquant ses membres permanents. L’objectif est d’éviter qu’il n’attribue aux puissances occupantes des missions qui dépassent le cadre juridique imposé par le droit des conflits armés. L’autorisation, par le Conseil de sécurité d’opérations de paix, telles qu’une administration civile transitoire ou une force multinationale avec un mandat de la paix avec recours à la force armée, suite à un conflit armé impliquant ses propres membres permanents, ouvre le débat sur leur réglementation. Alors, il sera proposé une interprétation progressiste de la définition de l’occupation telle qu’énoncée par le Règlement de La Haye (IV) de 1907 et la IVe Convention de Genève de 1949 afin d’y intégrer ces nouvelles formes d’occupations pacifiques, présentant de grandes similitudes avec les occupations de guerre. Ainsi, le régime juridique de l’occupation pourra leur être appliqué.
Resumo:
La réforme des secteurs de sécurité est au cœur du processus de reconstruction postconflictuelle et du rétablissement de l’État de droit. Souvent implantées par des acteurs internationaux, ces réformes sont nécessaires au développement socio-économique des sociétés sortant de conflit. L’objectif premier de ce travail est d’établir si la coordination des forces militaires et policières internationales a une influence sur la réussite de la réforme des secteurs de sécurité dans le cadre des missions de paix de l’ONU. L'hypothèse de départ est la suivante : la coordination entre les policiers et les militaires sur le terrain, facilitée par la coopération entre les composantes policières et militaires du Département des opérations de maintien de la paix de l'ONU (DOMP), favorise le succès de la RSS. C’est la culture bureaucratique de l’ONU qui influencera la qualité et le degré de coopération entre les composantes policières et militaires du DOMP. Cela sera vérifié à travers l’étude en deux temps de l’aide internationale apportée à la réforme des secteurs de sécurité en Haïti de 1993 à 1997, puis de 2004 à aujourd’hui. La qualité de la coordination entre policiers et militaires dépend de facteurs internes à la mission plutôt que des initiatives mises de l’avant par les quartiers généraux de l’ONU. De plus, la coordination militaropolicière sur le terrain facilite certains aspects de la réforme des secteurs de sécurité, comme la professionnalisation des forces policières locales et le rétablissement de la sécurité.