391 resultados para denial
Resumo:
DeAuthentication Denial of Service attacks in Public Access WiFi operate by exploiting the lack of authentication of management frames in the 802.11 protocol. Detection of these attacks rely almost exclusively on the selection of appropriate thresholds. In this work the authors demonstrate that there are additional, previously unconsidered, metrics which also influence DoS detection performance. A method of systematically tuning these metrics to optimal values is proposed which ensures that parameter choices are repeatable and verifiable.
Resumo:
Synchrophasor systems will play a crucial role in next generation Smart Grid monitoring, protection and control. However these systems also introduce a multitude of potential vulnerabilities from malicious and inadvertent attacks, which may render erroneous operation or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System (SSIDS) for malicious cyber attack and unintended misuse. The SSIDS comprises a heterogeneous whitelist and behavior-based approach to detect known attack types and unknown and so-called ‘zero-day’ vulnerabilities and attacks. The paper describes reconnaissance, Man-in-the-Middle (MITM) and Denial-of-Service (DoS) attack types executed against a practical synchrophasor system which are used to validate the real-time effectiveness of the proposed SSIDS cyber detection method.
Resumo:
In recent years, the US Supreme Court has rather controversially extended the ambit of the Federal Arbitration Act to extend arbitration’s reach into, inter alia¸ consumer matters, with the consequence that consumers are often (and unbeknownst to them) denied remedies which would otherwise be available. Such denied remedies include recourse to class action proceedings, effective denial of punitive damages, access to discovery and the ability to resolve the matter in a convenient forum.
The court’s extension of arbitration’s ambit is controversial. Attempts to overturn this extension have been made in Congress, but to no avail. In contrast to American law, European consumer law looks at pre-dispute agreements to arbitrate directed at consumers with extreme suspicion, and does so on the grounds of fairness. In contrast, some argue that pre-dispute agreements in consumer (and employment) matters are consumer welfare enhancing: they decrease the costs of doing business, which is then passed on to the consumer. This Article examines these latter claims from both an economic and normative perspective.
The economic analysis of these arguments shows that their assumptions do not hold. Rather than being productive of consumer surplus, the use of arbitration is likely to have the opposite effect. The industries from which the recent Supreme Court cases originated not only do not exhibit the industrial structure assumed by the proponents of expanded arbitration, but are also industries which exhibit features that facilitate consumer welfare reducing collusion.
The normative analysis addresses the fairness concerns. It is explicitly based upon John Rawls’ notion of “justice as fairness,” which can provide a lens to evaluate social institutions. This Rawlsian analysis considers the use of extended arbitration in consumer matters in the light of the earlier economic results. It suggests that the asymmetries present in the contractual allocation of rights serve as prima facie evidence that such arbitration–induced exclusions are prima facie unjust/unfair. However, as asymmetry is only a prima facie test, a generalized criticism of the arbitration exclusions (of the sort found in Congress and underlying the European regime) is overbroad.
Resumo:
This study examined levels of mathematics and statistics anxiety, as well as general mental health amongst undergraduate students with dyslexia (n = 28) and those without dyslexia (n = 71). Students with dyslexia had higher levels of mathematics anxiety relative to those without dyslexia, while statistics anxiety and general mental health were comparable for both reading ability groups. In terms of coping strategies, undergraduates with dyslexia tended to use planning-based strategies and seek instrumental support more frequently than those without dyslexia. Higher mathematics anxiety was associated with having a dyslexia diagnosis, as well as greater levels of worrying, denial, seeking instrumental support and less use of the positive reinterpretation coping strategy. By contrast, statistics anxiety was not predicted by dyslexia diagnosis, but was instead predicted by overall worrying and the use of denial and emotion focused coping strategies. The results suggest that disability practitioners should be aware that university students with dyslexia are at risk of high mathematics anxiety. Additionally, effective anxiety reduction strategies such as positive reframing and thought challenging would form a useful addition to the support package delivered to many students with dyslexia.
Resumo:
This article considers the trajectory and effectiveness of policy, procedures and practice in the UK since the early 1990s in responding to young people who display problematic and harmful sexual behaviours. It draws on data from three publications in which research, policy and practice in the last 20 years have been reviewed. Key themes raised by Masson and Hackett are revisited including: denial and minimisation; terminology and categorisation; similarities with other young offenders; the child protection and youth justice systems; and assessment and interventions. The authors find that there is improvement in recognition of, and practice in response to, this group of young people, but good practice standards are inconsistently applied. With devolution of political powers, Scotland and Northern Ireland are now embarking on a more strategic response than England. The absence of a public debate and prioritising of primary prevention of child sexual abuse is noted.
Resumo:
Interesting wireless networking scenarios exist wherein network services must be guaranteed in a dynamic fashion for some priority users. For example, in disaster recovery, members need to be able to quickly block other users in order to gain sole use of the radio channel. As it is not always feasible to physically switch off other users, we propose a new approach, termed selective packet destruction (SPD) to ensure service for priority users. A testbed for SPD has been created, based on the Rice University Wireless open-Access Research Platform and been used to examine the feasibility of our approach. Results from the testbed are presented to demonstrate the feasibility of SPD and show how a balance between performance and acknowledgement destruction rate can be achieved. A 90% reduction in TCP & UDP traffic is achieved for a 75% MAC ACK destruction rate.
Resumo:
A new niche of densely populated, unprotected networks is becoming more prevalent in public areas such as Shopping Malls, defined here as independent open-access networks, which have attributes that make attack detection more challenging than in typical enterprise networks. To address these challenges, new detection systems which do not rely on knowledge of internal device state are investigated here. This paper shows that this lack of state information requires an additional metric (The exchange timeout window) for detection of WLAN Denial of Service Probe Flood attacks. Variability in this metric has a significant influence on the ability of a detection system to reliably detect the presence of attacks. A parameter selection method is proposed which is shown to provide reliability and repeatability in attack detection in WLANs. Results obtained from ongoing live trials are presented that demonstrate the importance of accurately estimating probe request and probe response timeouts in future Independent Intrusion Detection Systems.
Resumo:
This article uses feminist scholarship to investigate ‘the elderly mystique’ – which contends that the potential of old age is masked by a set of false beliefs about ageing (i.e. ageism) which permeate social, economic and political life (Cohen, 1988).
The article presents a theoretical model which explores the extent to which institutionalised ageism shapes the trajectory of life after 60. The hypothesis under-pinning the model is simple: The challenge for ageing societies is not the average age of a given population but, rather, how age is used to structure economic, social and political life. An inter-disciplinary framework is used to examine how biological facts about ageing are used to segregate older from younger people, giving older people the status of “other”; economically through retirement, politically through assumptions about ‘the grey vote’ and socially through ageist stereotyping in the media and through denial and ridicule of the sexuality of older people. Each domain is informed by the achievements of feminist theory and research on sexism and how its successes and failures can inform critical investigations of ageism.
The paper recognises the role of ageism in de-politicising the lived experience of ageing. The paper concludes that feminist scholarship, particularly work by feminists in their seventies, eighties and nineties has much to offer in terms of re-framing gerontology as an emancipatory project for current and future cohorts of older people.
Resumo:
A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.
Resumo:
In cases involving unionization of graduate student research and teaching assistants at private U.S. universities, the National Labor Relations Board has, at times, denied collective bargaining rights on the presumption that unionization would harm faculty-student relations and academic freedom. Using survey data collected from PhD students in five academic disciplines across eight public U.S. universities, the authors compare represented and non-represented graduate student employees in terms of faculty-student relations, academic freedom, and pay. Unionization does not have the presumed negative effect on student outcomes, and in some cases has a positive effect. Union-represented graduate student employees report higher levels of personal and professional support, unionized graduate student employees fare better on pay, and unionized and nonunionized students report similar perceptions of academic freedom. These findings suggest that potential harm to faculty-student relationships and academic freedom should not continue to serve as bases for the denial of collective bargaining rights to graduate student employees.
Resumo:
Tese (doutorado)—Universidade de Brasília, Instituto de Ciências Sociais, Departamento de Antropologia, Programa de Pós-graduação em Antropologia Social, 2015.
Resumo:
This paper examined the psychological impact of the online dating romance scam. Unlike other mass-marketing fraud victims, these victims experienced a ‘double hit’ of the scam: a financial loss and the loss of a relationship. For most, the loss of the relationship was more upsetting than their financial losses (many described the loss of the relationship as a ‘death’). Some described their experience as traumatic and all were affected negatively by the crime. Most victims had not found ways to cope given the lack of understanding from family and friends. Denial (e.g., not accepting the scam was real or not being able to separate the fake identity with the criminal) was identified as an ineffective means of coping, leaving the victim vulnerable to a second wave of the scam. Suggestions are made as to how to change policy with regards to law enforcement deal with this crime.
Resumo:
A review article of three recent books on suburbanization and suburbia in the USA: Andrew Friedman, Covert Capital: Landscapes of Denial and the Making of the US Empire in the Suburbs of Northern Virginia. Berkeley, Los Angeles: University of California Press, 2013. 416pp. £19.95 pbk. Elaine Lewinnek, The Working Man's Reward: Chicago's Early Suburbs and the Roots of American Sprawl. Oxford and New York: Oxford University Press, 2014. 239pp. 20 b&w illustrations. £30.99 hbk. Benjamin Ross, Dead End: Suburban Sprawl and the Rebirth of American Urbanism. Oxford and New York: Oxford University Press, 2014. 249pp. £20.99 hbk.
Resumo:
Dissertação submetida à Escola Superior de Teatro e Cinema para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Teatro - especialização em Encenação,
Resumo:
Hoje em dia, as ameaças são cada vez mais frequentes e sofisticadas, do que alguma vez registado. Todo o tipo de empresas/organizações e informação estão sujeitas a estas ameaças. Estes ataques são cada vez mais recorrentes, deixando para trás um rasto de várias quebras de segurança. Existem uma serie de ciberataques que já deixaram a sua marca na historia. Uma das mais notórias, foi o caso da Estónia em 2007, por um grupo pro-kremlin de Transnístria em que vários servidores governamentais, fornecedores de serviço, servidores da banca, entre outros foram alvo de uma serie de ataques, na sua maioria de DDoS (Distributed Denial of Service1),e botnets2. O seu método era tao complicado que o governo da Estónia achava que estavam a ser apoiados pelo governo russo. Isto resultou na paragem de um país ate que o problema fosse normalizado. Considerado um ato de hacktivismo3 pelo que representava algo muito importante para a população russa, um ícone, “the Bronze Soldier of Tallinn”, um elaborado cemitério da altura soviética que o governo da Estónia queria recolocar. Hoje em dia, não só enfrentamos adversários mais sofisticados, como a informação que valorizam é cada vez mais alargada. Estes grupos conseguem fazer coisas inimagináveis com os bits4 mais aparentemente inócuos de informações recolhidas. Como tal, é preciso tomar medidas para garantir a segurança dos cidadãos quando navegam no ciberespaço, no qual as fronteiras são desconhecidas, onde a regulação é insuficiente e a segurança é ainda muito precoce. No plano nacional pode-se afirmar que Portugal possui as capacidades necessárias à proteção do seu ciberespaço. Com a criação do Centro Nacional de Cibersegurança (CNCS), Portugal atingiu um dos objetivos principais da sua estratégia nacional de cibersegurança, em assegurar um ciberespaço livre e seguro e em implementar as medidas e instrumentos necessários à antecipação, deteção, reação e recuperação de situações que, face à iminência ou ocorrência de incidentes ou ciberataques, ponham em causa o funcionamento dos organismos do estado, das infraestruturas críticas e dos interesses nacionais. Partindo de uma analise à estrutura organizacional da cibersegurança em Portugal este trabalho pretende dar um contributo para o que se considera ser uma necessidade, o desenvolvimento de um quadro situacional para a cibersegurança com o objetivo de melhorar o nível de awareness nacional contribuindo assim para o desenvolvimento do modelo de maturidade do CNCS relativamente á prevenção e deteção de incidentes no ciberespaço nacional. Neste sentido foram formulados um conjunto de estudos com o objetivo de dar a entender ao leitor toda a estrutura de um centro de cibersegurança na qual se destaca a proposta de desenvolvimento de um quadro situacional para a cibersegurança em Portugal.