681 resultados para malware attacks
Resumo:
This thesis collects the outcomes of a Ph.D. course in Telecommunications Engineering and it is focused on the study and design of possible techniques able to counteract interference signal in Global Navigation Satellite System (GNSS) systems. The subject is the jamming threat in navigation systems, that has become a very increasingly important topic in recent years, due to the wide diffusion of GNSS-based civil applications. Detection and mitigation techniques are developed in order to fight out jamming signals, tested in different scenarios and including sophisticated signals. The thesis is organized in two main parts, which deal with management of GNSS intentional counterfeit signals. The first part deals with the interference management, focusing on the intentional interfering signal. In particular, a technique for the detection and localization of the interfering signal level in the GNSS bands in frequency domain has been proposed. In addition, an effective mitigation technique which exploits the periodic characteristics of the common jamming signals reducing interfering effects at the receiver side has been introduced. Moreover, this technique has been also tested in a different and more complicated scenario resulting still effective in mitigation and cancellation of the interfering signal, without high complexity. The second part still deals with the problem of interference management, but regarding with more sophisticated signal. The attention is focused on the detection of spoofing signal, which is the most complex among the jamming signal types. Due to this highly difficulty in detect and mitigate this kind of signal, spoofing threat is considered the most dangerous. In this work, a possible techniques able to detect this sophisticated signal has been proposed, observing and exploiting jointly the outputs of several operational block measurements of the GNSS receiver operating chain.
Resumo:
Il Cryptolocker è un malware diffuso su scala globale appartenente alla categoria ransomware. La mia analisi consiste nel ripercorrere le origini dei software maligni alla ricerca di rappresentanti del genere con caratteristiche simili al virus che senza tregua persevera a partire dal 2013: il Cryptolocker. Per imparare di più sul comportamento di questa minaccia vengono esposte delle analisi del malware, quella statica e quella dinamica, eseguite sul Cryptolocker (2013), CryptoWall (2014) e TeslaCrypt (2015). In breve viene descritta la parte operativa per la concezione e la configurazione di un laboratorio virtuale per la successiva raccolta di tracce lasciate dal malware sul sistema e in rete. In seguito all’analisi pratica e alla concentrazione sui punti deboli di queste minacce, oltre che sugli aspetti tecnici alla base del funzionamento dei crypto, vengono presi in considerazione gli aspetti sociali e psicologici che caratterizzano un complesso background da cui il virus prolifica. Vengono confrontate fonti autorevoli e testimonianze per chiarire i dubbi rimasti dopo i test. Saranno questi ultimi a confermare la veridicità dei dati emersi dai miei esperimenti, ma anche a formare un quadro più completo sottolineando quanto la morfologia del malware sia in simbiosi con la tipologia di utente che va a colpire. Capito il funzionamento generale del crypto sono proprio le sue funzionalità e le sue particolarità a permettermi di stilare, anche con l’aiuto di fonti esterne al mio operato, una lista esauriente di mezzi e comportamenti difensivi per contrastarlo ed attenuare il rischio d’infezione. Vengono citati anche le possibili procedure di recupero per i dati compromessi, per i casi “fortunati”, in quanto il recupero non è sempre materialmente possibile. La mia relazione si conclude con una considerazione da parte mia inaspettata: il potenziale dei crypto, in tutte le loro forme, risiede per la maggior parte nel social engineering, senza il quale (se non per certe categorie del ransomware) l’infezione avrebbe percentuali di fallimento decisamente più elevate.
Resumo:
Fourteen non-terrorist attackers of public figures in Germany between 1968 and 2004 were intensively studied, with a particular focus on warning behaviors, attack behaviors, and the relationship between psychiatric diagnosis, symptoms, and motivations for the assault. A large proportion of the attackers were severely mentally ill, and most likely to be in the potentially lethal rather than the non-lethal group. A new typology of seven warning behaviors was applied to the data, and all were present, most frequently fixation and pathway warning behavior, and least frequently a direct threat. Psychiatric diagnosis could be closely linked to motivation when analyzed at the level of symptom and content of thought, often delusional. Most of the attacks were directed at political figures, and the majority occurred after 1995.
Resumo:
BACKGROUND AND PURPOSE: Time delays from stroke onset to arrival at the hospital are the main obstacles for widespread use of thrombolysis. In order to decrease the delays, educational campaigns try to inform the general public how to act optimally in case of stroke. To determine the content of such a campaign, we assessed the stroke knowledge in our population. METHODS: The stroke knowledge was studied by means of a closed-ended questionnaire. 422 randomly chosen inhabitants of Bern, Switzerland, were interviewed. RESULTS: The knowledge of stroke warning signs (WS) was classified as good in 64.7%. A good knowledge of stroke risk factors (RF) was noted in 6.4%. 4.2% knew both the WS and the RF of stroke indicating a very good global knowledge of stroke. Only 8.3% recognized TIA as symptoms of stroke resolving within 24 hours, and only 2.8% identified TIA as a disease requiring immediate medical help. In multivariate analysis being a woman, advancing age, and having an afflicted relative were associated with a good knowledge of WS (p = 0.048, p < 0.001 and p = 0.043). Good knowledge of RF was related to university education (p < 0.001). The good knowledge of TIA did not depend on age, sex, level of education or having an afflicted relative. CONCLUSIONS: The study brings to light relevant deficits of stroke knowledge in our population. A small number of participants could recognize TIA as stroke related symptoms resolving completely within 24 hours. Only a third of the surveyed persons would seek immediate medical help in case of TIA. The information obtained will be used in the development of future educational campaigns.
Resumo:
The diagnosis of an acute asthmatic attack in a child is made on a clinical basis. The severity of the exacerbation can be assessed by physical examination and measurement of the transcutaneous oxygenation saturation. A blood gas analysis can be helpful in this assessment. A child with a severe asthma exacerbation should be promptly referred to an emergency department of a hospital. Oxygen should be given to keep the oxygen saturation above 92% and short-acting, selective beta-2 agonists should be administered. Beta-2 agonists can be delivered by intermittent nebulization, continuous nebulization or by metered dose inhaler (MDI) with a spacer They can also be given intravenously in patients who are unresponsive to escalating therapy. The early administration of systemic corticosteroids is essential for the management of acute asthma in children. When tolerated, systemic corticoseroids can be given orally but inhaled corticosteroids are not recommended. Oxygen delivery, beta-2 agonists and steroid therapy are the mainstay of emergency treatment. Hypovolemia should be corrected either intravenously or orally. Administration of multiple doses of ipratropium bromide has been shown to decrease the hospitalization rate in children and adolescents with severe asthma. Clinical response to initial treatment is the main criterion for hospital admission. Patients with failure to respond to treatment should be transferred to an intensive care unit. A critical aspect of management of the acute asthma attack in a child is the prevention of similar attacks in the future.
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
Resumo:
Three studies examine how people’s attributions of responsibility for terrorist attacks depend on their group membership and their identification with the victim (study 1) or their identification with the victim’s or perpetrator’s ingroup (studies 2 and 3). We observe that people’s group membership (perpetrator group versus victim group) determines the judgments of responsibility for recent terrorist attacks. Members of the perpetrator group hold the direct perpetrators responsible, while members of the victim group perceive the perpetrator world as a whole as relatively responsible as well. Identification with the victim (study 1) or victim group (studies 2 and 3) strengthens attributions of responsibility to the whole perpetrator group, and this relationship is partially mediated by the perceived typicality of the perpetrator for the whole group. We discuss possible explanations for this pattern, and indicate the implications of these results in terms of improving intergroup relations.
Resumo:
by Morris J. Raphall
Resumo:
BACKGROUND Estimates of prevalence of wheeze depend on questionnaires. However, wording of questions may vary between studies. We investigated effects of alternative wording on estimates of prevalence and severity of wheeze, and associations with risk factors. METHODS White and South Asian children from a population-based cohort (UK) were randomly assigned to two groups and followed up at one, four and six years (1998, 2001, 2003). Parents were asked either if their child ever had "attacks of wheeze" (attack group, N=535), or "wheezing or whistling in the chest" (whistling group, N=2859). All other study aspects were identical, including questions about other respiratory symptoms. RESULTS Prevalence of wheeze ever was lower in the attack group than in the whistling group for all surveys (32 vs. 40% in white children aged one year, p<0.001). Prevalence of other respiratory symptoms did not differ between groups. Wheeze tended to be more severe in the attack group. The strength of association with risk factors was comparable in the two groups. CONCLUSIONS The wording of questions on wheeze can affect estimates of prevalence, but has less impact on measured associations with risk factors. Question wording is a potential source of between-study-heterogeneity in meta-analyses.