833 resultados para Terrorist attacks
Resumo:
Mode of access: Internet.
Resumo:
Children bear disproportionate consequences of armed conflict. The 21st century continues to see patterns of children enmeshed in international violence between opposing combatant forces, as victims of terrorist warfare, and, perhaps most tragically of all, as victims of civil wars. Innocent children so often are the victims of high-energy wounding from military ordinance. They sustain high-energy tissue damage and massive burns - injuries that are not commonly seen in civilian populations. Children have also been deliberately targeted victims in genocidal civil wars in Africa in the past decade, and hundreds of thousands have been killed and maimed in the context of close-quarter, hand-to-hand assaults of great ferocity. Paediatricians serve as uniformed military surgeons and as civilian doctors in both international and civil wars, and have a significant strategic role to play as advocates for the rights and welfare of children in the context of the evolving 'Laws of War'. One chronic legacy of contemporary warfare is blast injury to children from landmines. Such blasts leave children without feet or lower limbs, with genital injuries, blindness and deafness. This pattern of injury has become one of the post-civil war syndromes encountered by all intensivists and surgeons serving in four of the world's continents. The continued advocacy for the international ban on the manufacture, commerce and military use of antipersonnel landmines is a part of all paediatricians' obligation to promote the ethos of the Laws of War. Post-traumatic stress disorder remains an undertreated legacy of children who have been trapped in the shot and shell of battle as well as those displaced as refugees. An urgent, unfocused and unmet challenge has been the increase in, and plight of, child soldiers themselves. A new class of combatant comprises these children, who also become enmeshed in the triad of anarchic civil war, light-weight weaponry and drug or alcohol addiction. The International Criminal Court has outlawed as a War Crime, the conscription of children under 15 years of age. Nevertheless, there remain more than 300 000 child soldiers active and enmeshed in psychopathic violence as part of both civil and international warfare. The typical profile of a child soldier is of a boy between the ages of 8 and 18 years, bonded into a group of armed peers, almost always an orphan, drug or alcohol addicted, amoral, merciless, illiterate and dangerous. Paediatricians have much to do to protect such war-enmeshed children, irrespective of the accident of their place of birth. Only by such vigorous and maintained advocacy can the world's children be better protected from the scourge of future wars.
Resumo:
Background: Asthma guidelines recommend increasing or doubling inhaled corticosteroid (ICS) dose to treat mild and moderate exacerbations of asthma in adults. Aim: To: (i) compare the effectiveness of doubling existing daily ICS dose (fluticasone) with maintaining usual ICS dose and usual daily ICS dose accompanied by oral steroids (OS) (dexamethasone) during mild and moderately severe exacerbations of asthma in adults; (ii) examine determinants of success and failure; and (iii) compare side-effect profiles. Methods: A randomized, double-blind, placebo-controlled (double-dummy), triple crossover trial. Participants acted as their own control. Outcome measures included treatment success/failure, peak expiratory flow (PEF) after 7 days therapy or at treatment failure, and side-effects. Results: From 22 participants (nine males and 13 females), 18 pairs of data were available for maintaining usual ICS versus doubling ICS and doubling ICS versus OS, and 19 for maintaining usual ICS versus OS. Median (fifth-95th percentile) age was 46.5 (32-64) years and forced expiratory volume in one second (FEV1) 73% (29-97%) predicted. The outcome after doubling ICS was not superior to maintaining usual ICS, with 11 (61%) failures in both arms (P = 0.66). OS, with only 5 (26%) failures, was superior to maintaining usual ICS with 12 (63%) failures (P = 0.04), and to doubling ICS with 5 (28%) versus 11 (61%) failures (P = 0.07). Median PEF (as percentage of run-in best) at end-points were 90.5% (57.1-177.1) for OS, 78.3% (39.5-103.1) for maintaining usual ICS and 77.9 (27.7-110.3) for doubling ICS. Neither gender nor PEF at exacerbation were predictive of failure. Although doubling ICS was not an effective therapy overall, ICS dose at exacerbation were predictive of success in the doubling ICS arm (P = 0.04). Treatment failures when doubling daily ICS dose were more common if achieved fluticasone dose was less than 2000 mu g (three of 11, 73%) compared to 2000 mu g or greater (eight of eight, 37.5%). Increasing age and the presence of an upper respiratory tract infection (URTI) were predictive of failure with OS. Side-effects were more commonly reported with OS (52.6%) than doubling ICS (42.1%) or maintaining usual ICS (19.1%) with the most common being mood changes (36.8%), sleep disturbance (31.6%) and changes in appetite (26.3%). Conclusions: Doubling daily ICS dose per se is not effective for the treatment of mild to moderately severe exacerbations of asthma in adults. Success may depend on achieved ICS dose. Oral steroids are effective, but side-effects are common. A review of current guidelines may be warranted.
Resumo:
Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.
Resumo:
The security and reliability of a class of public-key cryptosystems against attacks by unauthorized parties, who had acquired partial knowledge of one or more of the private key components and/or of the message, were discussed. The standard statistical mechanical methods of dealing with diluted spin systems with replica symmetric considerations were analyzed. The dynamical transition which defined decryption success in practical situation was studied. The phase diagrams which showed the dynamical threshold as a function of the partial acquired knowledge of the private key were also presented.
Resumo:
The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an agent's critical data to a value that is meaningless to the malicious host. The effectiveness of the obfuscation algorithm is enhanced by addition of noise code. The second approach consists of a mechanism that is able to protect the integrity of the agent using state information, recorded during the agent execution process in a remote host environment, to detect a manipulation attack by a malicious host. Both approaches are implemented using a master-slave agent architecture that operates on a distributed migration pattern. Two sets of experimental test were conducted. The first set of experiments measures the migration and migration+computation overheads of the itinerary and distributed migration patterns. The second set of experiments is used to measure the security overhead of the proposed approaches. The protection of the agent is assessed by analysis of its effectiveness under known attacks. Finally, an agent-based application, known as Secure Flight Finder Agent-based System (SecureFAS) is developed, in order to prove the function of the proposed approaches.
Resumo:
The heightened threat of terrorism has caused governments worldwide to plan for responding to large-scale catastrophic incidents. In England the New Dimension Programme supplies equipment, procedures and training to the Fire and Rescue Service to ensure the country's preparedness to respond to a range of major critical incidents. The Fire and Rescue Service is involved partly by virtue of being able to very quickly mobilize a large skilled workforce and specialist equipment. This paper discusses the use of discrete event simulation modeling to understand how a fire and rescue service might position its resources before an incident takes place, to best respond to a combination of different incidents at different locations if they happen. Two models are built for this purpose. The first model deals with mass decontamination of a population following a release of a hazardous substance—aiming to study resource requirements (vehicles, equipment and manpower) necessary to meet performance targets. The second model deals with the allocation of resources across regions—aiming to study cover level and response times, analyzing different allocations of resources, both centralized and decentralized. Contributions to theory and practice in other contexts (e.g. the aftermath of natural disasters such as earthquakes) are outlined.
Resumo:
Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89 information attacks, joined in 33 groups and 73 methods of compression, joined in 10 groups are described in the paper. Experimental, expert, possible and real relations between attacks’ groups, method’ groups and objects’ groups are determined by means of matrix transformations and the respective maximum and potential sets are defined. At the end assessments and conclusions for future investigation are proposed.
Resumo:
In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.
Resumo:
In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.
Resumo:
This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.
Resumo:
We propose a method for detecting and analyzing the so-called replay attacks in intrusion detection systems, when an intruder contributes a small amount of hostile actions to a recorded session of a legitimate user or process, and replays this session back to the system. The proposed approach can be applied if an automata-based model is used to describe behavior of active entities in a computer system.