863 resultados para critical infrastructure security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tax law and policy is a vital part of Australian society. Australian society insists that the Federal Government provide extensive public programs, such as health services, education, social security, foreign aid, legal infra¬structure, regulation, police services, national defence and funding for sports development. These programs are costly to provide and are funded by taxation. The aim of this book is to introduce and explain the principles of tax law and tax policy in plain English. The book contains detailed commentary on tax principles together with extracts from cases and materials that illustrate the application of the principles. The book considers tax policy and the economic and social aspects of tax law. While tax students must develop technical competence in tax law, given the speed with which changes are made to the technical details of tax law, it is also important to grasp tax principles and policy to understand why tax law has changed or why it should change. The chapters are structured to direct readers to the key provisions of the tax law. Each case is introduced by an explanation of the facts, followed by the taxpayer’s arguments, the Commissioner’s assertions and the decision of the Administrative Appeals Tribunal or a court. The commentary guides readers through the issues considered in the judgments. The book contains extracts from: articles; materials dealing with tax policy; and the Commissioner’s rulings. The book also has references for further reading and medium-neutral citations (Internet citations) for cases decided since 1998.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The evolution of classic power grids to smart grids creates chances for most participants in the energy sector. Customers can save money by reducing energy consumption, energy providers can better predict energy demand and environment benefits since lower energy consumption implies lower energy production including a decrease of emissions from plants. But information and communication systems supporting smart grids can also be subject to classical or new network attacks. Attacks can result in serious damage such as harming privacy of customers, creating economical loss and even disturb the power supply/demand balance of large regions and countries. In this paper, we give an overview about the German smart measuring architecture, protocols and security. Afterwards, we present a simulation framework which enables researchers to analyze security aspects of smart measuring scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

between mid 2010 and early 2011, Queensland road related infrastructures were devastated by flood and cyclone related natural disasters. Responding to these recent events and in preparing for more regular and intense climate-change induced events in future, the Queensland Government is now reviewing how post-disaster road infrastructure recovery projects are planned and delivered. In particular, there is awareness that rebuilding such infrastructure need sustainable strategies across economic, environmental and social dimensions. A comprehensive sustainability assessment framework for pre and post disaster situations can minimize negative impact on our communities, economy and environment. This research is underway to develop a comprehensive sustainability element frame work for post disaster management in road infrastructures in Queensland, Australia. Analyzing the implications of disruption to transport network and associated services is an important part of preparing local and regional responses to the impacts of natural disasters. This research can contribute to strategic planning, management leading to safe, efficient and integrated transport system that supports sustainable economic, social and environmental outcomes in Queensland. Within this context, this paper provides an overview of the qualitative mixed-method research approach involving literature reviews and case studies to explore and evaluate a number of sustainability elements with a view to develop operational strategies for disaster recovery road projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An engaging narrative is maintained throughout this edited collection of articles that address the issue of militarism in international relations. The book seamlessly integrates historical and contemporary perspectives on militarism with theory and relevant international case studies, resulting in a very informative read. The work is comprised of three parts. Part 1 deals with the theorisation of militarism and includes chapters by Anna Stavrianakis and Jan Selby, Martin Shaw, Simon Dalby, and Nicola Short. It covers a range of topics relating to historical and contemporary theories of militarism, geopolitical threat construction, political economy, and the US military’s ‘cultural turn’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present and analyze several gaze-based graphical password schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Our 22-subject study observes that success rate and entry time for the grid-based schemes we consider are comparable to other gaze-based graphical password schemes. We propose the first password security metrics suitable for analysis of graphical grid passwords and provide an in-depth security analysis of user-generated passwords from our study, observing that, on several metrics, user-generated graphical grid passwords are substantially weaker than uniformly random passwords, despite our attempts at designing schemes to improve quality of user-generated passwords.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The strategies of price discrimination engaged in by a number of international publishers, coupled with a lack of competition and restrictions on the ability of consumers to engage in arbitrage, is likely to undermine the legitimacy of copyright law in Australia. By increasing prices beyond a reasonable and fair level, these strategies also undermine the goal of copyright law to enhance access to cultural goods. Enhancing access – and therefore lowering prices – is crucial to enhancing Australia's innovative capacity and the ability of Australians to experience, learn, act, and grow through cultural works. We recommend that the committee investigates the following options: 1. Repeal parallel importation restrictions; 2. Fundamentally reconsider the operation of anti-circumvention law in the context of digital distribution models; 3. Prohibit and render unenforceable contractual restrictions on parallel importation; 4. Introduce a right of digital resale in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Currently the development of a national system for the ongoing enhancement of teacher professionalism across Australia is underway. The initiative led by Australian Institute of Teaching and School Leadership (AITSL) on behalf of the Ministerial Council for Education, Early Childhood Development and Youth Affairs (now SCSEEC) is progressing rapidly with a finalised set of Professional Standards for Teachers and a set of Professional Standards for Principals approved by Ministers in 2011. It is clear that there is an inextricable link between the newly proposed professional standards and the professional education of teachers and principals across Australia. Further, it is imperative that the education sector will need to work in a unified manner through ongoing consultations to ensure the standards truly reflect what teachers and principals desire of the profession, in terms of teacher preparation, professional learning and training, and professional recognition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Much has been written on Michel Foucault’s reluctance to clearly delineate a research method, particularly with respect to genealogy (Harwood 2000; Meadmore, Hatcher, & McWilliam 2000; Tamboukou 1999). Foucault (1994, p. 288) himself disliked prescription stating, “I take care not to dictate how things should be” and wrote provocatively to disrupt equilibrium and certainty, so that “all those who speak for others or to others” no longer know what to do. It is doubtful, however, that Foucault ever intended for researchers to be stricken by that malaise to the point of being unwilling to make an intellectual commitment to methodological possibilities. Taking criticism of “Foucauldian” discourse analysis as a convenient point of departure to discuss the objectives of poststructural analyses of language, this paper develops what might be called a discursive analytic; a methodological plan to approach the analysis of discourses through the location of statements that function with constitutive effects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Extracting and aggregating the relevant event records relating to an identified security incident from the multitude of heterogeneous logs in an enterprise network is a difficult challenge. Presenting the information in a meaningful way is an additional challenge. This paper looks at solutions to this problem by first identifying three main transforms; log collection, correlation, and visual transformation. Having identified that the CEE project will address the first transform, this paper focuses on the second, while the third is left for future work. To aggregate by correlating event records we demonstrate the use of two correlation methods, simple and composite. These make use of a defined mapping schema and confidence values to dynamically query the normalised dataset and to constrain result events to within a time window. Doing so improves the quality of results, required for the iterative re-querying process being undertaken. Final results of the process are output as nodes and edges suitable for presentation as a network graph.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The overarching goal of this project is to better match funding strategies to industry needs to maximise the benefits of R&D to Australia’s infrastructure and building industry. Project partners are: Queensland Department of Public Works; Queensland Transport and Main Roads; Western Australian Department of Treasury and Finance; John Holland; Queensland University of Technology; Swinburne University of Technology; and VTT Technical Research Centre of Finland (Prof Göran Roos). This project has been endorsed by the Australian Built Environment Industry Innovation Council (BEIIC) with Council member Prof Catherin Bull serving on this project’s Steering Committee. This project seeks to: (i) maximise the value of R&D investment in this sector through improved understanding of future industry research needs; and (ii) address the perceived problem of a disproportionately low R&D investment in this sector, relative to the size and national importance of the sector. This research will develop new theory built on open innovation, dynamic capabilities and absorptive capacity theories in the context of strategic foresighting and roadmapping activities. Four project phases have been designed to address this research: 1: Audit and analysis of R&D investment in the Australian built environment since 1990 - access publically available data relating to R&D investments across Australia from public and private organisations to understand past trends. 2: Examine diffusion mechanisms of research and innovation and its impact on public and private organisations – investigate specific R&D investments to determine the process of realising research support, direction-setting, project engagement, impacts and pathways to adoption. 3: Develop a strategic roadmap for the future of this critical Australian industry - assess the likely future landscapes that R&D investment will both respond to and anticipate. 4: Develop policy to maximise the value of R&D investments to public and private organisations – through translating project learnings into policy guidelines.