903 resultados para Fatal attacks
Resumo:
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
Resumo:
International audience
Resumo:
Nos últimos anos tornou-se óbvio que o mundo virtual das bases de dados e do software – popularmente denominado como ciberespaço – tem um lado negro. Este lado negro tem várias dimensões, nomeadamente perda de produtividade, crime financeiro, furto de propriedade intelectual, de identidade, bullying e outros. Empresas, governos e outras entidades são cada vez mais alvo de ataques de terceiros com o fim de penetrarem as suas redes de dados e sistemas de informação. Estes vão desde os adolescentes a grupos organizados e extremamente competentes, sendo existem indicações de que alguns Estados têm vindo a desenvolver “cyber armies” com capacidades defensivas e ofensivas. Legisladores, políticos e diplomatas têm procurado estabelecer conceitos e definições, mas apesar da assinatura da Convenção do Conselho da Europa sobre Cibercrime em 2001 por vários Estados, não existiram novos desenvolvimentos desde então. Este artigo explora as várias dimensões deste domínio e enfatiza os desafios que se colocam a todos aqueles que são responsáveis pela proteção diária da informação das respetivas organizações contra ataques de origem e objetivos muitas vezes desconhecidos.
Resumo:
Background: The most common reason of respiratory distress in the newborn is transient tachypnea of the newborn (TTN). There are some reports saying that TTN is associated with increased frequencies of wheezing attacks. Objectives: The aims of this study were to determine the risk factors associated with TTN and to determine the association between TTN and the development of wheezing syndromes in early life. Materials and Methods: In a historical cohort study, we recorded the characteristics of 70 infants born at the Shohadaye Kargar Hospital in Yazd between March 2005 and March 2009 and who were hospitalized because of TTN in the neonatal intensive-care unit. We called their parents at least four years after the infants were discharged from the hospital and asked about any wheezing attacks. Seventy other infants with no health problems during the newborn period were included in the study as the control group. Results: The rate of wheezing attacks in newborns with TTN was more than patients with no TTN diagnosis (P = 0.014). TTN was found to be an independent risk factor for later wheezing attacks (relative risk [RR] = 2.8). Conclusions: The most obvious finding of this study was that TTN was an independent risk factor for wheezing attacks. So long-term medical care is suggested for these patients who may be at risk, because TTN may not be as transient as has been previously thought.
Resumo:
Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s corporate network infrastructure. To this end, we develop and estimate a vector equation system of threats to 10 important IP services, using industry standard SANS data on threats to various components of a firm’s information system over the period January 2003 – February 2011. Our results reveal strong evidence of contagion between such attacks, with attacks on ssh and Secure Web Server indicating increased attack activity on other ports. Security managers who ignore such contagious inter-relationships may underestimate the underlying risk to their systems’ defence of security attributes, such as sensitivity and criticality, and thus delay appropriate information security investments.
Resumo:
This paper presents a distributed hierarchical multiagent architecture for detecting SQL injection attacks against databases. It uses a novel strategy, which is supported by a Case-Based Reasoning mechanism, which provides to the classifier agents with a great capacity of learning and adaptation to face this type of attack. The architecture combines strategies of intrusion detection systems such as misuse detection and anomaly detection. It has been tested and the results are presented in this paper.
Resumo:
O dendê possui grande importância econômica para o estado do Pará, no entanto, o Amarelecimento Fatal (AF) tem sido um grande obstáculo para a sua produção. Alguns elementos químicos foram testados, em pesquisas anteriores, para saber sua relação com o AF e as consequências da sua deficiência. A análise química por espectrometria de raios-x por dispersão de energia (EDS) é um recurso da microscopia de varredura (MEV) que permite fazer uma avaliação química da amostra. O presente trabalho teve como objetivo analisar semiquantitativamente os elementos químicos cálcio e silício, em quatro diferentes tecidos de raízes terciárias e quaternárias de Elaeis guineensis Jacq. (Dendezeiro) com grau zero (sem sintoma) e grau dez (com sintoma) de amarelecimento fatal (AF). Em plantas com sintomas de AF as médias percentuais para cálcio são de 0,731 a 4,453 e para silício 2,619 a 8,124 dentre os tecidos analisados, enquanto que em plantas sem sintomas as médias são de 0,712 a 5,313 e 2,963 a 7,494, para cálcio e silício, respectivamente. A diferença encontrada em relação as porcentagens dos elementos nos diferentes tecidos radiculares analisados, é maior do que entre os diferentes graus da doença, exceto para o aerênquima. Em relação ao acumulo de cálcio e silício nos tecidos, o comportamento das plantas com sintoma e sem sintoma é muito parecido. A presença de cálcio aumenta conforme se aproxima do cilindro vascular, ocorrendo o comportamento variado com o silício.
Resumo:
Apesar da alta incidência de mortes de palma de óleo (Elaeis guineensis var. tenera acarretadas pelo Amarelecimento Fatal (AF), a causa inicial desta anomalia segue desconhecida ou controversa. Técnicas em proteômica vêem sofrendo adaptações para obter o perfil protéico qualitativo e quantitativo com maior velocidade e precisão, podendo contribuir para a obtenção de resultados mais convincentes na elucidação das possíveis causas desta doença. O objetivo deste trabalho foi identificar alterações no proteoma de palma de óleo afetada pelo AF por meio da cromatografia líquida bidimensional, acoplada a espectrometria de massas. O proteoma diferencial foi obtido a partir da comparação entre plantas com sintomas de AF com plantas assintomáticas. O presente trabalho revelou o acúmulo diferencial de proteínas em plantas com AF comparando com assintomática. Foi identificado um total de 417, Dessas, 127 e 162 proteínas tiveram regulação positiva e negativa, respectivamente, sendo que 29 foram exclusivas de plantas com sintomas e 77 de assintomáticas. Esta primeira análise proteômica em plantas acometidas pelo AF revelou proteínas diferencialmente abundantes comparando plantas nestas condições com plantas assintomáticas. Os resultados obtidos mostraram que as técnicas em proteômica utilizadas aqui devem contribuir para resultados mais convincentes na elucidação das possíveis causas desta doença em pesquisas futuras.
Resumo:
A dendeicultura é uma cultura de grande importância sócio-econômica no Estado do Pará e tem alto potencial de crescimento no Brasil em decorrência de sua demanda de óleo, elevada produtividade e competitividade. A dendeicultura tem sido ameaçada pela ocorrência do amarelecimento fatal (AF), desordem de etiologia desconhecida que já devastou milhares de hectares de dendezeiro. Não existe fonte de resistência ao AF relatada no dendezeiro, mas sabe-se que o caiaué, espécie nativa da América, é resistente e transfere essa resistência aos híbridos interespecíficos F1 entre caiaué e dendezeiro (HIE OxG). O objetivo do estudo foi analisar o desenvolvimento vegetativo de uma população de HIE OxG, em área de ocorrência de AF. Esta população de HIE OxG apresentou desenvolvimento vegetativo compatíveis aos relatos bibliográficos de outras localidades. A característica agronômica vegetativa mais importante, crescimento em altura, nesta população de HIE OxG foi muito superior ao relatado para o dendezeiro.
Resumo:
In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.
Resumo:
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA communications. The architecture includes a proposed key management protocol (SKMP). We compare the architecture with a previous proposal from Sandia Labs.
Resumo:
Bomb attacks carried out by terrorists, targeting high occupancy buildings, have become increasingly common in recent times. Large numbers of casualties and property damage result from overpressure of the blast followed by failing of structural elements. Understanding the blast response of multi-storey buildings and evaluating their remaining life have therefore become important. Response and damage analysis of single structural components, such as columns or slabs, to explosive loads have been examined in the literature, but the studies on blast response and damage analysis of structural frames in multi-storey buildings is limited and this is necessary for assessing the vulnerability of them. This paper investigates the blast response and damage evaluation of reinforced concrete (RC) frames, designed for normal gravity loads, in order to evaluate their remaining life. Numerical modelling and analysis were carried out using the explicit finite element software, LS DYNA. The modelling and analysis takes into consideration reinforcement details together and material performance under higher strain rates. Damage indices for columns are calculated based on their residual and original capacities. Numerical results generated in the can be used to identify relationships between the blast load parameters and the column damage. Damage index curve will provide a simple means for assessing the damage to a typical multi-storey building RC frame under an external bomb circumstance.
Resumo:
In this study, Lampert examines how cultural identities are constructed within fictional texts for young people written about the attacks on the Twin Towers. It identifi es three significant identity categories encoded in 9/11 books for children:ethnic identities, national identities, and heroic identities,arguing that the identities formed within the selected children’s texts are in flux, privileging performances of identities that are contingent on post-9/11 politics. Looking at texts including picture books, young adult fiction, and a selection of DC Comics, Lampert finds in post-9/11 children’s literature a co-mingling of xenophobia and tolerance; a binaried competition between good and evil and global harmony and national insularity; and a lauding of both the commonplace hero and the super-human. The shifting identities evident in texts that are being produced for children about 9/11 offer implicit and explicit accounts of what constitutes good citizenship, loyalty to nation and community, and desirable attributes in a Western post-9/11 context. This book makes an original contribution to the field of children’s literature by providing a focused and sustained analysis of how texts for children about 9/11 contribute to formations of identity in these complex times of cultural unease and global unrest.
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.