Dissertations / Theses on the topic 'Threats'

To see the other types of publications on this topic, follow the link: Threats.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chavez, Felicia India. "Sustainability and Spirituality| Common Threads and Common Threats." Thesis, Pacifica Graduate Institute, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10278487.

Full text
Abstract:

Common principles, or threads, are studied that are readily found in both spiritual traditions (including religion) and in the field of sustainability. Oneness, Living Simply, Purity, and Care and Heart are examined at length, while Awakening, Awe and Wonder, and Preservation of Life are covered briefly. Opposite principles—for example, Oneness versus Fracturedness, and Purity versus Pollution—are analyzed as well. Principles and their opposites are found to have both high and low modes. Each polarity has life-supporting and life-degrading forms.

Spiritual and religious traditions are grouped into five broad categories. While three of the categories consist of world religions (traditions of Indian origin, Abrahamic traditions, and East Asian traditions), also included are indigenous traditions, alchemy and Hermeticism, and modern spiritual teachings. Sustainability is organized into three categories: ecological science, activism, and sustainable business.

The common threads between sustainability and spirituality are most reliably found in the segments of world religions that tend toward mysticism, and within teachings that emphasize the cultivation of a greater capacity for just awareness, or presence itself, such as Eckhart Tolle’s works. Indigenous traditions shine as examples of societies that have embodied, and in some cases, continue to embody life-supporting principles far more explicitly and fully than cultures that have lost intimacy with their local ecosystems.

The conclusions drawn based on findings is that wisdom traditions corroborate the idea that the outer world is a reflection of the inner world, and that improving the state of the planet therefore requires personal transformation as a prerequisite to outer improvements. A higher order of intelligence, or nous, referenced in multiple mystical traditions, is indispensable to sustainability work. This and other spiritual principles directly inform sustainability efforts, but to be fully employed they require first-hand, personal experience of spiritual realities. Those who would work toward a genuinely sustainable society are urged to pursue mystical or presence-based spiritual training and experience as a matter of urgency, including direct interaction with nature to facilitate rebuilding intimacy with ecosystems, combined with deepening understanding of ecologically sophisticated indigenous lifeways.

APA, Harvard, Vancouver, ISO, and other styles
2

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Full text
Abstract:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard.
För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
APA, Harvard, Vancouver, ISO, and other styles
3

Gobran, Ashraf. "Cyber terrorrism threats." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1588500.

Full text
Abstract:

The purpose of this study is to explore the potential threats that are posed uniquely by cyber terrorism. While traditional terrorism has affected governmental policy, and inflicted physical damage to people and infrastructure across the world, computers and the Internet can allow for attacks as well. As terrorism groups begin to adapt to, and take advantage of - cyber tools and capabilities, the threat they pose will grow accordingly. While a terrorist is not able to directly kill people with cyber tools, the mayhem or social disruption that such attacks can cause, fit well with these organization's objectives. The anonymity of cyber space permits terrorist groups to plan and execute attacks without being identified immediately, if ever. In addition, the targets of cyber terrorists are often under prepared, and fairly vulnerable to various forms of cyber attacks. While these organizations may be aware of the risk posed by failing to adequately address cyber security deficiencies, their solutions are likely not sufficient to truly prevent cyber terrorism attacks. In order to discover technological advancements, efficient cyber security, and generally spread awareness on the subject, this study attempts to highlights existing threats, as well as an overview of what can be done to mitigate them.

Keywords: Intelligence, Cyber security, Professor Albert Orbanati

APA, Harvard, Vancouver, ISO, and other styles
4

Douglas, Michael L. Gray Arlene J. "The Warfighters' Counterspace Threat Analysis (WCTA) : a framework for evaluating counterspace threats /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Douglas, Michael L., and Arlene J. Gray. "The Warfighters' Counterspace Threat Analysis (WCTA): a framework for evaluating counterspace threats." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7830.

Full text
Abstract:
Approved for public release; distribution is unlimited
The authors present an evolutionary approach to evaluating the counterspace threat in support of Department of Defense (DoD) decision-makers. The goal is to present a process that decision-makers can readily utilize to accurately assess the level of the counterspace threat originating within their Area of Responsibility (AOR). It is particularly useful as the state of affairs change within the AOR. The authors examine the necessity to utilize space to achieve information dominance, strengths and weaknesses of present Counterspace Threat Models, DoD's increasing dependence on space assets, DoD's reliance on commercial space systems to meet future requirements, and potential adversaries' awareness of the dependence of U.S. forces on space systems. Conclusions stress that the threat is comprised of two essential elements an opponent's willingness to employ a counterspace tactic (their intent) and the opponent's ability to develop the necessary tools to employ a counterspace tactic (their capability). The authors believe that the "intent" component of the threat changes more rapidly than the present models can easily accommodate. Therefore, a process, such as the one presented in this thesis, will enable DoD decision-makers that experience many of the changes of 'intent' first hand to rapidly and accurately assess the threat as the condition changes within the AOR
APA, Harvard, Vancouver, ISO, and other styles
6

Williamson, Harley M. "Veiled Threats: How Do Identity Threats Shape Muslims' Support for Terrorism?" Thesis, Griffith University, 2020. http://hdl.handle.net/10072/397051.

Full text
Abstract:
In recent decades, Islamic-inspired terrorism has worsened intergroup tensions between Muslims and non-Muslims in western democratic countries, including Australia. Muslims and Islam are often linked with terrorism, and the resulting tension between Muslims and non-Muslims has fostered an “us” versus “them” mentality (Blackwood et al., 2013b). Some research suggests that the alienation Muslims feel as a result of the stigma they have faced in recent years can push some Muslims towards radicalisation (Dalgaard-Nielsen, 2010; Dugan & Distler, 2016). In my dissertation, I propose that the disproportionate scrutiny that Muslims face in western democratic countries may lead some Muslims to support terrorism. Drawing on Social Identity Theory (SIT), my dissertation centres on the proposition that Muslims’ support for terrorism may manifest when some Muslims experience identity threats from non-Muslims. I propose that a feedback loop exists whereby non-Muslims’ attitudes and actions towards Muslims, as well as ingroup/ out-group tensions between Muslims and non-Muslims, may lead some Muslims in Australia to experience identity threats. I propose that non-Muslims might come to hold punitive views towards Muslims because they perceive Muslims to be a realistic, symbolic and terroristic threat and that their national identity as Australians can influence this association. I also suggest that Muslims can come to perceive that their identities are threatened by (1) feeling stigmatised and (2) believing that others are punitive towards Muslims (conceptualised in my dissertation as meta-punitiveness). I further argue that the strength of a Muslim’s national and religious identity might influence how susceptible some Muslims are to these identity threats. Existing studies typically focus on how support for terrorism may arise amongst Muslims living in Muslim-majority countries. Yet, few studies consider how Muslims come to support terrorism when they constitute a minority group in a western country. My research takes place in Australia. My dissertation focuses on both Muslims and non-Muslims living in Australia to examine the ingroup/out-group tensions between the two groups. Doing so will result in a more thorough understanding of how and why some Muslims might come to support terrorism. My dissertation presents three interrelated studies. Together, these three studies demonstrate how the attitudes and behaviours of one group (i.e., non-Muslims) have the potential to impact the attitudes and behaviours of another group (i.e., Muslims) and vice versa. Studies 1 and 2 utilise survey data I collected from 1,193 non-Muslim Australians. In the Attitudes to Punishment Survey, I presented participants with information depicting a terrorist event whereby the motivation forthe attack was described as being Islamic-inspired or right-wing-inspired. Study 1 explores if non-Muslims hold more punitive attitudes towards the perpetrator motivated by Islamic-inspired terrorism relative to the perpetrator motivated by right-wing-inspired terrorism. It also explores the extent to which non-Muslims see Muslims as a realistic, symbolic and terroristic threat and believe that Muslims support terrorism. Study 2 draws on SIT to understand how non-Muslims’ attitudes towards Muslims are associated with their support for punitive counter-terrorism policies. Study 2 tests if non-Muslims’ Australian national identity is related to their perceptions of Muslims as a realistic, symbolic and terroristic threat and their support for punitive counter-terrorism policies. Study 3 draws on secondary survey data from 398 Muslim Australians collected in the Sydney Immigrant Survey (SIS). Study 3 investigates if Muslims’ experiences of identity threat (i.e., feeling stigmatised and feeling non-Muslims are punitive towards Muslims) are associated with their support for terrorism. Moreover, Study 3 considers whether or not identity (i.e., both their Australian national identity and their religious identity) plays a role in mitigating or exacerbating the association between identity threats on Muslims’ support for terrorism. Together, the findings from Studies 1 and 2 demonstrate a positive association between perceiving Muslims as a realistic, symbolic and terroristic threat, holding a strong national identity, and supporting punitive counter-terrorism policies. In Study 1, I find that non-Muslim Australian participants on average: (a) held more punitive views of counter-terrorism policies, (b) viewed Muslims as a realistic, symbolic and terroristic threat, and (c) believed that Muslims support terrorism if they received a vignette describing a suspect inspired by Islamic-inspired compared to right-wing-inspired motives. In Study 2 I find that non-Muslims’ Australian national identity was positively associated with their (a) perceptions of Muslims as a realistic, symbolic and terroristic threat, and (b) support for punitive counterterrorism policies. Specifically, those non-Muslims who held a stronger national identity perceived Muslims as a greater threat and were more supportive of punitive counter-terrorism policies. In Study 3, I turned my attention to the perspectives and experiences of the Muslim sample. I tested if non-Muslims’ perceptions of threat towards Muslims and their support for punitive counter-terrorism policies (that often target Muslims more than other groups) translated to experiencing a stronger identity threat amongst my Muslim sample. I considered if Muslims’ feelings that others stigmatised them (e.g., viewed them as a suspect) and perceptions that others were punitive towards Muslims because of their race, ethnicity or religion (i.e., meta-punitiveness) would be associated with Muslims’ heightened support for terrorism. I found that experiencing one type of identity threat (i.e., meta-punitiveness) was associated with Muslims’ increased support for terrorism. I also found that holding a strong national identity (i.e., as an Australian) had a protective role in reducing Muslims’ support for terrorism. In sum, I find support for a possible feedback loop, whereby the attitudes and behaviours of non-Muslims may shape an atmosphere instrumental to increasing Muslims’ support for terrorism via their felt identity threats. I argue that support for punitive counter-terrorism policies by non-Muslims may perpetuate the identity threats experienced by Muslims. I conclude that this reinforces the need to address broader public attitudes towards Muslims to prevent the narrative associating Muslims with terrorism. I suggest it is also essential to create an environment conducive to building a national identity amongst Muslim residents. Ensuring that Muslims feel socially included in society and feel a strong affiliation with the nation they live in is vital as other research suggests that people will act in the best interests of groups they feel a secure attachment to (Stephan et al., 2009; Tajfel & Turner, 1986). Preventing terrorism necessitates a whole-of-community response and requires that counter-terrorism initiatives do not alienate or disproportionately affect Muslim communities. Examining support for terrorism through Muslim and non-Muslim perceptions will help to reframe the divisive “us” versus “them” discourse into a more collective “we.”
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Crim & Crim Justice
Arts, Education and Law
Full Text
APA, Harvard, Vancouver, ISO, and other styles
7

Kateraas, Christian H. "Threats to Bitcoin Software." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27224.

Full text
Abstract:
Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.
APA, Harvard, Vancouver, ISO, and other styles
8

Ibbetson, Paul A. "Changing public threats and police priorities: How police chiefs respond to emerging threats." Diss., Kansas State University, 2011. http://hdl.handle.net/2097/13104.

Full text
Abstract:
Doctor of Philosophy
Department of Sociology, Anthropology, and Social Work
Robert K. Schaeffer
Kansas police chiefs are a unique group of individuals. Because are they located throughout the various sized communities within the state, they have the potential to affect the daily lives of more people on a day-today basis than any other branch of law enforcement. The purpose of this study was to analyze how police chiefs prioritize emerging threats. In this study, using a purposeful sample, 40 semi-structured interviews were conducted with Kansas police chiefs across the state. These police chiefs were asked about their views on the biggest emerging threats they have observed within the last 10 years. They were also asked why certain threats become priorities and why others do not. Police chiefs were split on their thoughts of whether or not they believed resources should be allocated in their communities to defend against terrorism in Kansas. What was discovered during the research process went beyond learning about the process of change for threat prioritization, or what specific threats Kansas police chiefs think their communities are facing today. What was discovered was a deeper understanding of how police chiefs think when it comes to the relationship between police departments, police personnel, and community. As police chiefs addressed the processes by which they go about prioritizing emerging threats, they illuminated a unique strategy hierarchy for success that is centered on maintaining positive departmental perception. To maintain this perception, police chiefs work both officially and covertly within governmental structures and the public sphere to control how people think about their personnel and department. A prominent difference was seen in the physical proximity and accessibility of police chiefs to the community between small, medium, and large towns. In effect, to come to an understanding of the process of prioritization for emerging threats for Kansas police chiefs, it was necessary to understand these police administrators’ unique thought processes that they bring to the table when addressing important issues.
APA, Harvard, Vancouver, ISO, and other styles
9

Moore, Febbie P. "Windows NT threats and vulnerabilities." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341457.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September. 1997.
"September 1997." Thesis advisor(s): Norman Schneidewind, Douglas Brinkley. Includes bibliographical references (p. 47). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.

Full text
Abstract:
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. In the last few years as a real competitor in traditional telephony services (PSTN), SIP has gained much attention when compared with H.323. SIP works at presentation and application layer thus it mainly faces security issue at these layers. The objective of this thesis is to describe the most relevant SIP related security issues and then present security mechanisms that can be deployed to overcome the SIP security related issues. This project work demonstrates the tasks necessary to enhance the SIP security both inside and outside of the network. It is divided into three main parts, where the first part describes the SIP architecture, for example, the SIP rivals, SIP components and how a SIP system works. The second part is about some vulnerability issues of concern to SIP, study of the proposed security mechanism and also analysis on how possible threats to the SIP system such as call hijacking, message tempering and DoS attack, affect the SIP based VoIP system. The third and final part describes different steps that have been taken to avoid SIP attacks, by implementing some of the proposed security mechanisms. In order to test the SIP security, a SIP model is designed, which based on security mechanisms such as firewall, IPSec, DMZ and SIP-TLS. The results are conducted into two different scenarios. In the 1st scenario, the SIP system is tested before implementing the security measurements. In this case, the insecure system was vulnerable to several SIP attacks such as call hijacking, DOS and message tampering. In the 2nd scenario, the system is tested after the implementation of the proposed security mechanisms, where by the system now is only accessible to the authorized users and services. The tested results are also compared and discussed at the end.
APA, Harvard, Vancouver, ISO, and other styles
11

Klein, Rupert G. "Cognitive avoidance of health threats." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102518.

Full text
Abstract:
Previous researchers have suggested that cognitive avoidance occurs for stimuli describing social threats but not for stimuli describing physical threats. The present research examined whether individuals can cognitively avoid physically threatening stimuli, such as the words 'HIV' or 'cancer'. Three studies investigated (a) personality characteristics that predict cognitive avoidance of physically threatening stimuli, (b) whether the stimuli have to be relevant to the avoider and (c) circumstances that may disrupt the avoidance mechanism.
Study 1 was an exploratory study examining the personality characteristics that predict avoidance of thoughts concerning physical threats, specifically, sexually transmitted infections (STIs). The study found that lower sexual self-efficacy and less assertiveness predicted greater self-reported avoidance of thoughts concerning STIs. The more participants tended to avoid thoughts concerning STIs the less likely they were to discuss safer sex practices with their partner and the less consistent they were in their condom use. The findings suggest that individuals can avoid thoughts of physical threats (i.e., STIs) and that this avoidance can have consequences such as engaging in riskier sexual behaviours (i.e., not consistently using condoms).
In study 2, participants were presented threatening words on a computerized task (the emotional Stroop task) to assess if they would automatically attend to or avoid physically threatening words. Dispositionally avoidant participants (participants low in anxiety and high in repressive defensiveness) avoided physically threatening words but only if they were perceived to be self-relevant, otherwise the avoidance mechanism was not elicited.
Study 3 examined if the avoidance of physical threats may be disrupted when there is a temporary reduction in dopamine, such as when cigarette smokers abstain from smoking. Results showed that non-abstaining smokers with an avoidant disposition superficially processed (avoided) threatening words related to smoking on an emotional Stroop task. Abstainers however did not demonstrate this superficial processing suggesting that the avoidance mechanism was disrupted.
The three studies demonstrate that individuals avoid physical threats if they perceive them to be self-relevant and that this avoidance mechanism can be disrupted by a temporary reduction in dopamine.
APA, Harvard, Vancouver, ISO, and other styles
12

Литвиненко, Галина Іванівна, Галина Ивановна Литвиненко, Halyna Ivanivna Lytvynenko, and O. Snytnikova. "Artificial intelligence: threats and promises." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/16063.

Full text
Abstract:
There are any number of vaguely plausible reasons why Friendly AI might be humanly impossible, and it is still more likely that the problem is. But one should not so quickly write of the challenge, especially considering the stakes. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/16063
APA, Harvard, Vancouver, ISO, and other styles
13

Safdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Security Building in Post-Conflict Environments))--Naval Postgraduate School, Dec. 2004.
Thesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
14

Xu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.

Full text
Abstract:
As cloud computing has become a trend in the computing world, understanding its security concerns becomes essential for improving service quality and expanding business scale. This dissertation studies the security issues in a public cloud from three aspects. First, we investigate a new threat called power attack in the cloud. Second, we perform a systematical measurement on the public cloud to understand how cloud vendors react to existing security threats. Finally, we propose a novel technique to perform data reduction on audit data to improve system capacity, and hence helping to enhance security in cloud. In the power attack, we exploit various attack vectors in platform as a service (PaaS), infrastructure as a service (IaaS), and software as a service (SaaS) cloud environments. to demonstrate the feasibility of launching a power attack, we conduct series of testbed based experiments and data-center-level simulations. Moreover, we give a detailed analysis on how different power management methods could affect a power attack and how to mitigate such an attack. Our experimental results and analysis show that power attacks will pose a serious threat to modern data centers and should be taken into account while deploying new high-density servers and power management techniques. In the measurement study, we mainly investigate how cloud vendors have reacted to the co-residence threat inside the cloud, in terms of Virtual Machine (VM) placement, network management, and Virtual Private Cloud (VPC). Specifically, through intensive measurement probing, we first profile the dynamic environment of cloud instances inside the cloud. Then using real experiments, we quantify the impacts of VM placement and network management upon co-residence, respectively. Moreover, we explore VPC, which is a defensive service of Amazon EC2 for security enhancement, from the routing perspective. Advanced Persistent Threat (APT) is a serious cyber-threat, cloud vendors are seeking solutions to ``connect the suspicious dots'' across multiple activities. This requires ubiquitous system auditing for long period of time, which in turn causes overwhelmingly large amount of system audit logs. We propose a new approach that exploits the dependency among system events to reduce the number of log entries while still supporting high quality forensics analysis. In particular, we first propose an aggregation algorithm that preserves the event dependency in data reduction to ensure high quality of forensic analysis. Then we propose an aggressive reduction algorithm and exploit domain knowledge for further data reduction. We conduct a comprehensive evaluation on real world auditing systems using more than one-month log traces to validate the efficacy of our approach.
APA, Harvard, Vancouver, ISO, and other styles
15

Wright, Lynn M. "The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44693.

Full text
Abstract:
Approved for public release; distribution is unlimited
The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, a review of the Boston Marathon bombings uncovered that important risk-based information was not shared with local law enforcement. Concerning domestic terrorism, the United States may, once again, be failing to connect the dots. This thesis synthesizes existing studies, reports, and expert testimony concerning domestic terrorism and the roles of domestic intelligence agencies, law enforcement, and the public, and proposes the development and implementation of a formal, national counterterrorism (CT) doctrine. The CT doctrine, in conjunction with a counter-radicalization strategy, should focus on bottom-up intelligence/information-sharing, training to strengthen and focus intelligence collection efforts, and culturally sensitive and engaging messaging on social media and the Internet to counter extremist propaganda.
APA, Harvard, Vancouver, ISO, and other styles
16

Frauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.

Full text
Abstract:
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
APA, Harvard, Vancouver, ISO, and other styles
17

Byman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.

Full text
Abstract:
The aim of this thesis was to research connected devices security threats in comparison to mitigating security solutions. Furthermore, a focused case study of a real world connected devices, an Activity Tracker, was selected to explore and analyze its implemented security solutions. In order to give a wider perspective of connected devices an analysis of connected device categorization was investigated along with other impacting factor. From the viewpoint of security threats and solutions the connected devices categorizations were abstracted to consumer, business, and government market sectors. A key factor, which additionally plays a role in a connected device selected and implemented security solution, is the selling price point. Security principles and threat identification methods were introduced as a foundation from which security threats can be defined. The security principles of confidentiality, authentication, integrity, availability, and non-repudiation are examined. While attack trees and threat modeling, in particular STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege), is introduced for threat identification. The introduction of security solutions starts with a connected devices ecosystem breakdown into the overarching elements of security. Then the enablers of security are established as secure boot, identification, authentication, secure communicators, data security, intrusion prevention, security monitoring, secure updates and secure hardware. The case study considers the relevant security threats of the Activity Tracker and its ecosystem. Followed by selected security feature tests of the Activity Tracker and its Bluetooth communication channel to a mobile phone. The results show that implemented security often is unable to address all security threats. However, the connected device manufactures may balance the possible threat risks to the cost of implementing a security solution by gauging the threat to be acceptable in relationship to its impact
Tämän opinnäytetyön tavoitteena oli selvittää verkottuneiden laitteiden turvallisuusuhkia ja verrata niitä saatavilla oleviin turvallisuusratkaisuihin. Olemassa olevista kytketyistä laitteista valittiin tarkasteluun yhden valmistajan aktiivisuusmittari, jonka turvallisuusratkaisut tutkittiin ja analysoitiin. Verkottuneet laitteet luokiteltiin vaikuttavan tekijän mukaan, jotta saatiin laajempi näkemys laitteista. Verkottuneiden laitteiden luokittelu jaoteltiin turvallisuusuhkien ja -ratkaisujen näkökulmasta kuluttajien, yritysten ja valtion markkinasektoreihin. Keskeinen tekijä valitun laitteen tietoturvaratkaisuun on laitteen myyntihinta. Tietoturvallisuuden ja tietoturvauhkien määrittelymetodit muodostavat perustan, josta turvallisuusuhkat voidaan määritellä. Tietoturvauhkia voitiin määritellä käyttämällä tietoturvan periaatteita ja uhkien tunnistamisen menetelmiä. Valitusta laitteesta tutkitaan tietoturvaperiaatteet luottamuksellisuuden, todennuksen, eheyden, saatavuuden ja kiistämättömyyden osalta. Uhan tunnistaminen otetaan käyttöön säännöllisessä STRIDEssa (Spoofing = väärentäminen, Tampering = manipulointi, Repudiation = torjuminen, Information Disclosure = tiedon julkistaminen, Denial of Service = palvelun esto ja Elevation of Privilege = käyttöoikeuksien luvaton laajentaminen). Tietoturvaratkaisujen johdanto alkaa luokittelemalla verkottuneiden laitteiden ekosysteemit kattavasti turvallisuuteen liittyviin tekijöihin. Turvallisuuden mahdollistavat suojattu käynnistys, tunnistaminen, todentaminen, suojatut yhteydet, tietoturva, tunkeutumisen esto, turvallisuuden seuranta, turvallisuuspäivitykset sekä suojattu laitteisto. Tutkimus käsittelee aktiivisuusmittarin ja sen ekosysteemin merkityksellisiä tietoturvauhkia. Valitut turvallisuusominaisuudet aktiivisuusmittarin ja älypuhelimen välisestä bluetooth-yhteydestä testattiin. Tulokset osoittavat, että käytetty turvallisuusratkaisu ei usein pysty käsittelemään kaikkia turvallisuusuhkia. Kuitenkin verkottuneiden laitteiden valmistajat voivat tasapainoilla mahdollisten uhkiin liittyvien riskien ja käytetyn turvallisuusratkaisun kustannusten välillä suhteuttamalla uhkan riskit ja vaikutukset
APA, Harvard, Vancouver, ISO, and other styles
18

Marchenko, Maksym. "Understanding and analysis of cyber threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50999.

Full text
Abstract:
1.Apple Inc. Risk Assessment and Threat Modeling. Retrieved on 07/08/2014 from https://developer.apple.com/library/ios/documentation/Security/Conceptual/Security_Overview/ ThreatModeling/ThreatModeling.html 2.Cyber Squared Inc. Cyber Threat Analysis, not just for the Military. Retrieved on 07/08/2014 from http://www.cybersquared.com/2012/02/cyber-threat-analysis-not-just-for-themilitary/ 3.Goel, S. & Chen, V. (2005). Information Security Risk Analysis – A Matrix-based Approach. Retrieved on 07/08/2014 from http://www.albany.edu/~GOEL/publications/goelchen2005.pdf 4.Hughe, J. & Cybenko, G. (2013). Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity. Retrieved on 07/08/2014 from http://timreview.ca/article/712 5.Hulme, G. (2014). CSOs need to more precisely understand the actual threats facing their organization. The fix? Threat modeling. Retrieved on 07/08/2014 from http://www.csoonline.com/article/2134353/strategic-planning-erm/can-threat-modeling-keepsecurity-a-step-ahead-of-the-risks-.html 6.Mateski, M., Trevino, C., Veitch, C., Michalski, J., Harris, J., Maruoka, S., Frye, J. (2012). Cyber Threat Metrics. Retrieved on 07/08/2014 from http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-065.pdf 7.Microsoft. Threat Modeling Principles. Retrieved on 07/08/2014 from http://msdn.microsoft.com/en-us/library/ff648644.aspx 8.MSM. Cyber Intelligence Threat Analysis. Retrieved on 07/08/2014 from http://measurablesecurity.mitre.org/directory/areas/threatanalysis.html 9.Richards, K. (2014). RSA 2014: HP exec says security threat analysis should guide strategy.
A threat could be anything that leads to interruption, meddling or destruction of any valuable service or item existing in the firm’s repertoire. Whether of “human” or “nonhuman” origin, the analysis must scrutinize each element that may bring about conceivable security risk. Cyber threat analysis is a process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber attacks.
Загрозою може бути все, що призводить до переривання, втручання або знищення будь-якої цінної послуги чи предмета, що існує в репертуарі фірми. Незалежно від того, чи є вони «людським» чи «нелюдським», аналіз повинен ретельно вивчити кожен елемент, який може спричинити можливий ризик безпеки. Аналіз кіберзагроз - це процес, у якому знання про внутрішні та зовнішні інформаційні вразливості, що стосуються певної організації, поєднуються із реальними кібератаками.
APA, Harvard, Vancouver, ISO, and other styles
19

Lysenko, Julia Vladimirovna, and Юлія Володимирівна Лисенко. "5G-technology: social advantaged and threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51667.

Full text
Abstract:
References: 1. Understanding 5G [Electronicresource]. − Retrievedfrom:http://www. 2.Perspekty`vy` rozvy`tku 5G zv’yazku.Olejnikova A.V., Nurtaj M.D., Shmanov N.M. Suchasnimaterialy`, texnika i texnologiyi. [Перспективи розвитку 5G зв’язку. Олейнікова А.В., Нуртай М.Д., Шманов Н.М. Сучасні матеріали, техніка і технології.] 2015. № 2 (2). С. 233- 2
The development of information technology in the modern world is one of the most important factors that significantly affects the pace and achievement of scientific and technological progress. All spheres of human activity are considered only depending on the ways of information exchange, whose importance is constantly growing. 5G is the fifth generation of wireless network. It will be based upon the combination of the existing wireless technologies like GSM, Wi-Fi, LTE etc and the new radio access technologies. Most people can do their own works within seconds with new technology.5th generation technology comes with many features that are beneficial for all group of people including, students, professionals (doctors, engineers, teachers, governing bodies, administrative bodies, etc.).
Розвиток інформаційних технологій у сучасному світі є одним із найважливіших факторів, що суттєво впливає на темпи та досягнення науково-технічного прогресу. Всі сфери людської діяльності розглядаються лише залежно від способів обміну інформацією, значення яких постійно зростає. 5G - це п’яте покоління бездротових мереж. Він буде заснований на поєднанні існуючих бездротових технологій, таких як GSM, Wi-Fi, LTE тощо та нових технологій радіодоступу. Більшість людей можуть виконати власні роботи за лічені секунди за допомогою нової технології. Технологія 5-го покоління має безліч функцій, корисних для всієї групи людей, включаючи студентів, професіоналів (лікарів, інженерів, викладачів, керівні органи, адміністративні органи тощо).
APA, Harvard, Vancouver, ISO, and other styles
20

BERTOLAJA, LETIZIA. "LOCATION SHARING: PRIVACY THREATS AND PROTECTION." Doctoral thesis, Università degli Studi di Milano, 2015. http://hdl.handle.net/2434/265334.

Full text
Abstract:
In recent years there has been a growing increase in the number of users that use smartphones,tablets, wearable technologies and other devices that users have with them constantly. The capability of these latest generation mobile devices to detect the position of the users has led to the emergence of ad-hoc services as well as geo-aware social networks (GeoSN). Even if the sharing of our locations can enhance many useful services, there are several practical cases that unveil the danger of sharing location indiscriminately. For instance, let’s suppose that a user has just told everyone that he is on vacation (and not at his house): if he adds how long his trip is, then thieves know exactly how much time they have to rob him. Many contributions in the scientific literature have shown how through the location information it is possible to infer several information about the user. It has been shown that it is possible to identify user’s identity, if he is anonymous in the LBS, and, if the user is not anonymous, it is feasible to infer user’s home location, habits and also politic preferences and sexual orientation. The scientific literature reflects this concerns, proposing many contributions that deal with privacy, in general, and location privacy, specifically. This dissertation deals with location privacy in Location Based Services and Geo-Social Networks. The goal is two-fold: on one hand we want to motivate the importance of the location privacy topic by identifying the privacy threats of sharing locations. In particular we study a new privacy threat, the co-location threat, and we further study an already known threat stemming from the use of distance preserving transformations.On the other hand, we want to propose privacy preserving techniques and tools: we propose a novel privacy preserving technique as well as presenting three (spatial and/or temporal) cloaking techniques, specifically designed for privacy techniques in which the privacy is granted by the use of a location’s generalisation.
APA, Harvard, Vancouver, ISO, and other styles
21

Rucks, Lana Juliette. "Me, women, and math the role of personal and collective threats in the experience of stereotype threat /." Columbus, Ohio : Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1204661976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Leikvangen, Aleksander. "Empty threats? : A game-theoretic analysis of the credibility of Israel's threat to attack Iran's nuctear facilities." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for sosiologi og statsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25717.

Full text
Abstract:
The conflict over the looming threat of Iran’s alleged ongoing development of a nuclear bomb has been one of the more potent and discussed problems on the international arena since the nuclear program was discovered in 2002. After several unsuccessful diplomatic efforts to halt the development Israel has issued threats to militarily strike Iranian nuclear facilities. The purpose of this study is to evaluate the credibility of these threats to create a better understanding of the current status of the conflict. By analyzing the preferences and the military strategies available I created a game theoretic model that shows that Israeli escalation will, even with a successful strike, end up weakening the Israeli power position, thereby rendering an Israeli attack irrational. This is due to the Iranian options of creating new theaters of war at Israel’s borders through Hezbollah and Hamas and the potential escalation of a new Intifada. The conclusion of this study is that the cost of the expected Iranian retaliation as well as significant operational hazard connected to a strike, with uncertain prospects for success as well as potential high costs, is the main reason why Israel has not acted on its threats. Adding to this is that the Israeli threats have been unclear as to where the line is drawn and what will effectuate that Israel carries through. These factors are the cause of a significant lack of credibility in the Israeli threats.
APA, Harvard, Vancouver, ISO, and other styles
23

Rucks, Lana J. "Me, women, and math: The role of personal and collective threats in the experience of stereotype threat." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1204661976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hartline, Cecil L. Jr. "Examination of Insider Threats| A Growing Concern." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10687276.

Full text
Abstract:

The National Infrastructure Advisory Council (NAIC) reports that "...preventing all insider threats is neither possible nor economically feasible..." because the threat is already behind perimeter defenses and often know exactly where vulnerabilities exist within organizations (Cline, 2016). The purpose of this research was to determine the prevalence of malicious and unintentional insider threats. Statistically, the numbers support the idea that insider threats are increasing and occurring more frequently. The true numbers, which only account for the incidents that were reported, may be higher than originally expected. The statistical numbers are likely to much higher because organizations fear reputational damage and client loss. Organizations give reasons such as not enough evidence for conviction or too hard to prove guilt. The result of the paper indicates that companies focus most of their resources on external threats and not the insider threat that is costlier to remediate and considered the most damaging of all threats. The research focuses on malicious and unintentional insider threats and how they are different. A 2018 Crowd Research Partners report found 90% of organizations believe they are vulnerable to insider attacks, while 53% of businesses confirmed they had experienced an insider threat in the past 12 months (Crowd Research Partners, 2017a). The insider threat is hard to manage because an organization not only need worry about their own employees they also must monitor and manage third-party vendors, partners, and contractors. However, with a combination of technical and nontechnical solutions, including an insider threat program, companies can detect, deter, prevent or at least reduce the impacts of insider threats. Abstract The National Infrastructure Advisory Council (NAIC) reports that "...preventing all insider threats is neither possible nor economically feasible..." because the threat is already behind perimeter defenses and often know exactly where vulnerabilities exist within organizations (Cline, 2016). The purpose of this research was to determine the prevalence of malicious and unintentional insider threats. Statistically, the numbers support the idea that insider threats are increasing and occurring more frequently. The true numbers, which only account for the incidents that were reported, may be higher than originally expected. The statistical numbers are likely to much higher because organizations fear reputational damage and client loss. Organizations give reasons such as not enough evidence for conviction or too hard to prove guilt. The result of the paper indicates that companies focus most of their resources on external threats and not the insider threat that is costlier to remediate and considered the most damaging of all threats. The research focuses on malicious and unintentional insider threats and how they are different. A 2018 Crowd Research Partners report found 90% of organizations believe they are vulnerable to insider attacks, while 53% of businesses confirmed they had experienced an insider threat in the past 12 months (Crowd Research Partners, 2017a). The insider threat is hard to manage because an organization not only need worry about their own employees they also must monitor and manage third-party vendors, partners, and contractors. However, with a combination of technical and nontechnical solutions, including an insider threat program, companies can detect, deter, prevent or at least reduce the impacts of insider threats.

APA, Harvard, Vancouver, ISO, and other styles
25

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
APA, Harvard, Vancouver, ISO, and other styles
26

Arenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.

Full text
Abstract:
Organizations are taking computer security more seriously every day, investing huge amounts of money in creating stronger defenses including firewalls, anti-virus software, biometrics and identity access badges. These measures have made the business world more effective at blocking threats from the outside, and made it increasingly difficult for hackers or viruses to penetrate systems. But there are still threats that put organizations at risk , this threats are not necessary from external attackers, in this paper we will analyze what are the internal threats in organizations, why are we vulnerable and the best methods to protect our organizations from inside threats.
APA, Harvard, Vancouver, ISO, and other styles
27

Lister, Anne-Marie. "Health anxiety and coping with health threats." Thesis, University of Oxford, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.249472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Grimal, Francis. "Threats of force : International Law and Strategy." Thesis, University of Reading, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.520114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Saari, Shane C. "Fusion centers securing America's heartland from threats." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5053.

Full text
Abstract:
Approved for public release; distribution is unlimited
The attacks of September 11, 2001, were a wakeup call for the United States. In the aftermath, the U.S. government created the Department of Homeland Security to coordinate the efforts of securing the nation's porous borders. One of the many tools developed to secure the nation was the development of a network of state and local fusion centers throughout the country. This thesis examines the effectiveness of fusion centers as a network of information collaboration to counter illegal activity by involving rural residents and local law enforcement as force multipliers in sparsely populated border states. This study incorporates case studies from the states of North Dakota and Washington, as both are northern tier states whose geographical diversities and challenges are representative of problems facing any northern border state. The results of this study suggest that fusion centers, while still in their infancy, are an effective tool to enhance information flow and provide leadership the ability to centralize efforts to leverage resources to counter both natural and manmade events.
APA, Harvard, Vancouver, ISO, and other styles
30

McLeish, Christina Rosemary. "Empty threats : reference failure and scientific realism." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Lattuada, Matteo [Verfasser]. "Threats to the Pontocaspian fauna / Matteo Lattuada." Gießen : Universitätsbibliothek, 2021. http://d-nb.info/1228829004/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

O'Sullivan, Paul. "Threats to identity and emotional well-being." Thesis, City University London, 2014. http://openaccess.city.ac.uk/6630/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Nobrega, Caroline Correa. "Amazon forest dieback: assessing vulnerabilities and threats." Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/5873.

Full text
Abstract:
Submitted by Erika Demachki (erikademachki@gmail.com) on 2016-08-05T18:37:46Z No. of bitstreams: 2 Tese - Caroline Correa Nobrega - 2016.pdf: 4990749 bytes, checksum: 427c1ea06410c4fb5c6092e4e2cc351d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2016-08-09T12:01:33Z (GMT) No. of bitstreams: 2 Tese - Caroline Correa Nobrega - 2016.pdf: 4990749 bytes, checksum: 427c1ea06410c4fb5c6092e4e2cc351d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2016-08-09T12:01:33Z (GMT). No. of bitstreams: 2 Tese - Caroline Correa Nobrega - 2016.pdf: 4990749 bytes, checksum: 427c1ea06410c4fb5c6092e4e2cc351d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2016-05-16
In recent years, it is increasing evidences about Amazon vunerability due to land use and climate changes. Because of a positive feedback system, in which impacts intensify other impacts, some models project to the end of the century a replacement of the Amazon forest by savanna formations or semi-arid (forest dieback). Several evidence has indicated a high vulnerability of the Amazon to global climate change and local environmental impacts triggered by human activities (eg conversion to agricultural areas, construction of roads and burns). However, they are still deeply unknown the general mechanisms and standards about how these impacts affect the forest. In this thesis, I developed works that aim contribute to discussions of the subject. In each chapter, I will consider a threat that is contributing to the degradation of the Amazon. Each of the three threats discussed in the following chapters are often cited as important drivers of forest dieback. In the first chapter I evaluated the impact of forest fires at different levels of diversity of trees in a forest area next to the Amazon-Cerrado transition. Our results suggest that communities of trees in burned areas are losing more phylogenetic and functional diversity per unit of species than in unburned areas. My results indicate the existence of selection of species based on phylogenetic and functional characteristics, representing a major force of change and impoverishment (functional and phylogenetically) of these communities. In the second chapter, using high resolution images (LiDAR and hyperspectral), I evaluated the impact of a intense drought in forest areas near Madre de Dios, Peru. Thus, my results support the idea that changes in regional climate may change the structure and function of the forest. In the third chapter, I evaluated how the construction of roads in the Brazilian Amazon has contributed to deforestation in an important group of protected areas of the Amazon: the Indigenous Lands. Based on the analysis of observed impacts, I propose the establishment of buffer zones (buffers) around these reserves to reduce the negative impacts of road construction planned to be built.
Nos últimos anos, tem surgido cada vez mais evidências que a Amazônia pode estar ameaçada em decorrências das mudanças regionais no clima e no uso do solo. Por causa de um sistema de retroalimentação positivo, em que impactos intensificam outros impactos, alguns modelos projetam para o final do século uma substituição da floresta amazônica por formações tipo savana ou semiáridas (forest dieback). Diversas evidências têm indicado uma alta vulnerabilidade da Amazônia às mudanças climáticas globais e aos impactos ambientais locais desencadeados por atividades humanas (e.g. conversão de áreas para agropecuária, construção de estradas e queimadas). Entretanto, são ainda profundamente desconhecidos os mecanismos e padrões gerais de como esses impactos afetam a floresta. Nesta tese, desenvolvi trabalhos que têm como objetivo contribuir para as discussões do tema. Em cada capítulo, abordarei uma ameaça que, de alguma forma, está contribuindo para a degradação da Amazônia. Cada uma das três ameaças discutidas nos próximos capítulos são, frequentemente, apontadas como importantes propulsores de forest dieback. No primeiro capítulo avaliei o impacto de incêndios florestais em diferentes níveis de diversidade de árvores de uma área florestal próxima à transição Amazônia-Cerrado. Nossos resultados sugerem que as comunidades de árvores das áreas queimadas estão perdendo mais diversidade filogenética e funcional por unidade de espécie do que nas áreas não queimadas. Nossos resultados indicam a existência de seleção de espécies com base em características filogenéticas e funcionais, que representam uma importante força de mudança e de empobrecimento (funcional e filogeneticamente) dessas comunidades. No segundo capítulo, usando imagens de alta resolução (LiDAR e hiperespectral), eu avaliei o impacto de um período de seca em áreas florestais próximas a Madre de Dios, Peru. Nossos resultados dão suporte a hipótese de que mudanças no clima regional modificam a estrutura e função da floresta. No terceiro capítulo, eu avaliarei de que forma a construção de estradas na Amazônia brasileira tem contribuído para o desmatamento que incide em um importante grupo de áreas protegidas da Amazônia: as Terras Indígenas. Com base na análise dos impactos observados, nós propomos o estabelecimento de zonas de amortecimento (buffers) em torno dessas reservas para reduzir os impactos negativos da construção de estradas planejadas para serem construídas.
APA, Harvard, Vancouver, ISO, and other styles
34

Jones, Andrew. "Threats to information systems and effective countermeasures." Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.

Full text
Abstract:
This thesis supports the hypothesis that the measurement of the potency of threat agents to information systems is a crucial element in the accurate calculation of the risks to which systems are subject and the subsequent management of those risks. It describes a series of papers that were published as the result of research that has been carried out into a range of information security issues. The research evolved over the period from 1995 from the underlying drive to identify means of proving improved protection for government and military information systems. Once the initial research was completed, further work was undertaken to resolve issues identified in completed research and also to address newly identified security issues. This document describes the relationship between the papers that were produced from the individual areas of research and address a range of related topics. This document examines the sources of threats to information systems and methods that can be employed to improve the process of managing and treating the risk that they create. It also addresses issues relating to areas of information security that have not been clearly understood and a provides a number of countermeasures that can be implemented to protect information systems in government, the commercial sector and in private use and a framework for the forensic investigation of incidents. As a result of this research, a clearer understanding has been gained of methods that can be implemented to improve the security of information systems at all levels and a threat methodology has been developed that is now taught in a number of countries and which has now been adopted by the UK Government for further development to meet their specific needs. The contribution to knowledge has been the development of advice on the security of information systems, a taxonomy for the investigation of incidents and a method for the measurement of threat.
APA, Harvard, Vancouver, ISO, and other styles
35

Zakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.

Full text
Abstract:
Inalienable part of the new economy is information technologies (IT) introduction and application in the all spheres of human activity. The permanent improvement of present information-communication technologies (ICT) and their application expansion are the part of strategic decisions and operative tasks for enterprises. But enterprises must spare enough attention for all aspects of the ICT-use, in order to know about the threats information safety in time. Insufficient attention to this problem often creates barriers for the effective development of the whole business and information infrastructure work in particular. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/7954
APA, Harvard, Vancouver, ISO, and other styles
36

Yoshimoto, Iku. "Terrorist Threats, Foreign Aid, and State Capacity." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1574841729915737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Costante, Delaney. "Endangered Species Act: Quantifying Threats Impacting Listing." W&M ScholarWorks, 2021. https://scholarworks.wm.edu/etd/1627047881.

Full text
Abstract:
With species increasingly becoming imperiled due to anthropogenic activities, conservation practitioners are tasked with determining conservation priorities in order to make the best use of limited resources. The United States’ Endangered Species Act (ESA) has two listing statuses into which imperiled species are placed to receive protections: Threatened or Endangered. In the first chapter, our objective was to identify differences between Threatened and Endangered species beyond what is outlined in their ESA definitions. To our knowledge, this is the first study to compare listing status for species protected by the ESA on the basis of types and number of threats they face. For six broad-scale threats (habitat modification, overutilization, pollution, species-species interactions, environmental stochasticity, and demographic stochasticity), we investigated whether there is a difference in the number and types of threats which impact Threatened and Endangered species at the time of their listing. We found that Threatened (X̄ = 2.9, SD = 1.4) and Endangered (X̄ = 3.0, SD = 1.1) species were faced by a similar number of threats at their time of their listing. The only broad-scale threat that disproportionately impacted Endangered species more than Threatened species was demographic stochasticity; Endangered species were 1.9 times (95% CI = 1.4 -2.7) more likely to have this threat than Threatened species. We found four finer-scale demographic stochasticity threats (few individuals in one population, few individuals in multiple populations, lack of reproduction, and genetic loss) to be strong predictors of Endangered status. The similarities in the number and types of broad-scale threats faced by Threatened and Endangered species suggest that changes recently made to the ESA may be detrimental to the recovery efforts of future Threatened species. In the second chapter, our objective was to identify temporal trends in threats facing the four major phyla protected by the United States Endangered Species Act: angiosperms, arthropods, mollusks, and vertebrates. For 24 threat types, we created models to determine whether there was a linear, quadratic, or pseudo-threshold association between year and the probability that a phylum was listed with a given threat. We were able to identify temporal trends for 79% of the 96 possible threat-phylum combinations. We found that angiosperms had the highest peak probability of being listed with the greatest number of threats (N = 10), followed by mollusks (N = 8) and more distantly by arthropods (N = 4) and vertebrates (N = 2). We found that vertebrates had the greatest number of threats (N = 16) for which the year with their greatest probability of their being listed with a threat was their most recent year of listing. The other three phyla were similar to each other for this metric, mollusks having 12 and angiosperms and arthropods each having 11 threats peak in their most recent year of listing. We only identified one threat/phylum combination for which the maximum probability of their being listed with a threat was in their first year of listing (i.e., the threat has been consistently decreasing): authorized take impacting angiosperms. Overall, we believe our findings can be used to assist conservation efforts by identifying which threats have been decreasing or stable over time and which have been increasing that are in need of more attention.
APA, Harvard, Vancouver, ISO, and other styles
38

Vale, Rita Ribeiro de Sousa Lacerda do. "Carnivores and anthropogenic habitats : threats or opportunities?" Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/22662.

Full text
Abstract:
Mestrado em Ecologia Aplicada
O crescimento da população humana tem levado a alterações globais pela transformação de habitats naturais em explorações agrícolas, florestais e áreas urbanizadas. V arias espécies, nomeadamente Carnívoros, encontraram uma forma de se adaptarem a zonas urbanas. Com este estudo pretendemos perceber se os habitats antropogénicos podem ser ameaças ou oportunidades para duas espécies de carnívoros, raposa vermelha (Vulpes vulpes) e gineta comum (Genetta genetta). Para tal, foram recolhidos dados de fatores ambientais dentro de duas áreas circulares de diâmetros fixos, correspondendo á área vital mínima e média de cada espécie e divididos em quatro hipóteses. A influência das variáveis ambientais sobre as duas espécies de carnívoros foi avaliada com base nos dados de abundância relativa e presenç - ausência de raposa e gineta. Os carnívoros foram amostrados com armadilhagem fotográfica. Os resultados mostram que o modelo de perturbação o que melhor explica os padrões de abundância das raposas, e que o modelo híbrido melhor explica a abundância relativa das ginetas. Foram também incluídas variáveis temporais para testar os padrões de atividade das espécies. A nossa hipótese de que a disponibilidade de recursos iria afetar positivamente as espécies foi refutada por não termos considerados os hábitos generalistas destas espécies. A nossa previsão de que zonas de eucalipto e folhosas iriam oferecer refúgio foi contrariada pela escolha de zonas urbanas pela raposa, possivelmente relacionada com a disponibilidade de refúgio e alimento, e a escolha de zonas próximas a eucalipto pela gineta, o que pode ser um falso positivo uma vez que pelo seu comportamento arborícola podem não ser tão facilmente registadas em locais com maior complexidade vegetal. Nós esperávamos que as variáveis antropogénicas tivessem um influência negativa na abundância relativa das espécies. No entanto, os nossos resultados mostram uma associação da raposa a zonas urbanas. A gineta está menos ativa durante o pôr do sol quando há maior atividade humana. A altitude teve um efeito significativo na abundância e presença de ginetas, talvez por estes animais estarem a usar vales, associados a cursos de água. No geral, a raposa parece ser menos afetada por habitats antropogénicos do que a gineta, provavelmente devido a sua capacidade de adaptação. Os habitats antropogénicos podem funcionar como ameaças mas podem ser melhorados para minimizar o seu efeito na vida selvagem e tornarem-se oportunidades. A amostragem de vida selvagem deve ser feita regularmente para a correta implementação de medidas de mitigação, que podem passar por passagens superiores e inferiores nas rodovias, reconfiguração da oresta e educação ambiental.
Human population growth is leading to global changes as natural habitat is transformed into farmlands, industrial forestry stands and urban areas with a negative impact on biodiversity. Several species, including carnivores, found a way to adapt to urban areas. This study aims to understand if anthropogenic habitat are threats or opportunities for two carnivore species: red foxes (Vulpes vulpes) and common genet (Genetta genetta). Data on environmental factor was collected within the average and minimum core area bu er of each species and pertaining to four hypothesis. The in uence of these environmental drivers on the two carnivore species was evaluated using the relative abundance and presence-absence data of red foxes and genets. Carnivores were sampled using camera-trap. Our results show that within both bu ers, the best model in the disturbance category best explains the relative abundance patterns of red foxes, while the the hybrid model (which comprises all best models of all categories) best explained the relative abundance of genets. A category including temporal variables was added to test species activity patterns. This category explained more of the deviance to the null model than spatial variables. We hypothesised that resources availability would have a positive e ect on species but failed to consider red foxes' and genets' generalists feeding behaviour. We predicted that both eucalyptus and broadleaf tree areas would provide refuge for both species. However,red foxes seem to explore urban areas, which can o er food, as genets chose eucalyptus areas as refuge. The latter can be a misleading results as the arboreal behaviour of this species can in uence records. We expected that anthropogenic variables would negatively in uence species' relative abundance and presence. Genets are less active during higher human activity periods, showing higher activity around dawn than around dusk, during most of the year. Altitude had a signi cant e ect on genets' relative abundance and presence. Perhaps because these animals are using river valleys. In general, red foxes seem to be less a ect by anthropogenic habitats then genets, probably because of this species high adaptability. Anthropogenic habitats can work as both threats and opportunities but can be improved in order to minimize its e ect on wildlife. Wildlife surveys should happen frequently in order to implement mitigation measures, such as under or over road passages, forest recon guration and environmental education. With these and other policies, habitats can become opportunities for wildlife.
APA, Harvard, Vancouver, ISO, and other styles
39

Schoubye, Harald. "Isaiah's Damascus oracle responding to international threats /." Theological Research Exchange Network (TREN), 1996. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Berthier, Robin G. "Advanced honeypot architecture for network threats quantification." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/9204.

Full text
Abstract:
Thesis (Ph.D.) -- University of Maryland, College Park, 2009.
Thesis research directed by: Reliability Engineering Program. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
41

Wraith, Jenna L. "Orchid conservation: Assessing threats and conservation priorities." Thesis, Griffith University, 2020. http://hdl.handle.net/10072/392403.

Full text
Abstract:
Globally, over a million species are threatened with extinction from habitat loss, climate change, over-exploitation as well as other anthropogenic activities. Orchids are particularly at risk in part due to their distinctive ecology including high species diversity, often limited geographic range for many species, and tight ecological relations with specific symbionts. They are the most diverse group of flowering plants with ~28,000 species and are found on all but one continent. However, due to increasing pressures from humans many orchids are threatened with extinction. It is therefore important to assess what is threatening them and where. Therefore, this thesis assesses threats to orchids at a global and continental scale to highlight the most significant threats to orchids, where orchids are threatened and by what, and to prioritise conservation actions and future research. The range and diversity of threats to orchids was globally assessed and mapped using data from the International Union for Conservation of Nature (IUCN) Red List (Chapter 2). For the 442 orchids on the Red List, the most common threats were biological resource use (80% species), agriculture (53%), human intrusion and disturbance (36%) and development (35%) and were most commonly found in Africa (predominantly Madagascar), South and East Asia and South America. These threats often interacted and co-occurred with four major threat syndromes. Understanding threat syndromes is vital for orchid conservation as they can create more consistent conservation planning and help focus efforts on the specific threats in a given region. Globally the scale and extent of tourism and recreation is increasing, including nature-based tourism. As a result, tourism and recreation is increasingly recognised as a threat to plants including orchids. Therefore, the extent and nature of tourism and recreation as a threat to orchids globally was also assessed in more detail using data from the IUCN Red List (Chapter 3). This demonstrated that 149 of the 442 listed orchids were threatened by tourism and recreation including impacts of residential and commercial development for tourism infrastructure (22%), intentional collecting within protected areas (17%), and human intrusion and disturbance from recreational activities (20%). Tourism and recreation threats were severe, impacting many populations of some orchids and causing rapid decline. These findings highlight how tourism and recreation can threaten specific groups of plants in diverse habitats, but particularly in forests and shrublands and these threats often co-occurred as threat syndromes. To better facilitate orchid conservation, a more detailed analysis of geographical patterns in threatened orchids and threats to orchids was conducted at a continental scale using a methodology that could be adapted to other threatened taxa (Chapter 4). By utilising data on threatened orchids from the Australian Government, combined with species occurrence data from the Atlas of Living Australia, the distribution of the most severe threats to orchids in Australia were mapped. This included identifying locations where habitat modification, changing fire regimes, grazing, weeds, tourism and recreation and illegal collection occurred, including where they co-occurred as threat syndromes. This study shows that the loss of native vegetation is a key driver of most threats, while increases within protected areas was associated with an increased threat from tourism and recreation. This study also provides critical information for formulating conservation and management strategies for threatened orchids and other species in a changing environment. To ensure the successful conservation of orchids, researchers need to understand research and conservation priorities at a global scale. Therefore, conservation and research priorities for orchid conservation were assessed (Chapter 5) using data on research publications on orchid conservation from Scopus, data on conservation priorities from the Red List, and species occurrence records from the Global Biodiversity Information Facility (GBIF). This study highlighted the increase in conservation research and important gaps as well as key conservation priorities which were analysed to guide recommendations on future priorities. Based on the results, orchid conservation and research globally should increasingly focus on monitoring population, trends and distributions including the impacts of climate change, ecology, threats and threat mitigation, protection and management of species and their habitats and increasing education and awareness. The research in this thesis demonstrated how orchids are significantly threatened by anthropogenic activities at a global and continental scale including impacts from habitat loss, illegal collecting, tourism and recreation, increased fire regimes and invasive species. However, it is also evident that climate change is underrepresented as a threat to orchids and needs to be considered in future research. These studies highlight the prevalence and importance of threat syndromes and provide novel methods for spatially assessing them. It is evident from these studies that orchid conservation will benefit from global collaboration and focussed conservation priorities.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Environment and Sc
Science, Environment, Engineering and Technology
Full Text
APA, Harvard, Vancouver, ISO, and other styles
42

Inci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.

Full text
Abstract:
With the abundance of cheap computing power and high-speed internet, cloud and mobile computing replaced traditional computers. As computing models evolved, newer CPUs were fitted with additional cores and larger caches to accommodate run multiple processes concurrently. In direct relation to these changes, shared hardware resources emerged and became a source of side-channel leakage. Although side-channel attacks have been known for a long time, these changes made them practical on shared hardware systems. In addition to side-channels, concurrent execution also opened the door to practical quality of service attacks (QoS). The goal of this dissertation is to identify side-channel leakages and architectural bottlenecks on modern computing systems and introduce exploits. To that end, we introduce side-channel attacks on cloud systems to recover sensitive information such as code execution, software identity as well as cryptographic secrets. Moreover, we introduce a hard to detect QoS attack that can cause over 90+\% slowdown. We demonstrate our attack by designing an Android app that causes degradation via memory bus locking. While practical and quite powerful, mounting side-channel attacks is akin to listening on a private conversation in a crowded train station. Significant manual labor is required to de-noise and synchronizes the leakage trace and extract features. With this motivation, we apply machine learning (ML) to automate and scale the data analysis. We show that classical machine learning methods, as well as more complicated convolutional neural networks (CNN), can be trained to extract useful information from side-channel leakage trace. Finally, we propose the DeepCloak framework as a countermeasure against side-channel attacks. We argue that by exploiting adversarial learning (AL), an inherent weakness of ML, as a defensive tool against side-channel attacks, we can cloak side-channel trace of a process. With DeepCloak, we show that it is possible to trick highly accurate (99+\% accuracy) CNN classifiers. Moreover, we investigate defenses against AL to determine if an attacker can protect itself from DeepCloak by applying adversarial re-training and defensive distillation. We show that even in the presence of an intelligent adversary that employs such techniques, DeepCloak still succeeds.
APA, Harvard, Vancouver, ISO, and other styles
43

Gong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.

Full text
Abstract:
With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. In this thesis, we examine 25 services that connected vehicles can provide. Entities, connections, and message flows in these services are investigated and synthesized into a vehicle network structure. The 25 services are divided into six use cases including: infotainment service, remote monitoring, device control, Vehicle-toeverything (V2X), diagnostics service, and in-vehicle Intrusion Detection System (IDS). We establish communication models for these use cases and analyze the potential threats based on Confidentiality, Integrity and Availability (CIA) criteria. We discuss possible countermeasures that can mitigate these threats based on existing network security techniques. Each alternative countermeasure’s advantages and limitations are presented. To filter possible attacks, we investigate and design firewalls in four components of a vehicle: Dedicated Short-Range Communications (DSRC) module, gateway, Telematic Control Unit (TCU), and Human-Machine Interface (HMI). We also simulate a firewall for an HMI application by building a communication model in Python.
Med den snabba utvecklingen av anslutna fordon har bilsäkerhet blivit ett av de viktigaste ämnena. För att studera hur man skyddar säkerheten för fordonskommunikation analyserar vi potentiella hot mot anslutna fordon och diskuterar motåtgärder för att mildra dessa hot. I denna avhandling undersöker vi 25 tjänster som anslutna fordon kan tillhandahålla. Entiteter, anslutningar och meddelandeflöden i dessa tjänster undersöks och syntetiseras i en fordonsnätverksstruktur. De 25 tjänsterna är indelade i sex användarvägar, inklusive: infotainment service, fjärrövervakning, enhetskontroll, Fordon-tillallt (V2X), diagnostikservice och IDS-system (Intrusion Detection System). Vi etablerar kommunikationsmodeller för dessa användningsfall och analyserar de potentiella hot som baseras på CIA-kriterier (Confidentiality, Integrity and Availability). Vi diskuterar eventuella motåtgärder som kan mildra dessa hot baserat på befintliga nätverkssäkerhetstekniker. Varje alternativ motåtgärds fördelar och begränsningar presenteras. För att filtrera eventuella attacker undersöker vi och utformar brandväggar i fyra delar av ett fordon: Dedicated Short-Range Communications (DSRC) -modul, gateway, Telematic Control Unit (TCU) och Human Machine Interface (HMI). Vi simulerar också en brandvägg för en HMI-applikation genom att bygga en kommunikationsmodell i Python.
APA, Harvard, Vancouver, ISO, and other styles
44

CARDAIOLI, MATTEO. "Human Interactions in Cybersecurity: Threats and Opportunities." Doctoral thesis, Università degli studi di Padova, 2022. http://hdl.handle.net/11577/3453659.

Full text
Abstract:
Over the years, many cybersecurity breaches have been attributed to human error, considering human factors as one of the weakest links in the security chain. In fact, human factors are exploited by cybercriminals, causing significant losses of money and reputation to organizations. According to Verizon’s 2021 Data Breach Investigations, 85% of breaches involved a human element, while 61% involved stolen or compromised credentials, causing an average breach cost of more than $3 million. To prevent cyberattacks, organizations focus on training employees and developing new policies, while also trying to maintain a balance between the complexity of security systems and their usability. However, the unpredictability of human behavior, the fast evolution of the digital world, and the increasing availability of technological resources for cybercriminals pose new and evolving cybersecurity challenges in anticipating both cyber threats in new environments and the rise of new threats in systems considered secure to date. On the other hand, the complexity and uniqueness of human behavior give new opportunities for designing new solutions to mitigate threats, improving the security of organizations and users. In this thesis, we investigate human interactions and cybersecurity, focusing on two ain aspects: (i) developing new attacks, based on human interaction, against existing and consolidated authentication methods (i.e., PIN pads), and (ii) proposing new methods leveraging human behavior in multiple contexts to enhance the security of users and organizations. The first part of this thesis demonstrates the effectiveness of three attacks against the security of PIN-based authentication systems, focusing on Automated Teller Machines (ATMs) PIN pads. ATMs have become an indispensable part of the banking ecosystem such that according to the European Central Bank, in 2019 only in Europe, more than 11 billion withdrawal and deposit transactions were made. In particular, we show how ATM PIN pads are exposed to security threats related to human factors even if users have policy-compliant behaviors. We analyze different attack scenarios depending on the sources of information available to the attacker (e.g., video, audio, thermal, typing style). The results show that in the worst-case scenario for the victim, our attacks can reconstruct up to 94% of the 5-digit PINs typed within three attempts. In the second part of this thesis, we show how the variability and unpredictability of human behavior can be exploited to increase the security of systems and users. We develop new human-based approaches focusing on three different contexts: (i) new methods for bot detection in social networks (i.e., Twitter) relying on the stylistic consistency of posts over time, (ii) a new framework for identifying fake and genuine expressions from videos, and (iii) a new de-authentication method based on the detection of physically blurred faces. Results demonstrate the efficacy of the proposed approaches, achieving an F1-score up to 98% in human-bot detection, an accuracy up to 90% in fake sadness detection, and accuracy in de-authenticating users up to 100% under 3 seconds of grace period. This thesis highlights the need for more effort in designing security solutions that focus on human factors, showing the direction for further investigation in analyzing human interactions in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
45

Reichling, Peter, P. G. Pererva, and T. V. Romanchik. "Determination of the essence of the economic security of the country." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.

Full text
Abstract:
The study of existing approaches to the definition of the state’s economic security has allowed us to suggest that the state’s economic security is a state of the state’s economy, for which sustainable and scientifically based methods have been created to neutralize the negative impact of internal and external threats, the necessary conditions are created for the state’s sustainable socio-economic development economic interests and improving the welfare of citizens.
APA, Harvard, Vancouver, ISO, and other styles
46

Yilmaz, Hasan. "Turkey and the Middle East : threats and opportunities." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA396581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bowling, Joshua D. "Future Naval Conflict: Asymmetric Threats and Commerce Raiding." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/478.

Full text
Abstract:
Maritime conflict in the next decade or three, when it happens, will not be the full-blown war that our carriers and strategic submarines are designed for. Instead, it will be economic warfare through the interdiction of maritime trade, harassment of naval vessels as rising nations attempt to expand their sphere of influence, and development of cheap (or uncounterable) technologies that keep potential adversaries or rivals at bay. All of this will take place in blue-water environments as access to the littorals is effectively denied by these new technologies. As it stands, the United States is inadequately prepared to face this possibility. This paper will examine how and why this strategy will arise, identify the most likely locations and actors, and explore how these scenario are likely to play out. Additionally, this paper will examine potential remedies that the United States (or other interested powers) could undertake to reduce the impact of these strategies, perhaps even avoiding their occurrence altogether.
APA, Harvard, Vancouver, ISO, and other styles
48

Bell, Paul Robert. "Securing the future : real threats or surreal illusions?" Thesis, Lancaster University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yung, Kwok-Wai, and 容國偉. "Emissions trading for Hong Kong opportunities and threats." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30110786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bailey, Daniel A. "Communicating homeland security threats government and public efforts." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5040.

Full text
Abstract:
Approved for public release; distribution is unlimited
The Department of Homeland Security (DHS) is widely criticized for poor performance, and much of its problem stems from its poor performance in public communications. DHS has not been able to earn the respect of the public and local officials, and that means that many Americans are not paying attention to important threat warnings and security based exercises. This ultimately means our homeland security is suffering and American citizens remain vulnerable to future terror attacks. This research project considers the public communication efforts of the Department of Homeland Security (DHS) by analyzing how both the Homeland Security Advisory System (HSAS) and National Exercise Program (NEP) continually fall short of effectively communicating security threats and warnings to the American public. By looking at two of its highest profile projects, HSAS and NEP, we see that the problems are largely the result of DHS taking too much of a top-down, federal approach. This thesis will argue that the highly centralized management and execution of both the HSAS and NEP fail to convey the importance of federal efforts to local levels of government and American citizens. This thesis will be a comparative case study of these two programs. I find that both programs are useful and necessary, but both can be improved by decentralizing the national exercise framework and communication efforts to local level officials who can better tailor information and response efforts pertinent to their communities. As the most important component of disaster relief and response, local level officials, who are typically overshadowed by national level personnel, can more effectively utilize federal exercise money and communicate threats the American public than DHS personnel can.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography