912 resultados para Missile Attacks


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The reactions to the 9/11 terror attacks were immense in the western population. In the current review, the impact of terror attacks is presented with surveys, clinical interviews, and scientific polls, which were identified in a comprehensive literature search. Results show that the fear of further terror attacks is comparatively overestimated in the population and is associated with numerous psychological consequences and reactions. The overestimation of the probability of further terror attacks is related among other reasons to its unique features and its strong representation in the media. Several independent studies proved that the number of stress symptoms and psychiatric diagnoses is associated with a high risk perception in relation to terror attacks. This was not only the case for victims of terror attacks, but also for people indirectly exposed to the terror attacks. In addition, there is evidence that the number of the stress symptoms correlate with the duration of TV consumption of new findings about terror attempts. Methodologically, there is a critical lack of more in-depth analyses to explain the development of risk perceptions and its influence on mental and physical health. Because of the international importance and cross-cultural differences, an international standardization of research is desirable. [In German] Die Reaktionen auf die Terrorattentate vom 9. September 2001 in New York waren in der westlichen Bevölkerung immens. In der vorliegenden Übersichtsarbeit werden die Auswirkungen von Terrorattentaten durch Einbeziehung bevölkerungsrepräsentativer Untersuchungen, Surveys, klinischer Interviews und Einstellungsbefragungen dargestellt, die über eine deskriptive Literaturrecherche ermittelt wurden. Als Ergebnis des Reviews zeigt sich, dass die Angst vor weiteren Terrorattentaten in der Bevölkerung vergleichsweise hoch und mit zahlreichen psychologischen Folgen und Reaktionen assoziiert ist. Die Einschätzung der Auftretenswahrscheinlichkeit eines Terrorattentats hängt unter anderem mit den besonderen Charakteristika und der hohen medialen Präsenz des Themas zusammen. Die Anzahl der Stresssymptome bis hin zu psychiatrischen Diagnosen erwies sich in mehreren unabhängigen Untersuchungen mit einer hohen Risikowahrnehmung assoziiert. Dies ließ sich nicht nur bei den Opfern von Terrorattentaten, sondern auch bei indirekt Betroffenen zeigen. Darüber hinaus gibt es mehrfache Belege dafür, dass die Anzahl der Stresssymptome mit der Dauer des TV-Konsums über Neuigkeiten zu Terrorattentaten zusammenhing. Als methodische Kritik ist an den gegenwärtigen Untersuchungsszenarien einzuwenden, dass es derzeit keine tiefer gehenden Analysen zur Entwicklung der Risikowahrnehmung und zu ihrem Einfluss auf die Gesundheit gibt. Aufgrund der internationalen Bedeutung des Themas und der interkulturellen Unterschiede im Umgang mit Krisensituationen ist eine internationale Standardisierung von Untersuchungszugängen wünschenswert.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.