WorldWideScience

Sample records for detecting security threats

  1. Security Information and Event Management Tools and Insider Threat Detection

    Science.gov (United States)

    2013-09-01

    INFORMATION AND EVENT MANAGEMENT TOOLS AND INSIDER THREAT DETECTION by Christopher J. Callahan September 2013 Thesis Advisor: J.D. Fulp Co...1. REPORT DATE SEP 2013 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Security Information And Event Management Tools And...and reduces the overall insider threat to military networks. Security Information and Event Management (SIEM) tools can be used to identify potential

  2. Threat detection: a framework for security architects and designers of metropolitan rail systems

    Directory of Open Access Journals (Sweden)

    Hervé Borrion

    2014-01-01

    Full Text Available Metro rail systems (MRS currently face a serious threat from terrorist attacks – especially through use of explosives. The threat comes at a time when scores of new MRS are under construction or at the planning stage in cities across the world. Designers of these systems need to consider ways to detect explosives without an adverse impact upon passenger comfort and profitability. This paper presents a framework for designers to identify security functions in MRS, understand current methods of threat detection used in MRS and recognise their relationship with other operational requirements. Application of this framework at the planning stage can assist in designing systems where terrorist threats can be better addressed with reduced impact on passenger experience and MRS operations. The application of a framework of analysis inspired by Ekblom’s work to nine functioning MRS yields a concise representation of the major design issues architects and security specialists have to consider for effective integration of security systems in stations.

  3. INFORMATION SYSTEM SECURITY THREATS CLASSIFICATIONS

    Directory of Open Access Journals (Sweden)

    Sandro Gerić

    2007-06-01

    Full Text Available Information systems are exposed to different types of security risks. Theconsequences of information systems security (ISS breaches can vary from e.g. damaging the data base integrity to physical "destruction" of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or with significant interruptions in information systems functionality. The sources of security risks are different, and can origin from inside or outside of information system facility, and can be intentional or unintentional. The precise calculation of loses caused by such incidents is often not possible because a number of small scale ISS incidents are never detected, or detected with a significant time delay, a part of incidents are interpreted as an accidental mistakes, and all that results with an underestimation of ISS risks. This paper addresses the different types and criteria of information system security risks (threats classification and gives an overview of most common classifications used in literature and in practice. We define a common set of criteria that can be used for information system security threats classification, which will enable the comparison and evaluation of different security threats from different security threats classifications.

  4. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  5. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  6. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  7. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  8. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  9. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  10. XRIndex: A brief screening tool for individual differences in security threat detection in x-ray images

    Directory of Open Access Journals (Sweden)

    Elena eRusconi

    2015-08-01

    Full Text Available X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported Attention to Detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012. Here we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals.

  11. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  12. Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments

    Science.gov (United States)

    2010-11-01

    language to define the various behaviors that threats exhibit over time. We conclude that a more formal model of trust is needed that couples identity with...N., Seltzer, M., and Vansummeren, S., “Provenance: a future history,” OOP - SLA ’09: Proceeding of the 24th ACM SIGPLAN conference companion on Object...oriented programming systems languages and applications, ACM, New York, NY, USA, 2009, pp. 957–964. [15] Gray, E., marc Seigneur, J., Chen, Y., and

  13. Security Threats in the 21st Century

    Science.gov (United States)

    2006-11-01

    Power Conflict • Rise of China • Rise of India • Return of Russia • EU-Europe and NATO • Japan’s dilemma • Changing alliances? Threat 2 Climate Change...tomorrow. Anon. Security Threats 1. Return of great power conflict 2. Climate change 3. Uneven development 4. Overpopulation , migration, pandemics...Threat 4 Overpopulation , Migration, Pandemics • Climate change means overpopulation • Mass migrations are unstoppable • Migrations mean conflict and

  14. Insider Threat and Information Security Management

    Science.gov (United States)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  15. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  16. Threats to financial system security

    Energy Technology Data Exchange (ETDEWEB)

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  17. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  18. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  19. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  20. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Bartoszcze, M.

    2007-01-01

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  1. Intelligent Recognition of Acoustic and Vibration Threats for Security Breach Detection, Close Proximity Danger Identification, and Perimeter Protection

    Science.gov (United States)

    2011-03-01

    tested with different types of the horse gaits, namely walk as a 4-beat gait, trot as a 2-beat gait, canter as a 3-beat gait, and gallop as...threat by smart fence sensors is the plan for the future work. ABOUT THE AUTHORS Theodore W. Berger, PhD, is the David Packard Professor of

  2. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  3. Transregional Threats and Maritime Security Cooperation

    Science.gov (United States)

    2017-08-01

    disputes with Vietnam and Taiwan), and the Spratly Islands (disputes with Vietnam , Malay- sia, Brunei, the Philippines, and Taiwan). In addition...continue to grow. As of 2015, China’s coast guard had 205 ships, more than the combined coast guards of Japan, Vietnam , Indonesia, Malaysia, and the...communication on which both economies depend. Both countries are concerned with non-traditional security threats such as piracy, terrorism at sea, and

  4. Network Intrusion Detection with Threat Agent Profiling

    Directory of Open Access Journals (Sweden)

    Tomáš Bajtoš

    2018-01-01

    Full Text Available With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator’s work. We applied clustering methods for security incident profiling. We consider K-means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network traffic, but we focus on grouping similar threat agents based on attributes of security events. We suggest a case of a fine classification and a case of a coarse classification and discuss advantages of both cases.

  5. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  6. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  7. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  8. Security Threats in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios

    2011-01-01

    . Security and privacy are rapidly replacing performance as the first and foremost concern in many sensor networking scenarios. While security prevention is important, it cannot guarantee that attacks will not be launched and that, once launched, they will not be successful. Therefore, detection of malicious...... intrusions forms an important part of an integrated approach to network security. In this work, we start by considering the problem of cooperative intrusion detection in WSNs and develop a lightweight ID system, called LIDeA, which follows an intelligent agent-based architecture. We show how such a system...... networks are. Motivated by this unexplored security aspect, we investigate a new set of memory related vulnerabilities for sensor embedded devices that, if exploited, can lead to the execution of software-based attacks. We demonstrate how to execute malware on wireless sensor nodes that are based...

  9. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  10. The cyber security threat stops in the boardroom.

    Science.gov (United States)

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  11. Influence of security threats on tourism destination development

    Directory of Open Access Journals (Sweden)

    Kurež Bojan

    2015-01-01

    Full Text Available The aim of the paper is to analyze the modern security environment and its impact on tourism destination development. Contemporary security environment is a result of historical events affected by the elements of the contemporary safety and political environment. Ground security concepts, which dominate contemporary security environment, are pointed out and further linked to the development of the modern security threats shaping tourism destination development. We are pointing out how the major security threats influence the tourism destination development. Methodology is based on secondary analysis of literature. Several current case studies are made to support conclusions on relationship between security and tourism destination developments.

  12. Anomaly Detection of IP Header Threats

    OpenAIRE

    S.H.C. Haris, Ghossoon M. Waleed, R.B. Ahmad & M.A.H.A. Ghani

    2011-01-01

    Threats have become a big problem since the past few years as computerviruses are widely recognized as a significant computer threat. However, the roleof Information Technology security must be revisit again since it is too often. ITsecurity managers find themselves in the hopeless situation of trying to uphold amaximum of security as requested from management. At the same time they areconsidered an obstacle in the way of developing and introducing newapplications into business and government...

  13. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  14. Redefining Maritime Security Threats in the Eastern Indian Ocean Region.

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Arjun [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    This occasional paper analyzes the general security issues and trends relating to maritime trafficking of radiological and nuclear material using small vessels, minor ports, and unchecked areas of coastline existing in the Eastern Indian Ocean Region today. By the Eastern Indian Ocean Region is meant the area starting from the tip of the Indian peninsula in the west to the Straits of Malacca in the east. It lays focus on the potential sources of nuclear or radiological material that may be trafficked here. It further undertakes a study of the terrorist groups active in the region as well as the multinational or national interdiction organizations that have been created to counter maritime threats. It also seeks to discern the various technologies for detecting materials of concern available in the area. Finally, it ascertains possible methods and technologies to improve the maritime security system in the region.

  15. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  16. National Security Threats at the U.S.-Mexico Border

    Science.gov (United States)

    2011-04-24

    from Latin America. There are enhanced “push” factors of overpopulation , civil unrest, unemployment, poverty and violence. Then there are the “pull...national security threat. Nevertheless, it should be addressed concurrently with border security. Securing the border will facilitate the resolution of

  17. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2017-01-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  18. FACTORS OF PERSONNEL SECURITY THREATS IN THE ORGANIZATION

    Directory of Open Access Journals (Sweden)

    Anastasiya Yu. Timofeeva

    2017-06-01

    Full Text Available The study of factors that influence the occurrence of threats is of particular importance in the theory and practice of ensuring personnel security in the organization. The article aims at the identification of major threats to the organizational personnel security. As the latter, we suggest considering a set of causes related to the intention of the employee/ employer to harm each other and determine the ability to causes harm. Based on the content analysis of publications we identified the main causes of threats to the personnel security of organization, sources of hazardous factors origin. Consequently, we compiled a list of personnel security threats consisting of 18 items. The authors assessed the acuteness and urgency of threats, their impact on the state of personnel security in the organizations (a study was carried out on the example of Irkutsk region. Using the technique of factor analysis, we extracted factors of personnel security threats in the organization, interpreted as the existence of vulnerabilities in the security system, poor quality of the labor force and its moral and ethical capacities, shortcomings and mistakes in the area of implemented personnel policy and in the policy of personnel security. The applied methods of analysis are as follows: content analysis; analysis of frequency tables and contingency tables; correlation and factor analysis. Materials of the expert survey conducted in the Irkutsk region (2015 serves as the analysis base. Kendall’s coefficient of concordance confirmed agreement among the experts. Obtained results can be used to investigate and identify personnel security threats in the organization, can form the basis for prediction and analysis of personnel security threats, for development of methods of their prevention.

  19. National security and the impact of cyber threats on the average citizen

    CSIR Research Space (South Africa)

    Jansen van Vuuren, JC

    2010-09-01

    Full Text Available The presentation addresses national security issues and the impact of cyber threats on the average citizen. It classifies cyber threats, analysis national security and provides security tips to safeguard the individual against cyber threats....

  20. Threat Prioritization Process for the Czech Security Strategy Making

    Directory of Open Access Journals (Sweden)

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  1. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  2. Threats and Challenges in Reconfigurable Hardware Security

    OpenAIRE

    Kastner, Ryan; Huffmire, Ted

    2008-01-01

    Computing systems designed using reconfigurable hardware are now used in many sensitive applications, where security is of utmost importance. Unfortunately, a strong notion of security is not currently present in FPGA hardware and software design flows. In the following, we discuss the security implications of using reconfigurable hardware in sensitive applications, and outline problems, attacks, solutions and topics for future research.

  3. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  4. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  5. Quantifying Security Threats and Their Impact

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2009-01-01

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper we illustrate this infrastructure by means of a sample example involving an e-commerce application.

  6. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  7. Gsm Networks: A Review Of Security Threats And Mitigation Measures

    African Journals Online (AJOL)

    Gsm Networks: A Review Of Security Threats And Mitigation Measures. ... Information Manager (The) ... This paper investigates the security measures used in GSM networks which include Authentication, Encryption, Equipment Identification and Subscriber Identity Confidentiality, as well as the manifestation of network ...

  8. Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis

    OpenAIRE

    Olandersson, Sandra; Fredsson, Jeanette

    2001-01-01

    To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful ...

  9. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  10. Threats to economic security of the region

    OpenAIRE

    Y. A. Salikov; I. I. Zolotareva; T. A. Borodkina

    2017-01-01

    Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level) and actual problem...

  11. Nonproliferation, Nuclear Security, and the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  12. Collective Study On Security Threats In MANET

    Directory of Open Access Journals (Sweden)

    Muhammad Zunnurain Hussain

    2017-01-01

    Full Text Available In this paper the authors will be discussing the security issues in MANET amp the methods to protect it. Authors will be talk about related work in securing the network different type of attacks how to sense these sorts of attack what are the features of MANET then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested So that the users can use proper authentication techniques and network resources can be properly utilized.

  13. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...

  14. Virus threat and secure code distribution

    Energy Technology Data Exchange (ETDEWEB)

    Burnham, B.W.

    1985-01-01

    A virus program is an auto-relocating program that carries within it a Trojan Horse that, conceptually at least, may cooperate with other efforts in the defeat of whatever security features are operational on the attacked system. Countermeasures are discussed.

  15. DEVELOPMENT OF INFORMATION SECURITY INSIDER THREAT CLASSIFICATION USING INCIDENT CLUSTERING

    Directory of Open Access Journals (Sweden)

    A. S. Zaitsev

    2016-10-01

    Full Text Available Effective information security insider threat countermeasure requires knowledge and understanding of actual insider threats and methods of their realization. The article represents analysis of existing insider threat’s and intruder’s classifications. This analysis elicited an absence of comprehensive and consistent classification nowadays. Basing of this outcome a method of insider threat classification development using clustering of incidents was introduced. For this purpose an insider incident database was created and filled with 500 open source incidents. For determination of classification criterions and criterions of result estimation an analysis of gathered statistics was carried out. Using modeling framework IBM SPSS Modeler incident clustering was conducted basing on the following algorithms: k-means, two-step clustering algorithm, Cohonen self-organizing maps. Basing on incident clustering an information security insider threat classification was developed.

  16. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  17. Vision-based threat detection in dynamic environments.

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  18. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  19. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  20. Impact of Human Security Threats on Leadership and Political ...

    African Journals Online (AJOL)

    Human security threats in contemporary Africa have become a major political challenge. Whether it involves sectional conflicts, kidnapping, human trafficking, armed robbery they have continued to exert a far reaching impact on the leadership and political stability in the region. This paper is therefore an attempt to examine ...

  1. Food security — Seeds of threat, seeds of solutions | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-08

    Feb 8, 2011 ... Ironically, plant breeders' very success in developing new high-yielding cereal varieties over the last decades could lead to a gradual loss of plant species, threatening the world's future food security. Even more ironic, this threat can be overcome only with the help of small farmers in remote areas of the ...

  2. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  3. Present and potential security threats posed to civil aviation

    Directory of Open Access Journals (Sweden)

    Stanislav SZABO

    2012-06-01

    Full Text Available Aircraft presents ideal object for terrorist attack. Apart from the risks posed by possible terrorist attacks on airborne aircraft, air terrorism includes the threats to general aviation on the ground, including airports and surrounding infrastructure. Air oriented terrorism in all of its forms can undermine public confidence in the safety of air travel, which could result in negative effects for certain airlines and other firms in aviation industry due to decline in passenger travel and cargo shipment. This article is giving an overview about the redoubtable present and potential future threats posed to in-flight security, and possibilities and solutions how to mitigate the risks on acceptable level.

  4. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  5. Computer Security of NPP Instrumentation and Control Systems: Cyber Threats

    International Nuclear Information System (INIS)

    Klevtsov, A.L.; Trubchaninov, S.A.

    2015-01-01

    The paper is devoted to cyber threats, as one of the aspects in computer security of instrumentation and control systems for nuclear power plants (NPP). The basic concepts, terms and definitions are shortly addressed. The paper presents a detailed analysis of potential cyber threats during the design and operation of NPP instrumentation and control systems. Eleven major types of threats are considered, including: the malicious software and hardware Trojans (in particular, in commercial-off-the-shelf software and hardware), computer attacks through data networks and intrusion of malicious software from an external storage media and portable devices. Particular attention is paid to the potential use of lower safety class software as a way of harmful effects (including the intrusion of malicious fragments of code) on higher safety class software. The examples of actual incidents at various nuclear facilities caused by intentional cyber attacks or unintentional computer errors during the operation of software of systems important to NPP safety.

  6. A Scope for MANET Routing and Security Threats

    Directory of Open Access Journals (Sweden)

    Lathies Bhasker T

    2013-12-01

    Full Text Available The mobile Ad-hoc networks (MANET are wireless networks which utilize mobile nodes for communicating among them and in the external transmission range. The vulnerable nature of the network causes various security threats which upset its growth. In this survey, initially the existing security attacks in MANET are analyzed. The attacks categories fall under two stages that include internal and external attacks. The former attack is due to the malicious nodes within the network and later attack is caused by the nodes which do not belong to the network. Then the secure, efficient dynamic routing techniques which are main issues concerned with ad hoc networks are surveyed. Overall, our survey mainly concentrates the existing security attacks and possible routing solution in MANET.

  7. Matrix Characterization in Threat Material Detection Processes

    International Nuclear Information System (INIS)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-01-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  8. Nuclear security: A global response to a global threat

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2016-01-01

    The threat of nuclear terrorism is real. The possibility of criminals getting hold of nuclear and other radioactive material cannot be ruled out. Much progress has been made in tackling this threat nationally, regionally and globally, but more needs to be done. International cooperation is vital. As the global platform for cooperation in nuclear security, the IAEA helps countries to establish and maintain robust and sustainable national nuclear security regimes. We help ensure that measures are taken to protect nuclear and other radioactive material, as well as the facilities in which such material is housed, from malicious acts. This has been an important year for nuclear security with the entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material. This establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. I encourage all countries that have not yet done so to adhere to this Amendment and thereby contribute to a stronger global nuclear security regime. In this edition of the IAEA Bulletin, you will learn about the different areas of security where our work is making a real difference. We highlight the progress made in a number of countries.

  9. RUSSIA'S ECONOMIC SECURITY: THREATS TO NATIONAL INTERESTS AND THEIR REFLECTION

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2014-01-01

    Full Text Available The relevance of this study due to the fact that at the present time the situation inRussiais complemented by the negative consequences of market reforms in the economy. According to statistical studies in the country with infl ation of about 10% per year among the total population of more than 20% of people with incomes below the subsistence minimum, and the income gap between the highest-income populations and low-income groups more than 12 times. The inequitable distribution of material and spiritual wealth, unemployment (over 9%, ignoring the legitimate rights and interests of a particular person and their direct violation, corruption, alcoholism, drug addiction largely led to the reproduction of aggression, violence in the country. The recession has limited the ability of the material support of the institutions of culture, education, health. The majority of the population is a feeling of uncertainty, future uncertainty, anxiety, loss of landmarks.Objectives The purpose of this work is the identifi cation and characterization of threats to economic security of theRussian Federationat the present time, and to develop recommendations for the prevention of threats to the national interests ofRussia.Method’s. The methodological basis of this article was legal, comparative and economic-statistical methods of analysis. Results. In the framework of the submitted article, the authors found that threats to the economic security ofRussiaare potential dangers that can occur when inept and ineffi cient use of economic resources ofRussiaon the domestic and foreign markets. Major threats to the economic security of theRussian Federationare: bankruptcy, weak absorption lines; corruption; threats to small business development; investment crisis, the massive outfl ow of capital; the crisis in the social sphere; food addiction; the crisis of industrial policy, as well as strengthening the role and place of TNCs.Conclusions and Relevance. The practical

  10. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  11. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, T.J.; Craft, R.L.

    1996-03-01

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  12. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  13. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  14. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  15. Taro Leaf Blight—A Threat to Food Security

    Directory of Open Access Journals (Sweden)

    Tom Okpul

    2012-07-01

    Full Text Available Taro leaf blight (caused by the Oomycete Phytophthora colocasiae is a disease of major importance in many regions of the world where taro is grown. Serious outbreaks of taro leaf blight in Samoa in 1993 and in the last few years in Cameroon, Ghana and Nigeria continue to demonstrate the devastating impact of this disease on the livelihoods and food security of small farmers and rural communities dependent on the crop. The spread of the disease to new geographical areas also poses a major threat to neighbouring countries and taro growing regions still free from the disease. Past research, particularly in the Pacific, has demonstrated that management measures such as chemical and cultural control are largely ineffective and that breeding for disease resistance is the most sustainable approach to manage the disease. Recently, the Pacific and South-east Asian regional taro networks have made excellent progress in developing cultivars resistant to taro leaf blight through enhanced utilization of taro genetic resources and close collaboration between farmers and researchers in breeding programs. These programs have secured vital taro genetic resources for future use. This paper provides an overview of the disease, its origin, distribution, biology, epidemiology, management and global impact. The paper will largely focus on breeding strategies to address the disease including challenges, opportunities and constraints. It also discusses how these breeding experiences and outputs can be scaled up to other geographical areas where the disease has been recently introduced or under threat of introduction.

  16. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  17. The health information system security threat lifecycle: an informatics theory.

    Science.gov (United States)

    Fernando, Juanita I; Dawson, Linda L

    2009-12-01

    This manuscript describes the health information system security threat lifecycle (HISSTL) theory. The theory is grounded in case study data analyzing clinicians' health information system (HIS) privacy and security (P&S) experiences in the practice context. The 'questerview' technique was applied to this study of 26 clinicians situated in 3 large Australian (across Victoria) teaching hospitals. Questerviews rely on data collection that apply standardized questions and questionnaires during recorded interviews. Analysis (using Nvivo) involved the iterative scrutiny of interview transcripts to identify emergent themes. Issues including poor training, ambiguous legal frameworks containing punitive threats, productivity challenges, usability errors and the limitations of the natural hospital environment emerged from empirical data about the clinicians' HIS P&S practices. The natural hospital environment is defined by the permanence of electronic HISs (e-HISs), shared workspaces, outdated HIT infrastructure, constant interruption, a P&S regulatory environment that is not conducive to optimal training outcomes and budgetary constraints. The evidence also indicated the obtrusiveness, timeliness, and reliability of P&S implementations for clinical work affected participant attitudes to, and use of, e-HISs. The HISSTL emerged from the analysis of study evidence. The theory embodies elements such as the fiscal, regulatory and natural hospital environments which impede P&S implementations in practice settings. These elements conflict with improved patient care outcomes. Efforts by clinicians to avoid conflict and emphasize patient care above P&S tended to manifest as security breaches. These breaches entrench factors beyond clinician control and perpetuate those within clinician control. Security breaches of health information can progress through the HISSTL. Some preliminary suggestions for addressing these issues are proposed. Legislative frameworks that are not related to

  18. On the use of polygraph in the interests of identifying insider threats to information security

    Directory of Open Access Journals (Sweden)

    Alexandr Nikolaevich Obukhov

    2017-07-01

    Full Text Available The use of the polygraph for detecting potential threats to information security while hiring new job candidates or examining the staff is justified. Based on the Russian Federation Constitution and the Labour Codex we justify the legality of the use of the polygraph in Russian Federation. Based on the theoretical approach describing the freeze-flight-fight reaction, as well as the Ivanitsky’s theory of informational synthesis we justified the scientific value of psychophysiological methods of detecting lies. In order to justify a reliability of the obtained information we make use of statistical studies by American scientists. A list of information needed to identify insider threats and incident investigation is given in this paper, and it is proposed to use the polygraph in order to obtain this information directly from those who obtain it.

  19. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  20. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    International Nuclear Information System (INIS)

    Kim, Kyonam; Kim, So Young; Yim, Mansung; Schneider, Erich

    2014-01-01

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  1. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  2. Exploring Operational Safeguards, Safety, and Security by Design to Address Real Time Threats in Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Schanfein, Mark J.; Mladineo, Stephen V.

    2015-07-07

    Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insider who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.

  3. Detection and Analysis of Threats to the Energy Sector: DATES

    Energy Technology Data Exchange (ETDEWEB)

    Alfonso Valdes

    2010-03-31

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008

  4. Caprock Breach: A Threat to Secure Geologic Sequestration

    Science.gov (United States)

    Selvadurai, A. P.; Dong, W.

    2013-12-01

    The integrity of caprock in providing a reliable barrier is crucial to several environmental geosciences endeavours related to geologic sequestration of CO2, deep geologic disposal of hazardous wastes and contaminants. The integrity of geologic barriers can be compromised by several factors. The re-activation of dormant fractures and development of new fractures in the caprock during the injection process are regarded as effects that can pose a threat to storage security. Other poromechanical influences of pore structure collapse due to chemically induced erosion of the porous fabric resulting in worm-hole type features can also contribute to compromising storage security. The assessment of the rate of steady or transient seepage through defects in the caprock can allow geoscientists to make prudent evaluations of the effectiveness of a sequestration strategy. While complicated computational simulations can be used to calculate leakage through defects, it is useful to explore alternative analytical results that could be used in providing preliminary estimates of leakage rates through defects in the caprock in a storage setting. The relevance of such developments is underscored by the fact that the permeability characteristics of the storage formation, the fracture and the surficial rocks overlying the caprock can rarely be quantified with certainty. This paper presents the problem of a crack in a caprock that connects to a storage formation and an overburden rock or surficial soil formation. The geologic media are maintained at constant far-field flow potentials and leakage takes place at either steady or transient conditions. The paper develops an analytical result that can be used to estimate the steady seepage through the crack. The analytical result can also be used to estimate the leakage through hydraulically non-intersecting cracks and leakage from caprock-well casing interfaces. The analytical result is used to estimate the accuracy of a computational

  5. Forecast Of International Security Threat Of Russia In 2017

    Directory of Open Access Journals (Sweden)

    A. O. Bezrukov

    2017-01-01

    Full Text Available The article analyzes the threats to international security of Russia in 2017. It presents the analysis of the twelve situations, the development of which could have a significant effect on the interests of Russia in the field of international security. There is the most probable scenario for every situation and a list of conditions of its occurrence. The objective of the forecast is reduction of uncertainty of the future and the promotion of reasonable hypotheses about its likely scenarios. The forecast task is to help decision-makers, mentally put yourself in a situation in which realized one of the scenarios for the future and to encourage them to calculate their possible actions. In the preparation of the forecast two scenario analysis tools were used: the allocation of two key variables, the ratio of which determines the spectrum of the analyzed scenarios, and the key events method, which consists of several stages and allows to evaluate the prospect of implementing the scenario observed in real time. Authors conclude that the USA with the new president will be forced to choose between maintaining global posture and keeping order at home, and the EU will be absorbed by internal issues. In 2017 for Russia is important to keep the positive dynamics in the Transatlantic and Grand Eurasia regions, and in the Middle East. For this purpose it is necessary to ignore the provocations – mainly in Europe. The source of a new crisis may be NATO members discouraged by lack of attention to them by the USA or allies of Russia.

  6. Security, Privacy, Threats and Risks in Cloud Computing ― A Vital Review

    OpenAIRE

    Goyal, Sumit

    2016-01-01

    Cloud computing is a multi million dollar business. As more and more enterprises are adopting cloud services for their businesses, threat of security has become a big concern for these enterprises and cloud users. This review describes the latest threats and risks associated with cloud computing and suggests techniques for better privacy and security of data in cloud environment. Threats and risks associated with cloud service models (SaaS, PaaS and IaaS) along with cloud deployment models (p...

  7. Biosensor technology: recent advances in threat agent detection and medicine.

    Science.gov (United States)

    Kirsch, Jeffrey; Siltanen, Christian; Zhou, Qing; Revzin, Alexander; Simonian, Aleksandr

    2013-11-21

    Biosensors are of great significance because of their capability to resolve a potentially large number of analytical problems and challenges in very diverse areas such as defense, homeland security, agriculture and food safety, environmental monitoring, medicine, pharmacology, industry, etc. The expanding role of biosensing in society and a real-world environment has led to an exponential growth of the R&D efforts around the world. The world market for biosensor devices, according to Global Industry Analysts, Inc., is expected to reach $12 billion by 2015. Such expedient growth is driven by several factors including medical and health problems, such as a growing population with a high risk of diabetes and obesity, and the rising incidence of chronic diseases such as heart disease, stroke, cancer, chronic respiratory diseases, tuberculosis, etc.; significant problems with environmental monitoring; and of course serious challenges in security and military applications and agriculture/food safety. A review paper in the biosensor technology area may be structured based on (i) the principles of detection, such as the type of transducer platform, bioanalytical principles (affinity or kinetic), and biorecognition elements origin/properties (i.e. antibodies, enzymes, cells, aptamers, etc.), and (ii) the application area. This review follows the latter strategy and focuses on the applications. This allows discussion on how different sensing strategies are brought to bear on the same problem and highlights advantages/disadvantages of these sensing strategies. Given the broad range of biosensor related applications, several particularly relevant areas of application were selected for review: biological threat agents, chemical threat agents, and medicine.

  8. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  9. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  10. Threat detection of liquid explosives and precursors from their x-ray scattering pattern using energy dispersive detector technology

    DEFF Research Database (Denmark)

    Kehres, Jan; Olsen, Ulrik Lund; Lyksborg, Mark

    2017-01-01

    Energy dispersive X-ray diffraction (EDXRD) can be applied for identification of liquid threats in luggage scanning in security applications. To define the instrumental design, the framework for data reduction and analysis and test the performance of the threat detection in various scenarios...

  11. Threats to information security in a highly organized system of the “Smart city”

    Science.gov (United States)

    Kurcheeva, G. I.; Denisov, V. V.; Khvorostov, V. A.

    2017-01-01

    The article discusses issues related to comprehensive development and introduction of technologies such as “Smart city”. The urgency of accelerating the development of such highly organized systems, primarily in terms of reducing threats to information security, is emphasized in the paper. In accordance with authors’ analysis of the composition and structure of the threats to information security, “Accessibility”, “Integrity” and “Confidentiality” are highlighted. Violation of any of them leads to harmful effects on the information and other system resources. The protection of “Accessibility” mobilizes one third of all efforts to ensure information security that must be taken into account when allocating protective actions. The threats associated with failure of the supporting infrastructure are also significantly reduced. But the threats associated with failures of the system itself and failures of users are clearly increasing. There is a high level of society and production informatization, and the threats to information security are changing accordingly.

  12. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory

    2016-04-25

    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  13. Tool for Insider Threat Detection in Corporative Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Sergeevich Vedeneev

    2014-02-01

    Full Text Available Systems and tools for insider threat detection are described. Different meanings of the term “insider”, types of insiders, examples of motivation of insiders, typical insider actions are set.

  14. A threat intelligence framework for access control security in the oil industry

    Science.gov (United States)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  15. The Threat of Intentional Oil Spills to Desalination Plants in the Middle East: A U.S. Security Threat

    Science.gov (United States)

    1998-04-01

    salts (the concentrate or brine stream).”17 There are two processes that represent the vast majority of desalination processes in use in the world and...AU/ACSC/171/1998-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE THREAT OF INTENTIONAL OIL SPILLS TO DESALINATION PLANTS IN THE MIDDLE EAST A U.S...Intentional Oil Spills to Desalination Plants in the Middle East A U.S. Security Threat Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  16. A Water Security Handbook: Planning for and Responding to Drinking Water Contamination Threats and Incidents

    National Research Council Canada - National Science Library

    2006-01-01

    .... This Water Security Handbook was developed by the U.S. EPA to help you, the water utility official, protect your water system and respond effectively to threats and contamination incidents involving your water system...

  17. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  18. A study of cyber security in hospitality industry- threats and countermeasures: case study in Reno, Nevada

    OpenAIRE

    Shabani, Neda

    2017-01-01

    The purpose of this study is to analyze cyber security and security practices of electronic information and network system, network threats, and techniques to prevent the cyber attacks in hotels. Helping the information technology directors and chief information officers (CIO) is the aim of this study to advance policy for security of electronic information in hotels and suggesting some techniques and tools to secure the computer networks. This research is completely qualitative while the cas...

  19. Organizational Security Threats Related to Portable Data Storage Devices: Qualitative Exploratory Inquiry

    Science.gov (United States)

    Cooper, Paul K.

    2017-01-01

    There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…

  20. Food security — Seeds of threat, seeds of solutions | CRDI - Centre ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Modern agriculture faces a significant threat: genetic erosion. Ironically, plant breeders' very success in developing new high-yielding cereal varieties over the last decades could lead to a gradual loss of plant species, threatening the world's future food security. Even more ironic, this threat can be overcome only with the ...

  1. Addressing the Cyber-security and Cyber-terrorism Threats [video

    OpenAIRE

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  2. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    Science.gov (United States)

    Greitzer, Frank L.; Frincke, Deborah A.

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, to support a move from an insider threat detection stance to one that enables prediction of potential insider presence. Twodistinctiveaspects of the approach are the objectiveof predicting or anticipating potential risksandthe useoforganizational datain additiontocyber datato support the analysis. The chapter describes the challenges of this endeavor and reports on progressin definingausablesetof predictiveindicators,developingaframeworkfor integratingthe analysisoforganizationalandcyber securitydatatoyield predictions about possible insider exploits, and developing the knowledge base and reasoning capabilityof the system.We also outline the typesof errors that oneexpectsina predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  3. Threats to Security Posed by ISIS in Syria: A Human Security Approach

    Directory of Open Access Journals (Sweden)

    Lee-Ann Louw

    2017-02-01

    Full Text Available The civil war in Syria coupled with the attacks by ISIS, has resulted in one of the largest humanitarian crises since World War II. Although international efforts have resulted in regaining control of important cities, these military approaches have escalated and inflamed the violence of which innocent civilians bear the consequences. The continuing violence and resulting threats or insecurities negatively affect the lives, freedom, dignity and development of the people to name but a few. For that reason, the aim is to explore the applicability of a human security approach to the conflict in Syria that focuses on, among other aspects, minimising violence, mitigating the effects of the conflict, protecting people, restoring peace and eliminating the grounds that resulted in the development of these conditions in the first place.

  4. Explosive and chemical threat detection by surface-enhanced Raman scattering: A review

    DEFF Research Database (Denmark)

    Hakonen, Aron; Andersson, Per Ola; Schmidt, Michael Stenbæk

    2015-01-01

    Acts of terror and warfare threats are challenging tasks for defense agencies around the world and of growing importance to security conscious policy makers and the general public. Explosives and chemical warfare agents are two of the major concerns in this context, as illustrated by the recent...... progressively better, smaller and cheaper, and can today be acquired for a retail price close to 10,000 US$. This contribution aims to give a comprehensive overview of SERS as a technique for detection of explosives and chemical threats. We discuss the prospects of SERS becoming a major tool for convenient in...

  5. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  6. Quantifying Security Threats and Their Potential Impacts: A Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2010-01-01

    In earlier works, we present a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain as a result of security breakdowns. In this paper, we illustrate this infrastructure by means of an e-commerce application.

  7. Ethnicity: A threat to Nigeria's security and development | Nweke ...

    African Journals Online (AJOL)

    The negative implications of ethnicity to national security and development are enormous. This paper interrogates ethnicity as the major hindrance to Nigeria.s security and development. The paper unveils the role of the constitution of the Federal Republic of Nigeria in strengthening ethnicity and calls for a constitutional ...

  8. Planning for nuclear security: Design Basis Threats and physical ...

    African Journals Online (AJOL)

    A competent authority for nuclear security then gives approval for the implementation of the physical protection plan. The DBT assessment methodology is an International Atomic Energy Agency (IAEA) recommended method for designing security measures corresponding to the categories of radioactive sources. The higher ...

  9. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  10. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    Energy Technology Data Exchange (ETDEWEB)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  11. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    Science.gov (United States)

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  12. Secure in insecurity: The case of threat perception/acceptance in the Philippines

    Directory of Open Access Journals (Sweden)

    Amador IV Peleo

    2015-12-01

    Full Text Available Current theoretical and policy-based explanations of security in the Philippines have portrayed “politics” and “security” as distinct and separate fields. However, the recent “2011–2016 National Security Policy: Securing the Gains of Democracy”, has conflated “security” and “politics”, as may be observed in its two national security goals “to promote internal socio-political stability” and “to exercise full sovereignty over its territory”. Although likely derived from administrative expediency, the composite policy definition is also likely to result in the conceptualisation of political goals that are only partially attainable and of a security environment that will remain “unsecured”. As this appears to be a norm of governance in the Philippines, this paper examines the possibility that national security policy-making is likely more concerned with the survival of the regime during which the policy was created rather than with the long-term stabilisation of the entire state. Several theories may be useful in accounting for this behaviour; namely, small states conflict theory, securitisation theory and threat normalisation theory. This paper is intended to show that the definition of threat corresponds to threat-acceptance and may likely lead to threat-toleration than to threat-resolution.

  13. Chinese Perceptions of Traditional and Nontraditional Security Threats

    National Research Council Canada - National Science Library

    Craig, Susan L

    2007-01-01

    .... It will show that China has a comprehensive concept of national security that includes not only defending its sovereignty and territorial integrity, but continuing its economic and social development...

  14. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  15. Study on Cyber Security and Threat Evaluation in SCADA Systems

    Science.gov (United States)

    2012-03-01

    http://www.isa.org/Template.cfm?Section=Shop_ISA&Template=/ Ecommerce /ProductDisplay.cfm&Produ ctid=9665 • Integrating Electronic Security into...the Manufacturing and Control Systems Environment, ISA, 2004 - http://www.isa.org/Template.cfm?Section=books&template= Ecommerce /FileDisplay.cfm...template= Ecommerce /FileDisplay.cfm&ProductID=738 0&file=Preview.pdf • Peterson, D. and Howard, D. "Cyber Security for the Electric Sector," September 12

  16. Security threats to automotive CAN networks-Practical examples and selected short-term countermeasures

    International Nuclear Information System (INIS)

    Hoppe, Tobias; Kiltz, Stefan; Dittmann, Jana

    2011-01-01

    The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests performed on the control systems for the window lift, warning light and airbag control system as well as the central gateway. These results are supplemented in this article by a classification of these four attack scenarios using the established CERT taxonomy and an analysis of underlying security vulnerabilities, and especially, potential safety implications. With respect to the results of these tests, in this article we further discuss two selected countermeasures to address basic weaknesses exploited in our tests. These are adaptations of intrusion detection (discussing three exemplary detection patterns) and IT-forensic measures (proposing proactive measures based on a forensic model). This article discusses both looking at the four attack scenarios introduced before, covering their capabilities and restrictions. While these reactive approaches are short-term measures, which could already be added to today's automotive IT architecture, long-term concepts also are shortly introduced, which are mainly preventive but will require a major redesign. Beneath a short overview on respective research approaches, we discuss their individual requirements, potential and restrictions.

  17. Security threats and their mitigation in infrastructure as a service

    Directory of Open Access Journals (Sweden)

    Bineet Kumar Joshi

    2016-09-01

    Full Text Available Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS is the basic requirement for all delivery models. Infrastructure as a service delivers all possible it resources (Network Components, Operating System, etc. as a service to users. From both users and providers point of view: integrity, privacy and other security issues in IaaS are the important concern. In this paper we studied in detail about the different types of security related issues in IaaS layer and methods to resolve them to maximize the performance and to maintain the highest level of security in IaaS.

  18. Using a Prediction Model to Manage Cyber Security Threats.

    Science.gov (United States)

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  19. Using a Prediction Model to Manage Cyber Security Threats

    Directory of Open Access Journals (Sweden)

    Venkatesh Jaganathan

    2015-01-01

    Full Text Available Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  20. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    Science.gov (United States)

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  1. Risks and threats of tax state security and methods of their neutralization

    Directory of Open Access Journals (Sweden)

    Y.V. Lebedzevych

    2016-12-01

    Full Text Available The article substantiates the relevance of the study to ensure security of the state tax. Scientists studied different approaches to defining the essence of the concept of "security tax" on the key features that would satisfy the interests of all subjects of tax relations and the necessity of legal consolidation of this concept. Analyzed the economic, social and legal nature of the existence of the security tax, identified key indicators of fiscal security of Ukraine. To determine the effectiveness of the tax administration in the interests of the tax security highlights the main threats, tax security risks caused by external and internal factors, and propose measures for their elimination and prevent the possibility of their occurrence. The stages of tax risk management with effective building security tax, designed structurally-logic of the tax risk management security.

  2. The threat nets approach to information system security risk analysis

    NARCIS (Netherlands)

    Mirembe, Drake

    2015-01-01

    The growing demand for healthcare services is motivating hospitals to strengthen outpatient case management using information systems in order to serve more patients using the available resources. Though the use of information systems in outpatient case management raises patient data security

  3. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    REALLY? Lindy Heinecken. Stellenbosch University. Introduction. The opinion piece by Eric Z. Mnisi claiming that national security has been sacrificed at the altar of soldiers' constitutional rights to form and join trade unions is a claim often muted, not only in South Africa but elsewhere. In the Handbook on. Human Rights ...

  4. Security in transnational interoperable PPDR communications: Threats and requirements

    NARCIS (Netherlands)

    Ferrús, R.; Sallent, O.; Verkoelen, C.; Fransen, F.; Saijonmaa, J.; Olivieri, C.; Duits, M.; Galin, A.; Pangallo, F.; Modi, D.P.

    2015-01-01

    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery

  5. Threats and trusted countermeasures using a security protocol in the ...

    African Journals Online (AJOL)

    Mobile Agent computing is a paradigm of distributed computing, that has generated considerable excitement in the research community. Despite that, it has not been translated into a significant number of real-world applications due to a new dimensionality of security problem it brings along with it. In this paper ...

  6. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  7. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  8. Cyber Security Insider Threats :: Government’s Role in Protecting India’s Critical Infrastructure Sectors

    OpenAIRE

    Vohra, Pulkit

    2014-01-01

    This research identifies the problem of insider threats in the critical infrastructure sectors of India. It is structured to answer the research question: "Why insider threats should be the primary concern for Indian government to protect its critical infrastructure sectors.” It defines the critical infrastructure sectors and portrays the cyber security scenario of India. Also, through the research study, it identifies the lack of awareness and non-seriousness of employees in the critical sec...

  9. Threats to the National Economic Security of Ukraine at the Current Stage

    Directory of Open Access Journals (Sweden)

    Kuharskaya Natalia A.

    2017-04-01

    Full Text Available It is substantiated that the most important factor of the national economic security of the country is to match both the economic and the industrial relations systems to the economic development of the country. The article provides detailed consideration of the particularities of occurrence of threats to the national economic security of Ukraine by allocating seven major structural blocks, in which threats were not overcome during the years of independence, and some of them even became intensified: 1 institutional sphere; 2 social sphere; 3 financial sphere; 4 shadowing and corruptness of economy; 5 a high level of physical wear and tear of fixed assets and of the production infrastructure; 6 de-industrialization of economy; 7 innovative development. The main components of the national economic security, which would assist in overcoming these threats, have been developed.

  10. MINIMIZATION OF IMPACTS PERTAINING TO EXTERNAL AND INTERNAL ENERGY SECURITY THREATS OF THERMAL POWER PLANTS

    Directory of Open Access Journals (Sweden)

    V. N. Nagornov

    2012-01-01

    Full Text Available The paper contains a classification of internal and external threats for thermal power plants and recommendations on minimization of these risks. A set of concrete measures aimed at ensuring TPP energy security has been presented in the paper. The system comprises preventive measures aimed at reducing the possibilities of emergence and implementation of internal and external threats. The system also presupposes to decrease susceptibility of fuel- and energy supply systems to the threats, and application of liquidation measures that ensure elimination of emergency situation consequences and restoration of the conditions concerning fuel- and power supply to consumers.

  11. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    International Nuclear Information System (INIS)

    McDonald, K; Curran, B

    2014-01-01

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusion Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment

  12. Applied network security monitoring collection, detection, and analysis

    CERN Document Server

    Sanders, Chris

    2013-01-01

    Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major di

  13. Illicit trafficking of nuclear and other radioactive material: The 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhausler, F.

    2006-01-01

    Illicit trafficking in nuclear and other radioactive material, which could be used for building a nuclear weapon or a radiological dispersal device, has been a subject of concern for more than a decade. A major obstacle to assessing the actual security threat due to nuclear trafficking is the inclusion in the analysis of incidents that do not represent a security threat, in the sense of being a possible pre-stage to a clandestine nuclear weapons programme or a terrorist operation involving a crude nuclear device or a radiological dispersal device. International transport of contaminated scrap metal, or discovery of lost or abandoned radioactive sources are examples of such incidents, which have little or no security relevance. This paper analyses the global data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (DSO) using special filters to discriminate between incidents that are of security relevance and those that are not. (author)

  14. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    Energy Technology Data Exchange (ETDEWEB)

    Pederson, Ann C. [ORNL; Snow, Catherine L. [ORNL; Townsend, Jeremy [ORNL; Shannon, Michael [ORNL

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  15. The new Middle East security threat the case of Yemen and the GCC

    OpenAIRE

    Al-Hajjri, Ibrahim Abdulwahab

    2007-01-01

    Since Yemen has a history of border disputes with Saudi Arabia, this addresses the question of Yemen's role in the security of the Arabian Peninsula. Yemen suffers from a weak economy and a number of security issues of its own. Through the borders shared with its GCC neighbors, Yemen has become plagued by a nexus of terrorism, arms smuggling, and drug trafficking. Yet Yemen is unable to effectively combat these threats because of weak border control and poor cooperation with its regional ...

  16. Threat Object Detection using Covariance Matrix Modeling in X-ray Images

    International Nuclear Information System (INIS)

    Jeon, Byoun Gil; Kim, Jong Yul; Moon, Myung Kook

    2016-01-01

    The X-ray imaging system for the aviation security is one of the applications. In airports, all passengers and properties should be inspected and accepted by security machines before boarding on aircrafts to avoid all treat factors. That treat factors might be directly connected on terrorist threats awfully hazardous to not only passengers but also people in highly populated area such as major cities or buildings. Because the performance of the system is increasing along with the growth of IT technology, information that has various type and good quality can be provided for security check. However, human factors are mainly affected on the inspections. It means that human inspectors should be proficient corresponding to the growth of technology for efficient and effective inspection but there is clear limit of proficiency. Human being is not a computer. Because of the limitation, the aviation security techniques have the tendencies to provide not only numerous and nice information but also effective assistance for security inspectors. Many image processing applications already have been developed to provide efficient assistance for the security systems. Naturally, the security check procedure should not be altered by automatic software because it's not guaranteed that the automatic system will never make any mistake. This paper addressed an application of threat object detection using the covariance matrix modeling. The algorithm is implemented in MATLAB environment and evaluated the performance by comparing with other detection algorithms. Considering the shape of an object on an image is changed by the attitude of that to the imaging machine, the implemented detector has the robustness for rotation and scale of an object

  17. Threat Object Detection using Covariance Matrix Modeling in X-ray Images

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, Byoun Gil; Kim, Jong Yul; Moon, Myung Kook [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    The X-ray imaging system for the aviation security is one of the applications. In airports, all passengers and properties should be inspected and accepted by security machines before boarding on aircrafts to avoid all treat factors. That treat factors might be directly connected on terrorist threats awfully hazardous to not only passengers but also people in highly populated area such as major cities or buildings. Because the performance of the system is increasing along with the growth of IT technology, information that has various type and good quality can be provided for security check. However, human factors are mainly affected on the inspections. It means that human inspectors should be proficient corresponding to the growth of technology for efficient and effective inspection but there is clear limit of proficiency. Human being is not a computer. Because of the limitation, the aviation security techniques have the tendencies to provide not only numerous and nice information but also effective assistance for security inspectors. Many image processing applications already have been developed to provide efficient assistance for the security systems. Naturally, the security check procedure should not be altered by automatic software because it's not guaranteed that the automatic system will never make any mistake. This paper addressed an application of threat object detection using the covariance matrix modeling. The algorithm is implemented in MATLAB environment and evaluated the performance by comparing with other detection algorithms. Considering the shape of an object on an image is changed by the attitude of that to the imaging machine, the implemented detector has the robustness for rotation and scale of an object.

  18. Infrastructure, Attitude and Weather: Today’s Threats to Supply Chain Security

    Directory of Open Access Journals (Sweden)

    Stephen Blank

    2016-06-01

    Full Text Available The global economy can be viewed today as a myriad of border-crossing supply chain networks of production, supply, distribution and marketing systems. Given the enormous value embodied in these systems, and an environment increasingly characterized by uncertainty and vulnerability, it is not surprising that concern about supply chain security has intensified. Concern takes many forms. For example, how supply chains might be used as vehicles for criminal activity (smuggling, trafficking of narcotics and importing counterfeit goods or acts of terrorism (radio-active materials, bombs, even nukes in containers. Technology-based threats to supply chains, such as cybercrimes, data breaches and IT failures, now appear more frequently in the literature on supply chain security. These threats could result in substantial disruption to supply chains and damage to companies and their customers.Clima But larger storms are brewing, whose menace to supply chain security is greater still – and where actions to protect supply chains move more slowly. These include the continued deterioration of transportation infrastructure, a new posture on trade which views supply chains as threats to jobs and wages, and the impact of climate change. These threats do not lie off in the distant future; they are threats of today and tomorrow.

  19. 49 CFR 1572.9 - Applicant information required for HME security threat assessment.

    Science.gov (United States)

    2010-10-01

    ...) Has not been adjudicated as lacking mental capacity or committed to a mental health facility... lacking mental capacity, or committed to a mental health facility. (c) The applicant must certify and date... security threat assessment. Routine Uses: Routine uses of this information include disclosure to the FBI to...

  20. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  1. Cyber security information exchange to gain insight into the effects of cyber threats and incidents

    NARCIS (Netherlands)

    Fransen, F.; Smulders, A.C.M.; Kerkdijk, H.

    2015-01-01

    The last couple of years we have seen an increase in interests and initiatives in establishing threat intelligence sharing communities, and on the development of standards and platforms for automated cyber security information sharing. These initiatives are focused on helping organisations to

  2. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  3. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

    Directory of Open Access Journals (Sweden)

    Zehui Wu

    2017-01-01

    Full Text Available SDN-based controller, which is responsible for the configuration and management of the network, is the core of Software-Defined Networks. Current methods, which focus on the secure mechanism, use qualitative analysis to estimate the security of controllers, leading to inaccurate results frequently. In this paper, we employ a quantitative approach to overcome the above shortage. Under the analysis of the controller threat model we give the formal model results of the APIs, the protocol interfaces, and the data items of controller and further provide our Threat/Effort quantitative calculation model. With the help of Threat/Effort model, we are able to compare not only the security of different versions of the same kind controller but also different kinds of controllers and provide a basis for controller selection and secure development. We evaluated our approach in four widely used SDN-based controllers which are POX, OpenDaylight, Floodlight, and Ryu. The test, which shows the similarity outcomes with the traditional qualitative analysis, demonstrates that with our approach we are able to get the specific security values of different controllers and presents more accurate results.

  4. Receiver Operating Characteristic Analysis for Detecting Explosives-related Threats

    Energy Technology Data Exchange (ETDEWEB)

    Oxley, Mark E; Venzin, Alexander M

    2012-11-14

    The Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are interested in developing a standardized testing procedure for determining the performance of candidate detection systems. This document outlines a potential method for judging detection system performance as well as determining if combining the information from a legacy system with a new system can signicantly improve performance. In this document, performance corresponds to the Neyman-Pearson criterion applied to the Receiver Operating Characteristic (ROC) curves of the detection systems in question. A simulation was developed to investigate how the amount of data provided by the vendor in the form of the ROC curve eects the performance of the combined detection system. Furthermore, the simulation also takes into account the potential eects of correlation and how this information can also impact the performance of the combined system.

  5. REGIONAL SECURITY IN THE HORN OF AFRICA: CONFLICTS, AGENDAS AND THREATS

    Directory of Open Access Journals (Sweden)

    Nilton César Fernandes Cardoso

    2017-01-01

    Full Text Available This paper aims at analyzing security dynamics in the Horn of Africa in the post-independence period, identifying the actors, agendas and threats. For this purpose, it is subdivided into three parts. The first one analyzes the security dynamics taking place in the Horn of Africa during the Cold War period, focusing on the regional rivalries and on the penetration of extraregional actors. In the second part, there is a discussion regarding the transformations which occurred in region in the immediate post-Cold War period, focusing both on the unities’ (states internal security dynamics and on the regional ones. The third and last section aims at identifying “new” threats and regional and international responses, as well as the emerging strategic importance of the region to traditional superpowers in the post-9/11 period, marked by the process of securitization.

  6. A Dynamically Configurable Log-based Distributed Security Event Detection Methodology using Simple Event Correlator

    Science.gov (United States)

    2010-06-01

    13 2.3 Security Information and Event Management . . . . . . 14 2.4 Insider Threat Detection . . . . . . . . . . . . . . . . . . 15...organizations fail to properly implement and properly resource Security Information and Event Management (SIEM) capa- bilities [32] [37]. Several...motivate the development of a distributed log event correlation methodology. Back- ground literature in the areas of log management , event correlation and

  7. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    OpenAIRE

    Alexandra Lewis

    2013-01-01

    Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP), a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the r...

  8. Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal From Security Threats

    OpenAIRE

    Ferrando, Roman; Stacey, Paul

    2017-01-01

    Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world. With this rapidly expanding pervasive deployment of IoT devices, and supporting infrastructure, we are fast approaching the point where the problem of IoT based cyber-security attacks is a serious threat to industrial operations, business activity and social interactions that leverage IoT technologies. The number of threats and successful attacks against connected systems using IoT devices an...

  9. Evolution of the perception of the threats to security in Spain

    Directory of Open Access Journals (Sweden)

    Rafael Grasa

    1993-07-01

    Full Text Available security was internal, in other words, subversion and opposition to the regime. Public opinion, however, revealed that characteristics very different to those in the context of the western block existed, such as a void perception of the soviet threat as opposed to a marked antiamericanism for its support of the regime.This legacy of threats weighed heavily during the transition together with the existence of a cleavage between the armed forces, the political actors and public opinion regarding the real necessity of intergration into NATO. In the eighties there exists a clear differentiation between the threats perceived by public opinion and those considered by the political elites. With regard to the former,serious threats to Spain do not exist. only certain concerns when the subject of security took on importance in the field of public opinion, such as during the referendum campaign over NATO in 1986 which was mixed with the scarce perception of the soviet threat, theconstant danger represented by the United States and the slight rise in those who believed in the Moroccan threat, and the impact of the Gulf War in 1991 and the consequent increase of the threat represented by the arab countries. For the political actors, the mainthreat contemplated was the protection of territorial integrity on a stage closer to the western Mediterranean instead of a global threat to the western block something only considered at a theoretical level with the strategic concept of Spanish defence within the framework of participation in NATO.From 1992 onwards with the Defence Directive, the threat concept is replaced by that of risk and which recovers the importance given over to North Africa. It is argued in the belief that security is indivisible and must be shared not only with the European members. A greater convergence is also initiated in the nineties between the political actors and public opinion with respect to considering what are the risks in a global

  10. Expert knowledge and data analysis for detecting advanced persistent threats

    Directory of Open Access Journals (Sweden)

    Moya Juan Ramón

    2017-08-01

    Full Text Available Critical Infrastructures in public administration would be compromised by Advanced Persistent Threats (APT which today constitute one of the most sophisticated ways of stealing information. This paper presents an effective, learning based tool that uses inductive techniques to analyze the information provided by firewall log files in an IT infrastructure, and detect suspicious activity in order to mark it as a potential APT. The experiments have been accomplished mixing real and synthetic data traffic to represent different proportions of normal and anomalous activity.

  11. Transferring x-ray based automated threat detection between scanners with different energies and resolution

    Science.gov (United States)

    Caldwell, M.; Ransley, M.; Rogers, T. W.; Griffin, L. D.

    2017-10-01

    A significant obstacle to developing high performance Deep Learning algorithms for Automated Threat Detection (ATD) in security X-ray imagery, is the difficulty of obtaining large training datasets. In our previous work, we circumvented this problem for ATD in cargo containers, using Threat Image Projection and data augmentation. In this work, we investigate whether data scarcity for other modalities, such as parcels and baggage, can be ameliorated by transforming data from one domain so that it approximates the appearance of another. We present an ontology of ATD datasets to assess where transfer learning may be applied. We define frameworks for transfer at the training and testing stages, and compare the results for both methods against ATD where a common data source is used for training and testing. Our results show very poor transfer, which we attribute to the difficulty of accurately matching the blur and contrast characteristics of different scanners.

  12. Verification of Minimum Detectable Activity for Radiological Threat Source Search

    Science.gov (United States)

    Gardiner, Hannah; Myjak, Mitchell; Baciak, James; Detwiler, Rebecca; Seifert, Carolyn

    2015-10-01

    The Department of Homeland Security's Domestic Nuclear Detection Office is working to develop advanced technologies that will improve the ability to detect, localize, and identify radiological and nuclear sources from airborne platforms. The Airborne Radiological Enhanced-sensor System (ARES) program is developing advanced data fusion algorithms for analyzing data from a helicopter-mounted radiation detector. This detector platform provides a rapid, wide-area assessment of radiological conditions at ground level. The NSCRAD (Nuisance-rejection Spectral Comparison Ratios for Anomaly Detection) algorithm was developed to distinguish low-count sources of interest from benign naturally occurring radiation and irrelevant nuisance sources. It uses a number of broad, overlapping regions of interest to statistically compare each newly measured spectrum with the current estimate for the background to identify anomalies. We recently developed a method to estimate the minimum detectable activity (MDA) of NSCRAD in real time. We present this method here and report on the MDA verification using both laboratory measurements and simulated injects on measured backgrounds at or near the detection limits. This work is supported by the US Department of Homeland Security, Domestic Nuclear Detection Office, under competitively awarded contract/IAA HSHQDC-12-X-00376. This support does not constitute an express or implied endorsement on the part of the Gov't.

  13. Computer Security: Computer security threats, vulnerabilities and attacks (3/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

  14. Cyber security threats in the power sector: Need for a domain specific regulatory framework in India

    International Nuclear Information System (INIS)

    Ananda Kumar, V.; Pandey, Krishan K.; Punia, Devendra Kumar

    2014-01-01

    India is poised to spend over USD 5.8 billion as part of the National Smart Grid Mission aimed to alleviate India's ailing power sector as part of its 12th Five year plan (2012–2017). The federal government sponsored Restructured Accelerated Power Development and Reforms Program (R-APDRP) is also focused on building ICT capability in the state electricity boards. Presently however, there is no power sector specific cyber security mandates or policies in India. The Stuxnet, Shamoon and Anonymous incidents have shown that cyber attacks can cause significant damage and pose a risk to National Critical Infrastructure. A lack of security planning as part of designing the Smart grids can potentially leave gaping holes in the country's power sector stability. The paper highlights key cyber security threats across the entire power sector value chain—from generation, to transmission and distribution. It is aimed at building the case for power sector specific cyber security regulations based on the experience of regulators in other critical infrastructure sectors like Banking and Telecom in India and power sector regulations internationally. - Highlights: • Cyber security in power sector is key to protecting national critical infrastructure. • Poor cyber security planning would impact the power sector in India. • A laissez-faire approach to cyber security in power sector may not yield results. • There is a need for power sector specific cyber security regulations

  15. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  16. FRAUDULENT TRANSACTIONS WITH BANK PLASTIC CARDS AS A THREAT TO ECONOMIC SECURITY IN THE BANKING SPHERE

    Directory of Open Access Journals (Sweden)

    Elena V. Ilinich

    2013-01-01

    Full Text Available Banks active development of cashless payments by plastic cards, the growing number of fraudulent transactions and the damage they cause, create new challenges and threats to economic security in the sphere of banking activity. The latest information technologies are active used by organized crime groups, the methods of committing crimes are changing and are not yet adequately reflected by banks and law enforcement agencies.

  17. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  18. VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  19. Virtual Reality: U.S. Information Security Threats Concept And Its International Dimension

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Batueva

    2014-01-01

    Full Text Available The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.

  20. Brain Activation Underlying Threat Detection to Targets of Different Races

    Science.gov (United States)

    Senholzi, Keith B.; Depue, Brendan E.; Correll, Joshua; Banich, Marie T.; Ito, Tiffany A.

    2016-01-01

    The current study examined blood oxygen level dependent (BOLD) signal underlying racial differences in threat detection. During fMRI, participants determined whether pictures of Black or White individuals held weapons. They were instructed to make shoot responses when the picture showed armed individuals but don’t shoot responses to unarmed individuals, with the cost of not shooting armed individuals being greater than that of shooting unarmed individuals. Participants were faster to shoot armed Blacks than Whites, but faster in making don’t shoot responses to unarmed Whites than Blacks. Brain activity differed to armed versus unarmed targets depending on target race, suggesting different mechanisms underlying threat versus safety decisions. Anterior cingulate cortex was preferentially engaged for unarmed Whites than Blacks. Parietal and visual cortical regions exhibited greater activity for armed Blacks than Whites. Seed-based functional connectivity of the amygdala revealed greater coherence with parietal and visual cortices for armed Blacks than Whites. Furthermore, greater implicit Black-danger associations were associated with increased amygdala activation to armed Blacks, compared to armed Whites. Our results suggest that different neural mechanisms may underlie racial differences in responses to armed versus unarmed targets. PMID:26357911

  1. Smart CMOS sensor for wideband laser threat detection

    Science.gov (United States)

    Schwarze, Craig R.; Sonkusale, Sameer

    2015-09-01

    The proliferation of lasers has led to their widespread use in applications ranging from short range standoff chemical detection to long range Lidar sensing and target designation operating across the UV to LWIR spectrum. Recent advances in high energy lasers have renewed the development of laser weapons systems. The ability to measure and assess laser source information is important to both identify a potential threat as well as determine safety and nominal hazard zone (NHZ). Laser detection sensors are required that provide high dynamic range, wide spectral coverage, pulsed and continuous wave detection, and large field of view. OPTRA, Inc. and Tufts have developed a custom ROIC smart pixel imaging sensor architecture and wavelength encoding optics for measurement of source wavelength, pulse length, pulse repetition frequency (PRF), irradiance, and angle of arrival. The smart architecture provides dual linear and logarithmic operating modes to provide 8+ orders of signal dynamic range and nanosecond pulse measurement capability that can be hybridized with the appropriate detector array to provide UV through LWIR laser sensing. Recent advances in sputtering techniques provide the capability for post-processing CMOS dies from the foundry and patterning PbS and PbSe photoconductors directly on the chip to create a single monolithic sensor array architecture for measuring sources operating from 0.26 - 5.0 microns, 1 mW/cm2 - 2 kW/cm2.

  2. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  3. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    Energy Technology Data Exchange (ETDEWEB)

    Khan, M. Umer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cooperative Monitoring Center

    2017-03-01

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues, motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.

  4. Children and adolescents facing a continuous security threat: Aggressive behavior and post-traumatic stress symptoms.

    Science.gov (United States)

    Nuttman-Shwartz, Orit

    2017-07-01

    There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of

  5. Detection of the Security Vulnerabilities in Web Applications

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an iterative process and their quality is the result of the lifecycle activities. The audit and evaluation processes are required by the increased complexity of the business processes supported by IT&C technologies. In order to organize and develop a high-quality audit process, the evaluation team must analyze the risks, threats and vulnerabilities of the information system. The paper highlights the security vulnerabilities in web applications and the processes of their detection. The web applications are used as IT&C tools to support the distributed information processes. They are a major component of the distributed information systems. The audit and evaluation processes are carried out in accordance with the international standards developed for information system security assurance.

  6. Novel data visualizations of X-ray data for aviation security applications using the Open Threat Assessment Platform (OTAP)

    Science.gov (United States)

    Gittinger, Jaxon M.; Jimenez, Edward S.; Holswade, Erica A.; Nunna, Rahul S.

    2017-02-01

    This work will demonstrate the implementation of a traditional and non-traditional visualization of x-ray images for aviation security applications that will be feasible with open system architecture initiatives such as the Open Threat Assessment Platform (OTAP). Anomalies of interest to aviation security are fluid, where characteristic signals of anomalies of interest can evolve rapidly. OTAP is a limited scope open architecture baggage screening prototype that intends to allow 3rd-party vendors to develop and easily implement, integrate, and deploy detection algorithms and specialized hardware on a field deployable screening technology [13]. In this study, stereoscopic images were created using an unmodified, field-deployed system and rendered on the Oculus Rift, a commercial virtual reality video gaming headset. The example described in this work is not dependent on the Oculus Rift, and is possible using any comparable hardware configuration capable of rendering stereoscopic images. The depth information provided from viewing the images will aid in the detection of characteristic signals from anomalies of interest. If successful, OTAP has the potential to allow for aviation security to become more fluid in its adaptation to the evolution of anomalies of interest. This work demonstrates one example that is easily implemented using the OTAP platform, that could lead to the future generation of ATR algorithms and data visualization approaches.

  7. Deploying Difference: Security Threat Narratives and State Displacement from Protected Areas

    Directory of Open Access Journals (Sweden)

    Elizabeth Lunstrum

    2018-01-01

    Full Text Available State actors are increasingly treating protected areas as sites of security threats and policing resident communities as though they are the cause of this insecurity. This is translating into community eviction from protected areas that is authorised by security concerns and logics and hence not merely conservation concerns. We ground this claim by drawing upon empirical work from two borderland conservation areas: Mozambique's Limpopo National Park (LNP and Guatemala's Maya Biosphere Reserve (MBR. In both cases, we show how these security-provoked evictions are authorised by the mobilisation of interlocking axes of difference that articulate notions of territorial trespass with that of a racialised enemy. Rather than a new problem or phenomena, we show how these axes are rooted in prior histories of state actors rendering racialised subjects dangerous, Cold War histories in both cases and a longer colonial history with the LNP. We also show how standing behind these evictions is the nation-state and its practices of protected area territorialisation. From here, we illustrate how the rationale behind displacement from protected areas matters, as evictions become more difficult to contest once they are authorised by security considerations. The cases, however, differ in one key respect. While displacement from the LNP is an instance of conservation-induced displacement (CID, although one re-worked by security considerations, eviction from the MBR is motivated more centrally by security concerns yet takes advantage of protected area legislation. The study hence offers insight into a growing literature on conservation-security encounters and into different articulations of conservation, security, and displacement.

  8. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    International Nuclear Information System (INIS)

    Scheffran, Juergen

    2009-01-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  9. Deterrence and National Security in the Face of an Amorphous Threat

    Energy Technology Data Exchange (ETDEWEB)

    Werne, R

    2001-01-05

    The National Security threats that we face today and, in turn, the National Security . requirements, are more diverse and complex than they were during the Cold-War from 1945-1990. During that period, and bolstered by the experiences of World Wars I and II, US National Security policy was focused on the stabilization of post WW II country boundaries and containment of the Soviet block and China. The result was the bipolar world in which the nuclear and conventional forces of the United States, the Soviet Union, and their respective allies ensured a measure of political stability through a military stalemate of world wide proportions. The practical result was that large scale changes in national borders were unlikely, but internal conflict within countries, and local conflicts between neighboring countries could still occur, albeit with participation from one or both of the Superpower camps. US National Security Policy was designed primarily for stabilization of the bipolar world on the military front and for competition with the Soviet Union and China on economic and political fronts. The collapse of the Soviet Union changed the global picture. The bipolar world and its military stalemate appear to be gone for the moment and the threat which was the foundation for US National Security policy has changed significantly. Some will argue that China has intentions of replacing the Soviet Union as a military superpower and thus recreate the bipolar world. Furthermore, Russia still has significant nuclear forces and has recently talked of lowering the nuclear threshold in an apparent attempt to make up for its weakened conventional forces. Clearly the threat of large scale nuclear war is much reduced, but not gone entirely. Having acknowledged the Chinese and Russian threats, what does the global picture look like today? The boundaries of most countries are secure but there are significant frictions, that have, or could lead, to armed conflict. Most of these are today

  10. AR.Drone: security threat analysis and exemplary attack to track persons

    Science.gov (United States)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  11. Illicit trafficking of nuclear and other radioactive material: the 'net' security threat

    International Nuclear Information System (INIS)

    Zaitseva, L.; Steinhaeusler, F.

    2005-01-01

    Full text: Illicit trafficking in nuclear and other radioactive material, which could lead to the creation of a nuclear device or a radiological dispersal device (RDD), has been a subject of concern for more than a decade now. This concern became even more pronounced after the September 11 th attacks in the United States, which demonstrated that modern day terrorists are willing and capable of inflicting mass casualties among civilian population in target countries in order to further their goals. The problem of illicit trafficking - intentional diversion and smuggling of nuclear fissile material and radioactive sources - has been closely watched and studied by several national institutions and international organizations. This resulted in the establishment of several nuclear smuggling databases, tracking illicit trafficking incidents. The number of such incidents for a given period varies widely between the different databases, reflecting the different sources of information used, the different geographical regions covered, as well as the different methodologies applied to data mining and data analysis. One major obstacle to assessing the actual security threat due to illicit trafficking is the inclusion of incidents in the analysis, which do not represent a security threat in the sense of being the pre-stage of a terrorist operation or a malevolent act. Such incidents mainly involve inadvertent movement of illegally disposed of radioactive sources in scrap metal or contaminated goods across international borders and discoveries of so called 'orphan' radiation sources. This paper analyzes the global data contained in the database on nuclear smuggling, theft and orphan radiation sources (DSTO) operated by the University of Salzburg, using special filters to discriminate between illicit trafficking incidents involving a criminal intent and those that do not. Thereby, the net security threat of illicit trafficking will be determined to help provide a realistic

  12. The Urban Crisis in Sub-Saharan Africa: A Threat to Human Security and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Mediel Hove

    2013-03-01

    Full Text Available Urban centres have existed and have been evolving for many centuries across the world. However, the accelerated growth of urbanisation is a relatively recent phenomenon. The enormous size of urban populations and more significantly, the rapidity with which urban areas have been and are growing in many developing countries have severe social, economic and physical repercussions. This paper argues that the accelerated growth of urbanisation has amplified the demand for key services. However, the provision of shelter and basic services such as water and sanitation, education, public health, employment and transport has not kept pace with this increasing demand. Furthermore, accelerated and poorly managed urbanisation has resulted in various types of atmospheric, land and water pollution thereby jeopardising human security. This paper offers the conclusion that the increased environmental, social and economic problems associated with rapid urbanisation pose a threat to sustainable development, human security and, crucially, peace.

  13. Mediating Cyber and Physical Threat Propagation in Security Smart Grid Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Neuman, Clifford; Tan, Kymie

    2011-10-01

    The power grid is a federated system. Regions of the system are controlled by different organizations and security of the grid is imposed from above through regulation of the security techniques used by the federants. This approach will be less effective as we move to a smart grid, where control of some elements of the grid rests in the customer’s home through technologies that enable remote access to appliances. These regions of the smart grid are less trusted, yet they interact in various ways with other parts of the grid. This paper demonstrates threat propagation in the smart grid from such regions, and discusses architectural approaches to mediating the impact of such flows.

  14. Detection of biological threats. A challenge for directed molecular evolution.

    Science.gov (United States)

    Petrenko, Valery A; Sorokulova, Iryna B

    2004-08-01

    The probe technique originated from early attempts of Anton van Leeuwenhoek to contrast microorganisms under the microscope using plant juices, successful staining of tubercle bacilli with synthetic dyes by Paul Ehrlich and discovery of a stain for differentiation of gram-positive and gram-negative bacteria by Hans Christian Gram. The technique relies on the principle that pathogens have unique structural features, which can be recognized by specifically labeled organic molecules. A hundred years of extensive screening efforts led to discovery of a limited assortment of organic probes that are used for identification and differentiation of bacteria. A new challenge--continuous monitoring of biological threats--requires long lasting molecular probes capable of tight specific binding of pathogens in unfavorable conditions. To respond to the challenge, probe technology is being revolutionized by utilizing methods of combinatorial chemistry, phage display and directed molecular evolution. This review describes how molecular evolution methods are applied for development of peptide, antibody and phage probes, and summarizes the author's own data on development of landscape phage probes against Salmonella typhimurium. The performance of the probes in detection of Salmonella is illustrated by a precipitation test, enzyme-linked immunosorbent assay (ELISA), fluorescence-activated cell sorting (FACS) and fluorescent, optical and electron microscopy.

  15. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  16. Organizational structure, functions and role of the security system in the process of dealing with security risks and threats in the Republic of Macedonia

    OpenAIRE

    Ice Ilijevski; Zlate Dimovski; Kire Babanoski

    2016-01-01

    Main object of this paper is to present the organizational structure and the function of the security system of the Republic of Macedonia by the regulatory authorities. The security institutions, whose primary purpose is to cope with all sorts of threats and risks, need to be properly interconnected and the cooperation should be on a high level. The security system is a reflection of the characteristics of the state and should be functional, professional and based on law. The purpose of this ...

  17. The potential distribution of cassava mealybug (Phenacoccus manihoti, a threat to food security for the poor.

    Directory of Open Access Journals (Sweden)

    Tania Yonow

    Full Text Available The cassava mealybug is a clear and present threat to the food security and livelihoods of some of the world's most impoverished citizens. Niche models, such as CLIMEX, are useful tools to indicate where and when such threats may extend, and can assist with planning for biosecurity and the management of pest invasions. They can also contribute to bioeconomic analyses that underpin the allocation of resources to alleviate poverty. Because species can invade and establish in areas with climates that are different from those that are found in their native range, it is essential to define robust range-limiting mechanisms in niche models. To avoid spurious results when applied to novel climates, it is necessary to employ cross-validation techniques spanning different knowledge domains (e.g., distribution data, experimental results, phenological observations. We build upon and update a CLIMEX niche model by Parsa et al. (PloS ONE 7: e47675, correcting inconsistent parameters and re-fitting it based on a careful examination of geographical distribution data and relevant literature. Further, we consider the role of irrigation, the known distribution of cassava production and a targeted review of satellite imagery to refine, validate and interpret our model and results. In so doing, we bring new insights into the potential spread of this invasive insect, enabling us to identify potential bio-security threats and biological control opportunities. The fit of the revised model is improved, particularly in relation to the wet and dry limits to establishment, and the parameter values are biologically plausible and accord with published scientific literature.

  18. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    International Nuclear Information System (INIS)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill

    2016-01-01

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis

  19. Video motion detection for physical security applications

    International Nuclear Information System (INIS)

    Matter, J.C.

    1990-01-01

    Physical security specialists have been attracted to the concept of video motion detection for several years. Claimed potential advantages included additional benefit from existing video surveillance systems, automatic detection, improved performance compared to human observers, and cost-effectiveness. In recent years, significant advances in image-processing dedicated hardware and image analysis algorithms and software have accelerated the successful application of video motion detection systems to a variety of physical security applications. Early video motion detectors (VMDs) were useful for interior applications of volumetric sensing. Success depended on having a relatively well-controlled environment. Attempts to use these systems outdoors frequently resulted in an unacceptable number of nuisance alarms. Currently, Sandia National Laboratories (SNL) is developing several advanced systems that employ image-processing techniques for a broader set of safeguards and security applications. The Target Cueing and Tracking System (TCATS), the Video Imaging System for Detection, Tracking, and Assessment (VISDTA), the Linear Infrared Scanning Array (LISA); the Mobile Intrusion Detection and Assessment System (MIDAS), and the Visual Artificially Intelligent Surveillance (VAIS) systems are described briefly

  20. Microbial Threats to Health: Emergence, Detection, and Response

    National Research Council Canada - National Science Library

    Smolinski, Mark S; Hamburg, Margaret A; Lederberg, Joshua

    2003-01-01

    .... The recent SARS outbreak is a prime example. Knowing neither geographic nor political borders, often arriving silently and lethally, microbial pathogens constitute a grave threat to the health of humans...

  1. Fiber Optic Sensors For Detection of Toxic and Biological Threats

    Directory of Open Access Journals (Sweden)

    Jianming Yuan

    2007-12-01

    Full Text Available Protection of public and military personnel from chemical and biological warfareagents is an urgent and growing national security need. Along with this idea, we havedeveloped a novel class of fiber optic chemical sensors, for detection of toxic and biologicalmaterials. The design of these fiber optic sensors is based on a cladding modificationapproach. The original passive cladding of the fiber, in a small section, was removed and thefiber core was coated with a chemical sensitive material. Any change in the opticalproperties of the modified cladding material, due to the presence of a specific chemicalvapor, changes the transmission properties of the fiber and result in modal powerredistribution in multimode fibers. Both total intensity and modal power distribution (MPDmeasurements were used to detect the output power change through the sensing fibers. TheMPD technique measures the power changes in the far field pattern, i.e. spatial intensitymodulation in two dimensions. Conducting polymers, such as polyaniline and polypyrrole,have been reported to undergo a reversible change in conductivity upon exposure tochemical vapors. It is found that the conductivity change is accompanied by optical propertychange in the material. Therefore, polyaniline and polypyrrole were selected as the modifiedcladding material for the detection of hydrochloride (HCl, ammonia (NH3, hydrazine(H4N2, and dimethyl-methl-phosphonate (DMMP {a nerve agent, sarin stimulant},respectively. Several sensors were prepared and successfully tested. The results showeddramatic improvement in the sensor sensitivity, when the MPD method was applied. In thispaper, an overview on the developed class of fiber optic sensors is presented and supportedwith successful achieved results.

  2. A multisignal detection of hazardous materials for homeland security

    Directory of Open Access Journals (Sweden)

    Alamaniotis Miltiadis

    2009-01-01

    Full Text Available The detection of hazardous materials has been identified as one of the most urgent needs of homeland security, especially in scanning cargo containers at United States ports. To date, special nuclear materials have been detected using neutron or gamma interrogation, and recently the nuclear resonance fluorescence has been suggested. We show a new paradigm in detecting the materials of interest by a method that combines four signals (radiography/computer tomography, acoustic, muon scattering, and nuclear resonance fluorescence in cargos. The intelligent decision making software system is developed to support the following scenario: initially, radiography or the computer tomography scan is constructed to possibly mark the region(s of interest. The acoustic interrogation is utilized in synergy to obtain information regarding the ultrasonic velocity of the cargo interior. The superposition of the computer tomography and acoustic images narrows down the region(s of interest, and the intelligent system guides the detection to the next stage: no threat and finish, or proceed to the next interrogation. If the choice is the latter, knowing that high Z materials yield large scattering angle for muons, the muon scattering spectrum is used to detect the existence of such materials in the cargo. Additionally, the nuclear resonance fluorescence scan yields a spectrum that can be likened to the fingerprint of a material. The proposed algorithm is tested for detection of special nuclear materials in a comprehensive scenario.

  3. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  4. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats.

    Science.gov (United States)

    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray

    2014-01-01

    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an

  5. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  6. Lack of skilled personnel as threat to HR security of industrial enterprises

    Directory of Open Access Journals (Sweden)

    Ozernikova Tatiana

    2017-01-01

    Full Text Available The article assesses the needs of Russian industrial enterprises for skilled labor. The authors consider deficiency in qualified personnel as a threat to the human resources security of industrial enterprises, and analyze its causes. The study includes the criteria to distinguish highly skilled employees in the labor force (education level, occupation, correspondence of performed work to education, and analysis of the dynamics of their number. It identifies the internal and external factors that have a significant influence on the number of qualified personnel. The external factors include the size of the salary, population growth due to migration, the regional level of the socio-economic development. The applied methods of analysis are single-factor analysis of variance (F-test, multiple regression and descriptive statistics. The analysis is based on the materials of the Russian Federal State Statistics Service, as well as on the Russian Longitudinal Monitoring Survey - Higher School of Economics.

  7. Radiation Detection for Homeland Security Applications

    Science.gov (United States)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will

  8. Role of nuclear material accounting and control on nuclear security. Countermeasure against insider threat

    International Nuclear Information System (INIS)

    Osabe, Takeshi

    2014-01-01

    Possibility on unauthorized removal (theft) of nuclear material by a facility insider is a recognized as a serious threat. An insider could take advantage or knowledge of control system and access to nuclear material to intercept facility's system designed to protect theft of nuclear material by an insider. This paper will address how the facility level Nuclear Material Accounting and Control (NMAC) System should be designed and implemented to enhance deterring and detect theft of nuclear material by a facility insider. (author)

  9. General Multidecision Theory: Hypothesis Testing and Changepoint Detection with Applications to Homeland Security

    Science.gov (United States)

    2014-10-06

    Manuscript, 1977. [4] I. V. Pavlov . Sequential procedure of testing composite hypotheses with applications to the Kiefer-Weiss problem. Theory of...SECURITY CLASSIFICATION OF: The objective was to develop general theories of sequential hypothesis testing and quickest change detection for complex...multi-population stochastic models, as well as to apply these theories to automatic threat detection and classification with low false alarm and miss

  10. COMPUTER SYSTEM AND MODELLING OF THREATS TO ENERGY SECURITY OF MOLDOVA IN CASE OF INTERSYSTEM COMMUNICATION DISCONNECTION

    Directory of Open Access Journals (Sweden)

    Bicova E.V.

    2010-12-01

    Full Text Available In the paper modeling of a group of scenarios of threats to energetic security of Moldovan energy system, which occur in case of disconnecting (or limitation of cross-flows of electricity of 330 kV transmission line Balti-Dniester HPS. It was used for analysis a software application for energy security monitoring. The application has been developed in IE ASM.

  11. Scanning of Open Data for Detection of Emerging Organized Crime Threats

    DEFF Research Database (Denmark)

    Pastor Pastor, Raquel; Larsen, Henrik Legind

    2017-01-01

    In fighting organized crime, open data provide an important source for both detecting emerging threats, as well as forecasting future threats. This allows the police to plan their resources and capacity for countering the threats in due time to prevent it or at least to mitigate its effects......”, for such a scanning system. Through a prototype demonstrated with use cases, the project provided a proof of concept of an efficient and effective environmental scanning system as part of the early warning system for discovering emerging, as well as likely future, organized crime threats. Main elements...

  12. Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2009-09-01

    Full Text Available Knapp, K.J. (Ed. (2009. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions. Hershey, NY: Information Science Reference. 434 + xxii pages, ISBN: 978-1-60566-326-5, US$195.Reviewed by Gary C. Kessler (gck@garykessler.netI freely admit that this book was sent to me by the publisher for the expressed purpose of my writing a review and that I know several of the chapter authors. With that disclosure out of the way, let me say that the book is well worth the review (and I get to keep my review copy.The preface to the book cites the 2003 publication of The National Strategy to Secure Cyberspace by the White House, and the acknowledgement by the U.S. government that our economy and national security were fully dependent upon computers, networks, and the telecommunications infrastructure. This mayhave come as news to the general population but it was a long overdue public statement to those of us in the industry. The FBI's InfraGard program and the formation of the National Infrastructure Protection Center (NIPC pre-dated this report by at least a half-dozen years, so the report was hardly earthshattering. And the fact that the bulk of the telecom infrastructure is owned by the private sector is a less advertized fact. Nonetheless, reminding the community of these facts is always a Good Thing and provides the raison d’être of this book.(see PDF for full review

  13. The emerging threat of superwarfarins: history, detection, mechanisms, and countermeasures: The emerging threat of superwarfarins

    Energy Technology Data Exchange (ETDEWEB)

    Feinstein, Douglas L. [Department of Anesthesiology, University of Illinois, Chicago Illinois; Jesse Brown VA Medical Center, Chicago Illinois; Akpa, Belinda S. [Department of Molecular Biomedical Sciences, North Carolina State University, Raleigh North Carolina; Ayee, Manuela A. [Department of Medicine, University of Illinois, Chicago Illinois; Boullerne, Anne I. [Department of Anesthesiology, University of Illinois, Chicago Illinois; Jesse Brown VA Medical Center, Chicago Illinois; Braun, David [Department of Anesthesiology, University of Illinois, Chicago Illinois; Brodsky, Sergey V. [Department of Pathology, the Ohio State University, Columbus Ohio; Gidalevitz, David [Department of Physics and the Center for the Molecular Study of Condensed Soft Matter, Illinois Institute of Technology, Chicago Illinois; Hauck, Zane [Department of Medicinal Chemistry and Pharmacognosy, University of Illinois, Chicago Illinois; Kalinin, Sergey [Department of Anesthesiology, University of Illinois, Chicago Illinois; Kowal, Kathy [Department of Anesthesiology, University of Illinois, Chicago Illinois; Kuzmenko, Ivan [X-ray Science Division, Argonne National Laboratory, Lemont Illinois; Lis, Kinga [Department of Anesthesiology, University of Illinois, Chicago Illinois; Marangoni, Natalia [Department of Anesthesiology, University of Illinois, Chicago Illinois; Martynowycz, Michael W. [Department of Physics and the Center for the Molecular Study of Condensed Soft Matter, Illinois Institute of Technology, Chicago Illinois; X-ray Science Division, Argonne National Laboratory, Lemont Illinois; Rubinstein, Israel [Department of Anesthesiology, University of Illinois, Chicago Illinois; Department of Medicine, University of Illinois, Chicago Illinois; van Breemen, Richard [Department of Anesthesiology, University of Illinois, Chicago Illinois; Ware, Kyle [Department of Pathology, the Ohio State University, Columbus Ohio; Weinberg, Guy [Department of Anesthesiology, University of Illinois, Chicago Illinois; Jesse Brown VA Medical Center, Chicago Illinois

    2016-05-31

    Superwarfarins were developed following the emergence of warfarin resistance in rodents. Compared to warfarin, superwarfarins have much longer half-lives and stronger affinity to vitamin K epoxide reductase and therefore can cause death in warfarin-resistant rodents. By the mid-1970s, the superwarfarins brodifacoum and difenacoum were the most widely used rodenticides throughout the world. Unfortunately, increased use was accompanied by a rise in accidental poisonings, reaching >16,000 per year in the United States. Risk of exposure has become a concern since large quantities, up to hundreds of kilograms of rodent bait, are applied by aerial dispersion over regions with rodent infestations. Reports of intentional use of superwarfarins in civilian and military scenarios raise the specter of larger incidents or mass casualties. Unlike warfarin overdose, for which 1–2 days of treatment with vitamin K is effective, treatment of superwarfarin poisoning with vitamin K is limited by extremely high cost and can require daily treatment for a year or longer. Furthermore, superwarfarins have actions that are independent of their anticoagulant effects, including both vitamin K–dependent and –independent effects,which are not mitigated by vitaminKtherapy. In this review, we summarize superwarfarin development, biology and pathophysiology, their threat as weapons, and possible therapeutic approaches.

  14. Optimum electromagnetic weapons detection system. [Airport security

    Energy Technology Data Exchange (ETDEWEB)

    Capots, L.H.; Gregory, W.D.; George, J.P.

    1973-09-01

    An optimized weapons detection system based on the ''active'' or ''a.c. susceptibility'' principle is described. For such uses as airport security the method should be capable of screening both passengers and hand baggage simultaneously. This detector uses the latest basic research results obtained on studies of a.c. susceptibility of metals, and identifies weapons characteristics using those results obtained from identifying chemical spectra with search routines, employing minicomputers. The detector is capable of characterizing both magnetic and non-magnetic weapons with a precision otherwise presently unavailable. System design and test data are presented.

  15. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  16. Detecting objects in radiographs for homeland security

    Science.gov (United States)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  17. Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat

    Science.gov (United States)

    Jelasity, Márk; Bilicki, Vilmos

    In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. It has been shown that malicious P2P networks would be nearly impossible to uncover if they operated in a stealth mode, that is, using only a small constant number of fixed overlay connections per node for communication. While overlay networks of a small constant maximal degree are generally considered to be unscalable, we argue in this paper that it is possible to design them to be scalable, efficient and robust. This is an important finding from a security point of view: we show that stealth mode P2P malware that is very difficult to discover with state-of-the-art methods is a plausible threat. In this paper we discuss algorithms and theoretical results that support the scalability of stealth mode overlays, and we present realistic simulations using an event based implementation of a proof-of-concept system. Besides P2P botnets, our results are also applicable in scenarios where relying on a large number of overlay connections per node is not feasible because of cost or the limited number of communication channels available.

  18. Opening of Offshore Oil Business in Mexico and Associated Framework to Cope with Potential Maritime Security Threats

    Directory of Open Access Journals (Sweden)

    Adriana Ávila-Zúáiga-Nordfjeld

    2018-03-01

    Full Text Available After 75 years of State oil monopoly, Mexico performed the first business oil round in 2015 involving the private sector. This auction-round offered 14 oil exploration fields located on the continental shelf to private companies. The development and exploitation of these hydrocarbon fields faces significant challenges regarding security. The economic loss for theft of hydrocarbons through illegal connections to pipelines is estimated to 973 million, 125 thousand U.S. dollar, only for the year of 2014. While productive research has been made, it has mainly focused on transportation systems and basically, pipelines. The development and establishment of policies prioritizing maritime security and protection of critical offshore infrastructure against theft of hydrocarbons, drugs organizations and terror attacks needs to be included in the national agenda to improve maritime security and mitigate potential security threats at sea, including damage to the marine environment. This could increase the trust of investors and stakeholders and would contribute to the faster development of new exploration and production fields. While the International Ship and Port Facility Security Code (ISPS Code is the cornerstone for the construction of the port?s security program and establishes the requirements of the Port Facility Security Plan (PFSP, including oil port facilities, it has not been fully implemented in several important Mexican ports. It is concluded that some important ports lack many of the core security processes, procedures and controls that should be included in any PFSP. This article briefly reviews the situation of the oil industry from a security perspective and discusses key elements of maritime security; addressing the necessity of the inclusion of maritime security and protection of critical oil infrastructure offshore in the national agenda that would provide for future research directions in the maritime security domain and contribute to

  19. Training organizational supervisors to detect and prevent cyber insider threats: two approaches

    Directory of Open Access Journals (Sweden)

    Dee H. Andrews

    2013-05-01

    Full Text Available Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.

  20. Human trafficking as a threat for the security of member states of EU

    Directory of Open Access Journals (Sweden)

    Mirela Kapo

    2017-07-01

    Full Text Available The topic “Trafficking of human beings” as subject to advanced studies has been chosen due to a growing interest linked with the phenomenon in question. The study introduces a legal criminal overview of the criminal activity consisted of the recruitment, transport, transfer or reception of persons by means of force or forms of fraud for exploitation purposes. Human trafficking represents a threat for the security of member states. The trend to penetrate to all spheres of the society has obliged the European states to draft a new directive reflecting the growing concern about the phenomenon in question, by respecting human rights in accordance with the legal framework under the United Nations, International Labor Organization (ILO, and Council of Europe etc. The new European priorities aim at victims’ identification, their protection and prevention of the phenomenon and more intense criminal prosecution of traffickers. With the view of fully developing this topic, the outline consists of four chapters preceded by a historical background of human trafficking. Special importance in this study, specifically in the second chapter, is attached to the assistance and protection of the victims of human trafficking. It is crucial that these victims exercise their rights effectively. Therefore, the European directives foresee assistance and support before, after and during the criminal proceeding. The third chapter refers to the relevant legal mechanisms in this field assuring the victims of trafficking legal defense, the right to information and their social, psychological and physical recovery. One of the “key” legal instruments is the Palermo Convention, which gives for the first time a detailed definition of the term of trafficking and smuggling and makes the differences between them. All legal instruments converge to one point: the consent of the human trafficking victim is not important when it is used any of the means of force, threat

  1. Classification-free threat detection based on material-science-informed clustering

    Science.gov (United States)

    Yuan, Siyang; Wolter, Scott D.; Greenberg, Joel A.

    2017-05-01

    X-ray diffraction (XRD) is well-known for yielding composition and structural information about a material. However, in some applications (such as threat detection in aviation security), the properties of a material are more relevant to the task than is a detailed material characterization. Furthermore, the requirement that one first identify a material before determining its class may be difficult or even impossible for a sufficiently large pool of potentially present materials. We therefore seek to learn relevant composition-structure-property relationships between materials to enable material-identification-free classification. We use an expert-informed, data-driven approach operating on a library of XRD spectra from a broad array of stream of commerce materials. We investigate unsupervised learning techniques in order to learn about naturally emergent groupings, and apply supervised learning techniques to determine how well XRD features can be used to separate user-specified classes in the presence of different types and degrees of signal degradation.

  2. The emerging threat of superwarfarins: history, detection, mechanisms, and countermeasures.

    Science.gov (United States)

    Feinstein, Douglas L; Akpa, Belinda S; Ayee, Manuela A; Boullerne, Anne I; Braun, David; Brodsky, Sergey V; Gidalevitz, David; Hauck, Zane; Kalinin, Sergey; Kowal, Kathy; Kuzmenko, Ivan; Lis, Kinga; Marangoni, Natalia; Martynowycz, Michael W; Rubinstein, Israel; van Breemen, Richard; Ware, Kyle; Weinberg, Guy

    2016-06-01

    Superwarfarins were developed following the emergence of warfarin resistance in rodents. Compared to warfarin, superwarfarins have much longer half-lives and stronger affinity to vitamin K epoxide reductase and therefore can cause death in warfarin-resistant rodents. By the mid-1970s, the superwarfarins brodifacoum and difenacoum were the most widely used rodenticides throughout the world. Unfortunately, increased use was accompanied by a rise in accidental poisonings, reaching >16,000 per year in the United States. Risk of exposure has become a concern since large quantities, up to hundreds of kilograms of rodent bait, are applied by aerial dispersion over regions with rodent infestations. Reports of intentional use of superwarfarins in civilian and military scenarios raise the specter of larger incidents or mass casualties. Unlike warfarin overdose, for which 1-2 days of treatment with vitamin K is effective, treatment of superwarfarin poisoning with vitamin K is limited by extremely high cost and can require daily treatment for a year or longer. Furthermore, superwarfarins have actions that are independent of their anticoagulant effects, including both vitamin K-dependent and -independent effects, which are not mitigated by vitamin K therapy. In this review, we summarize superwarfarin development, biology and pathophysiology, their threat as weapons, and possible therapeutic approaches. © 2016 New York Academy of Sciences.

  3. Adaptive, Model-Based Monitoring and Threat Detection

    National Research Council Canada - National Science Library

    Valdes, Alfonso

    2002-01-01

    .... We describe a network intrusion detection system (IDS) using Bayes inference, wherein the knowledge base is encoded not as rules but as conditional probability relations between observables and hypotheses of normal and malicious usage...

  4. Domestic Threats, Regional Solutions? The Challenge of Regional Security Integration in Southern Africa

    OpenAIRE

    Hammerstad, Anne

    2005-01-01

    The article discusses the salience of different theories of regional security integration through the prism of the experience of the Southern African Development Community (SADC). It tracks the region's progress from a hostile security complex to a nascent security community and asks what strategy for security integration should be employed to continue this positive trend. Although Southern African leaders seem to prefer a collective security strategy à la NATO, the common security approach o...

  5. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Directory of Open Access Journals (Sweden)

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  6. Simulating the Adaptive Mechanisms to Reduce the Risks of Occurence of Threats to the Economic Security of Enterprise

    Directory of Open Access Journals (Sweden)

    Glushchevsky Vyacheslav V.

    2017-09-01

    Full Text Available The article is concerned with addressing the topical problem of effectively countering real and potential threats to economic security of enterprises and reducing the risks of their occurrence. The article is aimed at simulating the adaptive mechanisms to counteract external influences on the marketing component of enterprise’s economic security and developing a system of measures for removing threats to price destabilization of its orders portfolio based on a modern economic-mathematical instrumentarium. The common causes of the threats occurrence related to the price policy of enterprise and the tactics of the contractual processes with the business partners have been explored. Hidden reserves for price maneuvering in concluding contracts with customers have been identified. An algorithmic model for an adaptive pricing task in terms of an assortment of industrial enterprise has been built. On the basis of this model, mechanisms have been developed to counteract the threats of occurrence and aggravation of a «price conflict» between the producing enterprise and the potential customers of its products, and to advise on how to remove the risks of their occurrence. Prospects for using the methodology together with the instrumentarium for economic-mathematical modeling in terms of tasks of the price risks management have been indicated.

  7. Modelling multiple threats to water security in the Peruvian Amazon using the WaterWorld Policy Support System

    OpenAIRE

    A. J. J. van Soesbergen; M. Mulligan

    2013-01-01

    This paper explores a multitude of threats to water security in the Peruvian Amazon using the WaterWorld policy support system. WaterWorld is a spatially explicit, physically-based globally-applicable model for baseline and scenario water balance that is particularly well suited to heterogeneous environments with little locally available data (e.g. ungauged basins) and which is delivered through a simple web interface, requiring little local capacity for use. The model is capable of pr...

  8. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  9. Utilizing Biomimetric Image Processing to Rapidly Detect Rollover Threats

    Science.gov (United States)

    2006-11-01

    algorithm based on the neurobiology of insect vision, specifically the vision of a fly. The system consists of a Long-Wavelength Infrared (LWIR...fly eye-based vision, or biomimetric edge vision, is based on the neurobiology of insect vision, since insects rely on edge detection to avoid...GPS, compass , and dead reckoning. Figure 6 shows an example of a potential DVI display for the driver. Figure 6: Conceptual Design for the DVI

  10. Automated and miniaturized detection of biological threats with a centrifugal microfluidic system

    Science.gov (United States)

    Mark, D.; van Oordt, T.; Strohmeier, O.; Roth, G.; Drexler, J.; Eberhard, M.; Niedrig, M.; Patel, P.; Zgaga-Griesz, A.; Bessler, W.; Weidmann, M.; Hufert, F.; Zengerle, R.; von Stetten, F.

    2012-06-01

    The world's growing mobility, mass tourism, and the threat of terrorism increase the risk of the fast spread of infectious microorganisms and toxins. Today's procedures for pathogen detection involve complex stationary devices, and are often too time consuming for a rapid and effective response. Therefore a robust and mobile diagnostic system is required. We present a microstructured LabDisk which performs complex biochemical analyses together with a mobile centrifugal microfluidic device which processes the LabDisk. This portable system will allow fully automated and rapid detection of biological threats at the point-of-need.

  11. Profile-based adaptive anomaly detection for network security.

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Pengchu C. (Sandia National Laboratories, Albuquerque, NM); Durgin, Nancy Ann

    2005-11-01

    As information systems become increasingly complex and pervasive, they become inextricably intertwined with the critical infrastructure of national, public, and private organizations. The problem of recognizing and evaluating threats against these complex, heterogeneous networks of cyber and physical components is a difficult one, yet a solution is vital to ensuring security. In this paper we investigate profile-based anomaly detection techniques that can be used to address this problem. We focus primarily on the area of network anomaly detection, but the approach could be extended to other problem domains. We investigate using several data analysis techniques to create profiles of network hosts and perform anomaly detection using those profiles. The ''profiles'' reduce multi-dimensional vectors representing ''normal behavior'' into fewer dimensions, thus allowing pattern and cluster discovery. New events are compared against the profiles, producing a quantitative measure of how ''anomalous'' the event is. Most network intrusion detection systems (IDSs) detect malicious behavior by searching for known patterns in the network traffic. This approach suffers from several weaknesses, including a lack of generalizability, an inability to detect stealthy or novel attacks, and lack of flexibility regarding alarm thresholds. Our research focuses on enhancing current IDS capabilities by addressing some of these shortcomings. We identify and evaluate promising techniques for data mining and machine-learning. The algorithms are ''trained'' by providing them with a series of data-points from ''normal'' network traffic. A successful algorithm can be trained automatically and efficiently, will have a low error rate (low false alarm and miss rates), and will be able to identify anomalies in ''pseudo real-time'' (i.e., while the intrusion is still in progress

  12. Proposal of secure camera-based radiation warning system for nuclear detection

    International Nuclear Information System (INIS)

    Tsuchiya, Ken'ichi; Kurosawa, Kenji; Akiba, Norimitsu; Kakuda, Hidetoshi; Imoto, Daisuke; Hirabayashi, Manato; Kuroki, Kenro

    2016-01-01

    Counter-terrorisms against radiological and nuclear threat are significant issues toward Tokyo 2020 Olympic and Paralympic Games. In terms of cost benefit, it is not easy to build a warning system for nuclear detection to prevent a Dirty Bomb attack (dispersion of radioactive materials using a conventional explosive) or a Silent Source attack (hidden radioactive materials) from occurring. We propose a nuclear detection system using the installed secure cameras. We describe a method to estimate radiation dose from noise pattern in CCD images caused by radiation. Some dosimeters under neutron and gamma-ray irradiations (0.1mSv-100mSv) were taken in CCD video camera. We confirmed amount of noise in CCD images increased in radiation exposure. The radiation detection using CMOS in secure cameras or cell phones has been implemented. However, in this presentation, we propose a warning system including neutron detection to search shielded nuclear materials or radiation exposure devices using criticality. (author)

  13. Security in Iraq: A Framework for Analyzing Emerging Threats as U.S. Forces Leave

    Science.gov (United States)

    2010-01-01

    become more secure and stable following its paroxysm of violence in 2006–2007. Over the past two years, most Sunni tribes have turned against al Qaeda in...and Security Conditions of U.S. Withdrawal Background By every measure, Iraq has become more secure and stable since its paroxysm of violence in

  14. Russian Threat Perceptions and Security Policies: Soviet Shadows and Contemporary Challenges

    OpenAIRE

    Cimbala, Stephen J.

    2013-01-01

    The relationship between military reform in Russia and Russian threat perceptions is influenced by the Soviet past, by Russian domestic politics, and by the character of current U.S.-Russian and NATO-Russian relations. Prospective Russian military reform is endangered by continuing threat perceptions that exaggerate Russian military weakness and by domestic forces that play against a rational assessment of Russia's geostrategic requirements.

  15. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  16. Improving Tamper Detection for Hazardous Waste Security

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-02-26

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them.

  17. Improving Tamper Detection for Hazardous Waste Security

    International Nuclear Information System (INIS)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-01-01

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them

  18. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available Darshan Lakha Vodacom Group CTSO 6th CSIR Conference 6 October 2017 INSIDER THREATS Darshan Lakha 2 INSIDER THREATS | Impact Darshan Lakha 3 Are insider threats the main security threat in 2017? 2017 insider threat Intelligence report (Dtex...,2017) High Risk Applications 95% Leavers, Joiners & Movers 56% Public Data 64% Inappropriate Internet Usag 59% Security Bypass x2 INSIDER THREATS | Who is involved? Darshan Lakha 4 Privileged Users Terminated Employees Third...

  19. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    Science.gov (United States)

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  20. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along

  1. Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.; van Tiel, F.

    2011-01-01

    Virtualization is one of the enabling technologies of cloud computing. It turns once dedicated physical computing resources such as servers into digital resources that can be provisioned on demand. Cloud computing thus tends to replace physical with digital security controls, and cloud security must

  2. Intrusion detection for the solution of security problems

    International Nuclear Information System (INIS)

    Buchmueller, R.

    1982-01-01

    Constantly growing security problems in public as well as private sectors can no longer be solved without the use of modern intrusion detection systems. BBC, as general contractor, offers the system solutions to fully meet these problems. These solutions include analysis of the site to be protected, installation, commissioning and maintenance of the security system. (orig.) [de

  3. Dodging Bullets: The Threat of Space Debris to U.S. National Security

    Science.gov (United States)

    2010-06-11

    strategies towards space. The 2007 ISAB Report on U.S. Space Policy emphasizes a Option Two: Protect Assets Against Threats in Space Through Force...decisions and the teachings of the most highly qualified publicists . This generic use of the term “convention” embraces all international agreements...

  4. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  5. A Feasibility Study on Detection of Insider Threats based on Human Bio-signals

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The insider threat means that trusted workers in an organization might carry out harmful acts from the negligent use of classified data to potentially sabotage the workplace. Surveys and studies conducted over the last decade have consistently shown the critical nature of the insider threats problem, in both government and private sectors. The shortcomings of existing systems, such as mental self-assessment and peer review, are very subjective, biased-assessments and employed infrequently. To overcome these limitations, this study investigates the feasibility of detecting and predicting an insider threat by using human biodata, from smart wearable devices. This paper showed the feasibility of predicting and detecting insider threats using EEG, GSR and ECG signals. In the section 2.1, two research hypotheses were established to identify the significant difference on EEG, GSR and ECG signals when the subject decided bad action and is the placed in deceit situation. These hypotheses were tested using two kinds of pilot experiments in the form of input (stimulus) and output (checking response of physiological signals and reaction time)

  6. Promoting nuclear security: What the IAEA is doing. The Agency is implementing a comprehensive programme aimed at stemming the threat of nuclear terrorism

    International Nuclear Information System (INIS)

    2003-01-01

    The threat to public safety and security posed by some form of nuclear terrorism is not new. But in the wake of recent highly organized terrorist attacks in Kenya, Tanzania, the US, Indonesia, Saudi Arabia, Morocco and numerous other nations, the international community has come to recognize that new and stronger measures must be taken to protect against and prepare for a diverse range of terrorist scenarios. Given the multiplicity of targets and scenarios for terrorists, States must consider a comprehensive approach to combating nuclear terrorism. Among the key priorities: Adequate physical protection of all nuclear materials, radioactive materials and facilities plus transport systems; Proper regulatory control of nuclear and radioactive material; Effective detection and interdiction of illicit trafficking in nuclear and radioactive materials; Integration of nuclear safety and security systems for maximum benefits; and Readiness for implementing emergency response plans. The IAEA is assisting its Member States with these challenges in many ways. Through well-established activities, the Agency has been heavily involved in providing assistance and technical support to States in all these areas. The IAEA has established several advisory services to help Member States to assess the effectiveness and the need for improvement of their national physical oversight systems. The IAEA provides peer reviews in related areas such as regulatory or control infrastructures, and also supplies expert technical advice on the required upgrades. Several of these specialized services aim directly at protecting against terrorist threats. The International Nuclear Security Advisory Service is a new initiative that is providing specialized services promoting enhanced nuclear security. The International SSAC Advisory Service (ISSAS) is another new initiative providing advice to Member States in strengthening their SSAC. The IAEA also offers the EPREV (Emergency Preparedness REView

  7. Securing services in the cloud: an investigation of the threats and the mitigations

    Science.gov (United States)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  8. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    2010-04-01

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  9. Inland capture fishery contributions to global food security and threats to their future

    Science.gov (United States)

    Youn, So-Jung; Taylor, William W.; Lynch, Abigail J.; Cowx, Ian G.; Beard, T. Douglas; Bartley, Devin; Wu, Felicia

    2014-01-01

    Inland fish and fisheries play important roles in ensuring global food security. They provide a crucial source of animal protein and essential micronutrients for local communities, especially in the developing world. Data concerning fisheries production and consumption of freshwater fish are generally inadequately assessed, often leading decision makers to undervalue their importance. Modification of inland waterways for alternative uses of freshwater (particularly dams for hydropower and water diversions for human use) negatively impacts the productivity of inland fisheries for food security at local and regional levels. This paper highlights the importance of inland fisheries to global food security, the challenges they face due to competing demands for freshwater, and possible solutions.

  10. Factors increasing snake detection and perceived threat in captive rhesus macaques (Macaca mulatta).

    Science.gov (United States)

    Etting, Stephanie F; Isbell, Lynne A; Grote, Mark N

    2014-02-01

    The primary predators of primates are all ambush hunters, and yet felids, raptors, and snakes differ in aspects of their ecology that affect the evasive strategies of their primate prey. Felids and raptors can traverse long distances quickly, thus the urgency of threat they present increases as they come closer in proximity to primates. In contrast, snakes do not move rapidly over long distances, and so primates may be reasonably safe even at close distances provided snakes can be detected and monitored. We investigated the ability of captive rhesus macaques (Macaca mulatta) to detect snakes at distances ranging from 15 to 1.5 m. We also examined variation in intensity of perceived threat by applying a Hidden Markov Model to infer changes in underlying state from observable behaviors, that is, increased attention and mobbing. We found that the macaques often failed to detect snake models but that closer proximity improved snake detection, which is necessary before threat can be perceived. We also found that having only one individual in fairly close proximity (≤ 7.5 m) was sufficient to alert the rest of the group and so the chances of detection did not increase with increasing group size. Finally, we found that when the snakes were perceived, they did not elicit greater intensity of response with closer proximity. These results provide evidence that the threat from snakes is greatest when they are in proximity to primates but are unseen. When snakes are seen, however, distance appears not to affect primates' perceived risk, in contrast to their perceived risk from raptors and felids. © 2013 Wiley Periodicals, Inc.

  11. The application of nuclear and national security safeguard strategies to the insider threat in the private sector

    International Nuclear Information System (INIS)

    Campbell, G.K.

    1991-01-01

    This paper reports that the insider threat in commercial enterprises represents multi-billion dollar losses on an annual basis. While much of this experience is in low value, theft-related shrinkage, there are a growing number of organizations where the loss or compromise of critical assets or interruption of vital systems cannot be tolerated. In very real ways, the survival of the organization may turn on the hostile acts of knowledgeable insiders. The nuclear and National security information operations environments represents a baseline of experience from which the corporate world can draw for cost-effective, alternative approaches to this threat. However, it is equally clear that there are a variety of subtle and obvious constraints imposed by the private sector's mission, service delivery, lifestyle and cost-benefit requirements which dictate careful planning and user involvement in safeguards development and application. Where protection of our National security assets are grounded in a consequence-driven set of policies and standards, the private sector is often subject to the lack of a similar (but directly analogous) policy foundation

  12. The U.S. Strategic Petroleum Reserve: Needed Changes to Counter Today's Threats to Energy Security

    National Research Council Canada - National Science Library

    Peck, Jr, Bruce L

    2006-01-01

    The Strategic Petroleum Reserve (SPR) of the United States is critical to its national security because of the nation's reliance on oil and refined petroleum products as the cornerstone of its economic and military power...

  13. The New Middle East Security Threat: The Case of Yemen and the GCC

    National Research Council Canada - National Science Library

    Al-Hajjri, Ibrahim

    2007-01-01

    .... Yemen suffers from a weak economy and a number of security issues of its own. Through the borders shared with its GCC neighbors, Yemen has become plagued by a nexus of terrorism, arms smuggling, and drug trafficking...

  14. How to use security risk assessments to manage risks, prevent violence and deal with new threats.

    Science.gov (United States)

    Ramsey-Hamilton, Caroline

    2015-01-01

    With a growing number of healthcare security requirements from states as well as regulators like FEMA, CMS, and DHS, the need to conduct comprehensive Security Risk Assessments has become essential, according to the author. In this article, she provides the basic elements of such assessments as well as guidance on how to apply them to a facility report and how to present the report to management.

  15. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  16. Security Framework and Jamming Detection for Internet of Things

    DEFF Research Database (Denmark)

    Babar, Sachin D.

    , security for IoT will be a critical concern that must be addressed in order to enable several current and future applications. The resource constrained devices such as cell phones, PDAs, RFIDs, sensor nodes etc. are the part of IoT. Design process for securing these resource constrained devices is guided...... by factors like small form factor, good performance, low energy consumption, and robustness to attacks. These design constraints forces us to think of integrating the security features right in to the hardware and software parts of the devices which is also called as embedded security. The research......T. The research also highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. The research proposes the embedded security framework as a feature of software...

  17. Design Basis Threat (DBT) Approach for the First NPP Security System in Indonesia

    International Nuclear Information System (INIS)

    Ign Djoko Irianto

    2004-01-01

    Design Basis Threat (DBT) is one of the main factors to be taken into account in the design of physical protection system of nuclear facility. In accordance with IAEA's recommendations outlined in INFCIRC/225/Rev.4 (Corrected), DBT is defined as: attributes and characteristics of potential insider and/or external adversaries, who might attempt unauthorized removal of nuclear material or sabotage against the nuclear facilities. There are three types of adversary that must be considered in DBT, such as adversary who comes from the outside (external adversary), adversary who comes from the inside (internal adversary), and adversary who comes from outside and colludes with insiders. Current situation in Indonesia, where many bomb attacks occurred, requires serious attention on DBT in the physical protection design of NPP which is to be built in Indonesia. This paper is intended to describe the methodology on how to create and implement a Design Basis Threat in the design process of NPP physical protection in Indonesia. (author)

  18. Mexican Drug Trafficking Organizations: A Threat to the United States National Security

    Science.gov (United States)

    2011-03-03

    to be an existing member of Los Zetas. The immigrant, who was arrested by the Zapata Sheriffs Department while smuggling 400 pounds of marijuana...new pubs/jp1 02. pdf . Retrieved 20 February 2011. 2. US Department of Justice, National Drug Threat Assessment 2010 (Washington D.C.: National Drug...Cartels, CRS Report for Congress, (October 16, 2007), http://www.fas.org/sgp/crs/row/RL34215. pdf . 8. Jeremy Roebuck, "Violence the result of fractured

  19. Strategy to Combat Transnational Organized Crime: Addressing Converging Threats to National Security

    Science.gov (United States)

    2011-07-01

    here and join in building a new framework for international cooperation to protect all our citizens from the violence, harm, and exploitation wrought...trafficking as increasingly intertwined threats to maximize the impact of U.S. resources. It also provides a framework to direct U.S. power against...open sources intelligence ( OSINT ). This effort will be aided through greater information sharing with foreign partners and closer cooperation among

  20. Transnational Challenges and U.S. National Security: Defining and Prioritizing Borderless Threats

    Science.gov (United States)

    2017-11-01

    made extensive and innovative use of social media , including Twitter and Facebook, to garner support from its followers around the globe in ways...United States. But other issues —humanitarian crises, international economic flows, international justice, and threats to public health —have flowed...Coordinator and Health Diplomacy, Office of the Representative for Global Health Diplomacy Office of Global Women’s Issues Office of Global Food

  1. Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs.

    Science.gov (United States)

    Veerasamy, Anitha; Madane, Srinivasa Rao; Sivakumar, K; Sivaraman, Audithan

    2016-01-01

    Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.

  2. "The Islamic State Of Iraq And The Levant" (ISIL In The System Of Threats To The National Security Of Russia

    Directory of Open Access Journals (Sweden)

    Pavel V. Agapov

    2014-09-01

    Full Text Available In the present work authors analyze political, economic, military and many other aspects of the "Islamic State of Iraq and Levant" activity as essential factor of the destabilization in the region of the Middle East. Authors investigate destructive consequences of this terrorist religious group's positions strengthening for the national security of the Russian Federation and border states. Authors note that actions in Syria and Iraq have indirect, but transnational effect, pose threat to the interests of the national security of Russia, especially including one, conducted in Crimea with the use of Islamic radicals for this purpose, who are on the peninsula and territory of the Ukraine. In the present article authors note that every year in the process of the population's psychological fatigue strengthening, new losses among the military personnel and the intelligence services staff and also death of peaceful citizens, their positions will only amplify. "Defeatism" will become a powerful political force. Problem of the international legal aspect of the counteraction to the threat from the actions of foreign fighters-terrorists who are hired or accepted with ISIL, al-Nusra Front and other groups and organizations of the terrorist orientation is connected with the implementation of the UN Security Council Resolution 2178 (2014 made on September 24, 2014. It’s main objective – development of the nonviolent ways of the conflicts prevention and settlement for the purposes of the radicalization to the level generating terrorism risk degree decrease. In the conclusion authors argument that it is especially actual for the Russian regions, which is extremely vulnerable to extremism (North Caucasus, Volga Region.

  3. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    Science.gov (United States)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  4. Security in software-defined wireless sensor networks: threats, challenges and potential solutions

    CSIR Research Space (South Africa)

    Pritchard, SW

    2017-07-01

    Full Text Available water management. This model makes use of a Software-Defined Networking (SDN) approach to manage a Wireless Sensor Network (WSN) in order to solve most of the inherent issues surrounding WSNs. One of the most important aspects of any network, is security...

  5. Wireless LAN security management with location detection capability in hospitals.

    Science.gov (United States)

    Tanaka, K; Atarashi, H; Yamaguchi, I; Watanabe, H; Yamamoto, R; Ohe, K

    2012-01-01

    In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags. The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk. We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.

  6. On the early detection of threats in the real world based on open-source information on the internet

    NARCIS (Netherlands)

    Bouma, H.; Rajadell Rojas, O.; Worm, D.T.H.; Versloot, C.A.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time

  7. Detection of vapor-phase organophosphate threats using wearable conformable integrated epidermal and textile wireless biosensor systems.

    Science.gov (United States)

    Mishra, Rupesh K; Martín, Aida; Nakagawa, Tatsuo; Barfidokht, Abbas; Lu, Xialong; Sempionatto, Juliane R; Lyu, Kay Mengjia; Karajic, Aleksandar; Musameh, Mustafa M; Kyratzis, Ilias L; Wang, Joseph

    2018-03-15

    Flexible epidermal tattoo and textile-based electrochemical biosensors have been developed for vapor-phase detection of organophosphorus (OP) nerve agents. These new wearable sensors, based on stretchable organophosphorus hydrolase (OPH) enzyme electrodes, are coupled with a fully integrated conformal flexible electronic interface that offers rapid and selective square-wave voltammetric detection of OP vapor threats and wireless data transmission to a mobile device. The epidermal tattoo and textile sensors display a good reproducibility (with RSD of 2.5% and 4.2%, respectively), along with good discrimination against potential interferences and linearity over the 90-300mg/L range, with a sensitivity of 10.7µA∙cm 3 ∙mg -1 (R 2 = 0.983) and detection limit of 12mg/L in terms of OP air density. Stress-enduring inks, used for printing the electrode transducers, ensure resilience against mechanical deformations associated with textile and skin-based on-body sensing operations. Theoretical simulations are used to estimate the OP air density over the sensor surface. These fully integrated wearable wireless tattoo and textile-based nerve-agent vapor biosensor systems offer considerable promise for rapid warning regarding personal exposure to OP nerve-agent vapors in variety of decentralized security applications. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    Science.gov (United States)

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record.

  9. SYSTEMATIZATION OF INTERNATIONAL EXPERIENCE OF ENSURING ECONOMIC SECURITY OF EXACERBATION OF THE THREATS AND CHALLENGES OF A NEW TYPE FOR NATIONAL AND INTERNATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Tatyana Momot

    2016-11-01

    Full Text Available The aim of the work is to systematize the international experience of economic security both in terms of individual countries and the global economy as a whole. Setting such a goal it is associated with the growth of globalization and integration processes in the world economy, which are the new threat of economic security. Methods. Theoretical and methodological basis of the study were research and findings on issues of economic security at the level of the world economy as a whole and individual national economies in particular. We used such general scientific and special methods, such as analysis and synthesis, comparison, generalization, adaptation. The findings led to the conclusion that the protection of national interests and the formation of an economic security strategy – the most important functions of the state, the implementation of which is impossible without a system of self-regulation mechanisms and regulation. The government should implement a set of measures to promote economic growth, and that will guarantee the economic security of the country. These measures should cover all sectors of the economy. These measures include the implementation an active structural and social policies, enhancing the activity of the state in investment, financial, monetary and foreign economic sphere, the continuation of institutional reforms. The practical significance is to separate the differences used methodological approaches to ensure the economic security of the EU member countries and the CIS. This is explained by the fact that the first group of countries is focused on standards and borrows the experience of the leading EU countries (Germany, France, and the second group, located in the zone of influence of Russia (Moldova, Ukraine, Belarus, Kazakhstan, – on the Russian developments and standards. In turn, Russia in their design focuses more on standards to ensure economic security, which have been made in the period of the Soviet

  10. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  11. Entropy and Self-Organization - An Open System Approach to the Origins of Homeland Security Threats

    Science.gov (United States)

    2015-06-01

    theoretical approaches and facts, it will put together a picture of what that animal might look like—in other words, suggest a pattern in the gestalt ...222 Catarina Kinnvall, “Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security. Political Psychology 25...Management Policy,” Culture & Psychology 12, no. 4 (2006): 421. 255 Moghaddam, How Globalization Spurs Terrorism, 97–98. 256 Moghaddam

  12. Groupthink: A Significant Threat to the Homeland Security of the United States

    Science.gov (United States)

    2014-12-01

    had a devil’s advocate present. The study discovers that regardless of the gender composition of the groups, significantly lower quality decisions...effective attack against Pearl Harbor because Japan was too heavily engaged in other conflicts in Asia . Even after this catastrophic failure and...www.cbsnews.com/news/toxic-morale-crippling-air-marshals/. 151 Department of Homeland Security, Allegations of Misconduct and Illegal Discrimination and

  13. Threats to U.S. National Security Interests in Space: Orbital Debris Mitigation and Removal

    Science.gov (United States)

    2014-01-08

    United Arab Emirates, May 7, 2013, http://www.state.gov/t/ avc /rls/2013/209192.htm. 38 Frank A. Rose, Deputy Assistant Secretary, Bureau of Arms...Space Security Conference 2013: United Nations Institute for Disarmament Research, Geneva, Switzerland, April 2, 2013, http://www.state.gov/t/ avc /rls... avc /rls/188088.htm. For instance, the Code includes language in which subscribing states pledge to refrain from actions that intentionally damage or

  14. Understanding the nature and threats of drug trafficking to national and regional security in West Africa

    Directory of Open Access Journals (Sweden)

    Kwesi Aning

    2014-02-01

    Full Text Available Several West African states are threatened by increasingly powerful transnational organised criminal networks. Yet, scholarly work on the nature, characteristics and strength of these groups and how their activities threaten states remains sparse, leading to misunderstandings and inadequate appreciation of the precise nature of the threats they pose to West Africa. This paper seeks to fill these lacunae in our knowledge. It focuses on the nexus between drugs, crime and terrorism. It argues that, the financial spin-offs from criminal activities contribute to the development of opportunistic relationships between criminals and extremist groups that threatens West Africa’s fragile states. The analyses are based on evidence from several West African states, but employ the ongoing crisis in the Sahel, particularly Mali, as an empirical case, to demonstrate how ‘profitable collusion’ among different actors permits hollow states to become edifices that allows corruption, criminality and impunity to flourish.

  15. The National Youth Service Corps Programme and Growing Security Threat in Nigeria

    Directory of Open Access Journals (Sweden)

    Chukwuemeka Okafor

    2014-06-01

    Full Text Available The National Youth Service Corps (NYSC was established in 1973 after the Nigerian civil war to involve Nigerian university graduates below the age of thirty in nation building. Gradually, the scheme was opened-up for polytechnic graduates.  The article presents the objectives and deployment policy of the programme. It shows that the early phase of the programme recorded the problems of corruption, ghost corps members, accommodation, language barriers as well as hostile culture. However, the contemporary Nigerian society has been overtaken by the destructive wind of insecurity. The article reveals that the various waves of political violence in the country, including Boko Haram terrorism, hostage crises, and geographical threats have turned into a collection of overwhelming menace to the programme, thereby leading to massive agitation for itabrogation. The article recommends for multiple series of reforms in order to protect the lives of many Nigerian graduates that are building the nation through this admirable development programme.

  16. Improving buried threat detection in ground-penetrating radar with transfer learning and metadata analysis

    Science.gov (United States)

    Colwell, Kenneth A.; Torrione, Peter A.; Morton, Kenneth D.; Collins, Leslie M.

    2015-05-01

    Ground-penetrating radar (GPR) technology has proven capable of detecting buried threats. The system relies on a binary classifier that is trained to distinguish between two classes: a target class, encompassing many types of buried threats and their components; and a nontarget class, which includes false alarms from the system prescreener. Typically, the training process involves a simple partition of the data into these two classes, which allows for straightforward application of standard classifiers. However, since training data is generally collected in fully controlled environments, it includes auxiliary information about each example, such as the specific type of threat, its purpose, its components, and its depth. Examples from the same specific or general type may be expected to exhibit similarities in their GPR data, whereas examples from different types may differ greatly. This research aims to leverage this additional information to improve overall classification performance by fusing classifier concepts for multiple groups, and to investigate whether structure in this information can be further utilized for transfer learning, such that the amount of expensive training data necessary to learn a new, previously-unseen target type may be reduced. Methods for accomplishing these goals are presented with results from a dataset containing a variety of target types.

  17. Negotiable Collateral Damage: Civil Liberties Versus National Security in Times of Threat

    Science.gov (United States)

    2011-06-01

    concept: We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility , provide for the...Justice‖; 3) ―insure domestic Tranquility ‖; 4) ―provide for the common defence [sic]‖; 5) ―promote the general Welfare‖; and 6) ―secure the Blessings of...authorizations enabled federal agencies ―to intercept wire, oral , and electronic communications relating to terrorism …; seize voice-mail message pursuant to a

  18. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope...... already published works. For protected areas ability to reduce habitat loss the evidence is stronger, suggesting that protected areas have been able to reduce the rate of habitat loss compared to a counterfactual scenario. In chapter II we evaluate the different types of methods to assess management...

  19. The role of spectroscopy versus detection for border security

    International Nuclear Information System (INIS)

    Kouzes, R.T.; Ely, J.H.

    2008-01-01

    Countries around the world are deploying radiation portal monitor systems to interdict the illicit shipment of radioactive material crossing international borders. Because of their high efficiency for gamma-ray detection, most deployed systems are based on plastic scintillators and are non-spectroscopic in capability. Spectroscopic portal monitor systems are undergoing engineering development for near term deployment. The ability to identify the detected radionuclides may allow improved operational handling of radiation alarms, particularly those from the normal commerce of naturally occurring radioactive material. The goal for improved systems is to increase the sensitivity to threats while reducing the operational impact of nuisance alarms. (author)

  20. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    Directory of Open Access Journals (Sweden)

    Mohamed S. Abdalzaher

    2016-06-01

    Full Text Available We present a study of using game theory for protecting wireless sensor networks (WSNs from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  1. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    Protected areas are amongst the most important conservation responses to halt the loss of biodiversity and cover more than 12.7% of the terrestrial surface of earth. Likewise, protected areas are an important political instrument and a key component of the Convention for Biological Diversity (CBD...... of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope...... areas do have an effect and that many protected areas have seen an improvement in management over time. A second and perhaps equally important conclusion is that strong empirically based evidence on the effectiveness of protected areas is impeded by the lack of good data to measure change compared...

  2. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    Science.gov (United States)

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  3. Salinity a Serious Threat to Food Security – Where Do We Stand?

    International Nuclear Information System (INIS)

    Zaman, M.; Shahid, Shabbir A; Pharis, Richard P.

    2016-01-01

    Over the past many years, overexploitation has shrunk the soil resources to an unprecedented level and there is great concern that it may not be able to provide the needed food to mankind in future, especially the food for the growing population. This shows that we are using soil resources as they are inexhaustible, continuing withdrawing from an account but never paying in and thus jeopardizing our and our children future. Thus soil resources are at the stake of diminishing capacity for ecosystem services including food production. Increasing human population, demographic pressures, climate change, increased competition between land and water resources, water scarcity, land degradation by salinity are likely to increase vulnerability to food security. The Food and Agricultural Organization (FAO) of the United Nations jointly with International Technical Panel on Soils (ITPS) has published the first-ever comprehensive report “status of the world’s soil resources” and the overwhelming conclusion drawn is very astonishing “the majority of the world’s soil resources are in only fair, poor or very poor conditions…” and conditions are getting worse in far more cases than they are improving. It also states that further loss of productive soils will seriously damage food production and food security, amplify food price volatility, and potentially plunge millions of people into hunger and poverty. Globally 33 percent land is in the state of degradation. The report offers evidence that this loss of soil resources and functions can be avoided (FAO and ITPS 2015). The latter part of the above quote gave hope; however, the question is how this damage can be reversed.

  4. The Threat from European Missile Defence System to Russian National Security

    Directory of Open Access Journals (Sweden)

    Alexey I. Podberezkin

    2014-01-01

    Full Text Available The article analyses the political and military aspects of progress in the dialogue between Russia and the U.S./NATO on cooperation in missile defense; investigates the past experiences and current state of cooperation between Russia and the Alliance on missile defense issues; examines the technical features of American missile defence systems today; finds a solution to question whether or not the European Missile Defence Program actually threatens Russia's nuclear deterrent and strategic stability in general; identifies both potential benefits and possible losses for Russia stemming from the development of cooperation with the United States and NATO in countering ballistic missile threats, or from refusal to have such cooperation. Evidently, the initiative of creation of a missile defense in Europe surely belongs to the USA. Washington has enormous technological, financial, economic, military and institutional capabilities in the field of a missile defense, exceeding by far other NATO member-states. In February 2010, the President of the United States B. Obama adopted a project "European Phased Adaptive Approach" (EPAA as an alternative to G. Bush's global strategic missile defense plan. The first two stages of the Phased Adaptive Approach are focused on creating a system capable of intercepting small, medium and intermediate-range ballistic missiles. The possibility of intercepting long-range missiles is postponed to the third (2018 and forth phases (2020. Moscow finds especially troublesome the third and the fourth phases of Washington's project of creating a European segment of the global antiballistic missile system, considering prospective capabilities of the U.S. interceptor missiles 61 and the envisioned areas of their deployment. The U.S. counter-evidence is that phase four interceptors do not exist yet. Russia insists on getting the political and legal guarantees from the U.S. and NATO that their missile defense systems will not slash

  5. SUMIRAD: a near real-time MMW radiometer imaging system for threat detection in an urban environment

    Science.gov (United States)

    Dill, Stephan; Peichl, Markus; Rudolf, Daniel

    2012-10-01

    The armed forces are nowadays confronted with a wide variety of types of operations. During peace keeping missions in an urban environment, where small units patrol the streets with armored vehicles, the team leader is confronted with a very complex threat situation. The asymmetric imminence arises in most cases from so called IEDs (Improvised explosive devices) which are found in a multitude of versions. In order to avoid risky situations the early detection of possible threats due to advanced reconnaissance and surveillance sensors will provide an important advantage. A European consortium consisting of GMV S.A. (Spain, "Grupo Tecnològico e Industrial"), RMA (Belgium, "Royal Military Academy"), TUM ("Technische Universität München") and DLR (Germany, "Deutsches Zentrum für Luft- und Raumfahrt") developed in the SUM project (Surveillance in an urban environment using mobile sensors) a low-cost multi-sensor vehicle based surveillance system in order to enhance situational awareness for moving security and military patrols as well as for static checkpoints. The project was funded by the European Defense Agency (EDA) in the Joint Investment Program on Force Protection (JIP-FP). The SUMIRAD (SUM imaging radiometer) system, developed by DLR, is a fast radiometric imager and part of the SUM sensor suite. This paper will present the principle of the SUMIRAD system and its key components. Furthermore the image processing will be described. Imaging results from several measurement campaigns will be presented. The overall SUM system and the individual subsystems are presented in more detail in separate papers during this conference.

  6. Security Toolbox for Detecting Novel and Sophisticated Android Malware

    OpenAIRE

    Holland, Benjamin; Deering, Tom; Kothari, Suresh; Mathews, Jon; Ranade, Nikhil

    2015-01-01

    This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology being developed by the research and development ("Blue") teams. Our research group, a Blue team i...

  7. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  8. Construction of Structure of Indicators of Efficiency of Counteraction to Threats of Information Safety in Interests of the Estimation of Security of Information Processes in Computer Systems

    Directory of Open Access Journals (Sweden)

    A. P. Kurilo

    2010-06-01

    Full Text Available The theorem of system of indicators for an estimation of the security of information processes in the computer systems is formulated and proved. A number of the signs is proved, allowing to consider set of the indicators of efficiency of counteraction to the threats of information safety of the computer systems as the system.

  9. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  10. Data and software tools for gamma radiation spectral threat detection and nuclide identification algorithm development and evaluation

    Science.gov (United States)

    Portnoy, David; Fisher, Brian; Phifer, Daniel

    2015-06-01

    The detection of radiological and nuclear threats is extremely important to national security. The federal government is spending significant resources developing new detection systems and attempting to increase the performance of existing ones. The detection of illicit radionuclides that may pose a radiological or nuclear threat is a challenging problem complicated by benign radiation sources (e.g., cat litter and medical treatments), shielding, and large variations in background radiation. Although there is a growing acceptance within the community that concentrating efforts on algorithm development (independent of the specifics of fully assembled systems) has the potential for significant overall system performance gains, there are two major hindrances to advancements in gamma spectral analysis algorithms under the current paradigm: access to data and common performance metrics along with baseline performance measures. Because many of the signatures collected during performance measurement campaigns are classified, dissemination to algorithm developers is extremely limited. This leaves developers no choice but to collect their own data if they are lucky enough to have access to material and sensors. This is often combined with their own definition of metrics for measuring performance. These two conditions make it all but impossible for developers and external reviewers to make meaningful comparisons between algorithms. Without meaningful comparisons, performance advancements become very hard to achieve and (more importantly) recognize. The objective of this work is to overcome these obstacles by developing and freely distributing real and synthetically generated gamma-spectra data sets as well as software tools for performance evaluation with associated performance baselines to national labs, academic institutions, government agencies, and industry. At present, datasets for two tracks, or application domains, have been developed: one that includes temporal

  11. International Scientific Migration: Progress or a Threat to Russia’s Scientific and Technological Security

    Directory of Open Access Journals (Sweden)

    Viktor Anatolyevich Koksharov

    2018-03-01

    Full Text Available The authors focus on the issues of scientific migration. This trend is relevant from both an academic perspective — studying the individual’s economic behaviour, as well as practical one, because competition for talent has a significant impact on innovation policy initiatives around the world. Most Russian and foreign researchers are unanimous about the main complication for these studies: the lack of reliable information about scientific researchers’ migration. To search for these data, we have developed a methodology implemented in software based on the big data technology. This software allows to analyse data sets from leading scientific citation bases. The information on scientific migration resulted from the analysis of changes in affiliation. We have collected the data on the scientific migration of researchers employed by the Ural Federal University from the Scopus database. The verification of the obtained data showed their high reliability. Most researchers move to Western European countries and the United States (up to 72 %. The main areas of emigrating researchers’ scientific interests are natural and technical sciences. The optimal approach to minimizing the negative impact of scientific migration on Russia’s scientific and technological security is the practical application of the theory of brain sharing. According to this theory, a large scientific diaspora abroad is an essential resource for the development of science and innovation.

  12. Combatting Insider Threats

    Science.gov (United States)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  13. Web Browser History Detection as a Real-World Privacy Threat

    CERN Document Server

    Janc, A

    2010-01-01

    Web browser history detection using CSS $visited$ styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with browser performance improvements, the long-standing issue has now become a significant threat to the privacy of Internet users. In this paper we analyze the impact of CSS-based history detection and demonstrate the feasibility of conducting practical attacks with minimal resources. We analyze Web browser behavior and detectability of content loaded via standard protocols and with various HTTP response codes. We develop an algorithm for efficient examination of large link sets and evaluate its performance in modern browsers. Compared to existing methods our approach is up to 6 times faster, and is able to detect up to 30,000 visited links per second. We present a novel Web application capable of effectively detecting clients’ browsing histories and discuss real-world results obtained from 271,576 Internet users. Our results indicat...

  14. Experimentation and evaluation of threat detection and local area awareness using advanced computational technologies in a simulated military environment

    Science.gov (United States)

    Metcalfe, Jason S.; Brick Larkin, Gabriella; Johnson, Tony; Oie, Kelvin; Paul, Victor; Davis, James

    2010-04-01

    Tomorrows military systems will require novel methods for assessing Soldier performance and situational awareness (SA) in mobile operations involving mixed-initiative systems. Although new methods may augment Soldier assessments, they may also reduce Soldier performance as a function of demand on workload, requiring concurrent performance of mission and assessment tasks. The present paper describes a unique approach that supports assessment in environments approximating the operational context within which future systems will be deployed. A complex distributed system was required to emulate the operational environment. Separate computational and visualization systems provided an environment representative of the military operational context, including a 3D urban environment with dynamic human entities. Semi-autonomous driving was achieved with a simulated autonomous mobility system and SA was assessed through digital reports. A military crew station mounted on a 6-DOF motion simulator was used to create the physical environment. Cognitive state evaluation was enabled using physiological monitoring. Analyses indicated individual differences in temporal and accuracy components when identifying key features of potential threats; i.e., comparing Soldiers and insurgents with non-insurgent civilians. The assessment approach provided a natural, operationally-relevant means of assessing needs of future secure mobility systems and detecting key factors affecting Soldier-system performance as foci for future development.

  15. Modelling multiple threats to water security in the Peruvian Amazon using the WaterWorld Policy Support System

    Science.gov (United States)

    van Soesbergen, A. J. J.; Mulligan, M.

    2013-06-01

    This paper explores a multitude of threats to water security in the Peruvian Amazon using the WaterWorld policy support system. WaterWorld is a spatially explicit, physically-based globally-applicable model for baseline and scenario water balance that is particularly well suited to heterogeneous environments with little locally available data (e.g. ungauged basins) and which is delivered through a simple web interface, requiring little local capacity for use. The model is capable of producing a hydrological baseline representing the mean water balance for 1950-2000 and allows for examining impacts of population, climate and land use change as well as land and water management interventions on hydrology. This paper describes the application of WaterWorld to the Peruvian Amazon, an area that is increasingly under pressure from deforestation and water pollution as a result of population growth, rural to urban migration and oil and gas extraction, potentially impacting both water quantity and water quality. By applying single and combined scenarios of: climate change, deforestation around existing and planned roads, population growth and rural-urban migration, mining and oil and gas exploitation, we explore the potential combined impacts of these multiple changes on water resources in the Peruvian Amazon and discuss the likely pathways for adaptation to and mitigation against their worst effects. See Mulligan et al. (2013) for a similar analysis for the entire Amazon Basin.

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

    Directory of Open Access Journals (Sweden)

    Al Quhtani Masoud

    2017-03-01

    Full Text Available Background: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.

  18. Hybrid threats, cyber warfare and NATO's comprehensive approach for countering 21st centry threats - mapping the new frontier of global risk and security management

    OpenAIRE

    Bachmann, Sascha

    2011-01-01

    The end of the so-called ‘Cold War’ has seen a change in the nature of present threats and with it to the overall role and mission of NATO, the North Atlantic Treaty Organization. The collapse of the Soviet Union and the Warsaw Pact in 1991 also removed the original raison d’etre of the Alliance: the prospect of having to repel a Soviet led attack by the Warsaw Pact on the West through the so called ‘Fulda gap’ in Germany (referring to the German lowlands between Frankfurt am Main and the for...

  19. Lidar and Dial application for detection and identification: a proposal to improve safety and security

    Science.gov (United States)

    Gaudio, P.; Malizia, A.; Gelfusa, M.; Murari, A.; Parracino, S.; Poggi, L. A.; Lungaroni, M.; Ciparisse, J. F.; Di Giovanni, D.; Cenciarelli, O.; Carestia, M.; Peluso, E.; Gabbarini, V.; Talebzadeh, S.; Bellecci, C.

    2017-01-01

    Nowadays the intentional diffusion in air (both in open and confined environments) of chemical contaminants is a dramatic source of risk for the public health worldwide. The needs of a high-tech networks composed by software, diagnostics, decision support systems and cyber security tools are urging all the stakeholders (military, public, research & academic entities) to create innovative solutions to face this problem and improve both safety and security. The Quantum Electronics and Plasma Physics (QEP) Research Group of the University of Rome Tor Vergata is working since the 1960s on the development of laser-based technologies for the stand-off detection of contaminants in the air. Up to now, four demonstrators have been developed (two LIDAR-based and two DIAL-based) and have been used in experimental campaigns during all 2015. These systems and technologies can be used together to create an innovative solution to the problem of public safety and security: the creation of a network composed by detection systems: A low cost LIDAR based system has been tested in an urban area to detect pollutants coming from urban traffic, in this paper the authors show the results obtained in the city of Crotone (south of Italy). This system can be used as a first alarm and can be coupled with an identification system to investigate the nature of the threat. A laboratory dial based system has been used in order to create a database of absorption spectra of chemical substances that could be release in atmosphere, these spectra can be considered as the fingerprints of the substances that have to be identified. In order to create the database absorption measurements in cell, at different conditions, are in progress and the first results are presented in this paper.

  20. Lidar and Dial application for detection and identification: a proposal to improve safety and security

    International Nuclear Information System (INIS)

    Gaudio, P.; Malizia, A.; Gelfusa, M.; Parracino, S.; Poggi, L.A.; Lungaroni, M.; Ciparisse, J.F.; Giovanni, D. Di; Cenciarelli, O.; Carestia, M.; Peluso, E.; Gabbarini, V.; Talebzadeh, S.; Bellecci, C.; Murari, A.

    2017-01-01

    Nowadays the intentional diffusion in air (both in open and confined environments) of chemical contaminants is a dramatic source of risk for the public health worldwide. The needs of a high-tech networks composed by software, diagnostics, decision support systems and cyber security tools are urging all the stakeholders (military, public, research and academic entities) to create innovative solutions to face this problem and improve both safety and security. The Quantum Electronics and Plasma Physics (QEP) Research Group of the University of Rome Tor Vergata is working since the 1960s on the development of laser-based technologies for the stand-off detection of contaminants in the air. Up to now, four demonstrators have been developed (two LIDAR-based and two DIAL-based) and have been used in experimental campaigns during all 2015. These systems and technologies can be used together to create an innovative solution to the problem of public safety and security: the creation of a network composed by detection systems: A low cost LIDAR based system has been tested in an urban area to detect pollutants coming from urban traffic, in this paper the authors show the results obtained in the city of Crotone (south of Italy). This system can be used as a first alarm and can be coupled with an identification system to investigate the nature of the threat. A laboratory dial based system has been used in order to create a database of absorption spectra of chemical substances that could be release in atmosphere, these spectra can be considered as the fingerprints of the substances that have to be identified. In order to create the database absorption measurements in cell, at different conditions, are in progress and the first results are presented in this paper.

  1. Emergence and Spread of New Races of Wheat Stem Rust Fungus: Continued Threat to Food Security and Prospects of Genetic Control.

    Science.gov (United States)

    Singh, Ravi P; Hodson, David P; Jin, Yue; Lagudah, Evans S; Ayliffe, Michael A; Bhavani, Sridhar; Rouse, Matthew N; Pretorius, Zacharias A; Szabo, Les J; Huerta-Espino, Julio; Basnet, Bhoja R; Lan, Caixia; Hovmøller, Mogens S

    2015-07-01

    Race Ug99 (TTKSK) of Puccinia graminis f. sp. tritici, detected in Uganda in 1998, has been recognized as a serious threat to food security because it possesses combined virulence to a large number of resistance genes found in current widely grown wheat (Triticum aestivum) varieties and germplasm, leading to its potential for rapid spread and evolution. Since its initial detection, variants of the Ug99 lineage of stem rust have been discovered in Eastern and Southern African countries, Yemen, Iran, and Egypt. To date, eight races belonging to the Ug99 lineage are known. Increased pathogen monitoring activities have led to the identification of other races in Africa and Asia with additional virulence to commercially important resistance genes. This has led to localized but severe stem rust epidemics becoming common once again in East Africa due to the breakdown of race-specific resistance gene SrTmp, which was deployed recently in the 'Digalu' and 'Robin' varieties in Ethiopia and Kenya, respectively. Enhanced research in the last decade under the umbrella of the Borlaug Global Rust Initiative has identified various race-specific resistance genes that can be utilized, preferably in combinations, to develop resistant varieties. Research and development of improved wheat germplasm with complex adult plant resistance (APR) based on multiple slow-rusting genes has also progressed. Once only the Sr2 gene was known to confer slow rusting APR; now, four more genes-Sr55, Sr56, Sr57, and Sr58-have been characterized and additional quantitative trait loci identified. Cloning of some rust resistance genes opens new perspectives on rust control in the future through the development of multiple resistance gene cassettes. However, at present, disease-surveillance-based chemical control, large-scale deployment of new varieties with multiple race-specific genes or adequate levels of APR, and reducing the cultivation of susceptible varieties in rust hot-spot areas remains the best

  2. Offensive Threats

    Directory of Open Access Journals (Sweden)

    Alaa A. Mahdi

    2017-02-01

    Full Text Available This paper try to give us more details about the meaning of directory, and which type of security involved within the intended with each type of the specified directory. The security threats pose a significant and increasing problem for organizations. This is shown by the regular stories of fraud and data loss reported daily in the media in anywhere in the world. There is a need to provide systematic protection from insider attacks because of their privileged access. Moreover, we should provide a systematic protection from the outside attacks, as well. It is worthy to separate the duty of directory by indentifying the main two duties: the duty of the system administrator and the database administrator, and we have to recognize the difference between them. We will provide the researchers with four main threats that might be offensive to the security of directory. Moreover, we will address the nature of attack and the purpose of this attack that may encounter the directory or network assets. Finally, we will show the relation between Active Directory Security and Server Security.

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  5. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  6. A Conceptual Architecture for National Biosurveillance: Moving Beyond Situational Awareness to Enable Digital Detection of Emerging Threats.

    Science.gov (United States)

    Velsko, Stephan; Bates, Thomas

    2016-01-01

    Despite numerous calls for improvement, the US biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for "situational awareness" but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is the ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in "big data" analytics and learning inference engines-a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the US national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive system, the potential

  7. Complex Threat Detection: Learning vs. Rules, using a Hierarchy of Features

    NARCIS (Netherlands)

    Burghouts, G.J.; Slingerland, P. van; Hove, R.J.M. ten; Hollander, R.J.M. den; Schutte, K.

    2014-01-01

    Theft of cargo from a truck or attacks against the driver are threats hindering the day to day operations of trucking companies. In this work we consider a system, which is using surveillance cameras mounted on the truck to provide an early warning for such evolving threats. Low-level processing

  8. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  9. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  10. Setting Performance Objectives for Radiation Detection Systems in Homeland Security Applications - Economic Models

    International Nuclear Information System (INIS)

    Wood, Thomas W.; Bredt, Ofelia P.; Heasler, Patrick G.; Reichmuth, Barbara A.; Milazzo, Matthew D.

    2005-01-01

    This paper develops simple frameworks for cost minimization of detector systems by trading off the costs of failed detection against the social costs of false alarms. A workable system must have a high degree of certainty in detecting real threats and yet impose low social costs. The models developed here use standard measures of detector performance and derive target detection probabilities and false-alarm tolerance specifications as functions of detector performance, threat traffic densities, and estimated costs

  11. Setting Performance Objectives for Radiation Detection Systems in Homeland Security Applications - Economic Models

    Energy Technology Data Exchange (ETDEWEB)

    Wood, Thomas W.; Bredt, Ofelia P.; Heasler, Patrick G.; Reichmuth, Barbara A.; Milazzo, Matthew D.

    2005-04-28

    This paper develops simple frameworks for cost minimization of detector systems by trading off the costs of failed detection against the social costs of false alarms. A workable system must have a high degree of certainty in detecting real threats and yet impose low social costs. The models developed here use standard measures of detector performance and derive target detection probabilities and false-alarm tolerance specifications as functions of detector performance, threat traffic densities, and estimated costs.

  12. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  13. Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques

    Directory of Open Access Journals (Sweden)

    J. Bruce Johnson

    2014-01-01

    Full Text Available Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity and sampling time scales (from passive mines to rapid rate of march convoy protection for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system possessing a high level of sensitivity to threat agents and a moderate standoff real-time capability appropriate for portal screening of personnel or vehicles. In this work, we focus on several promising, and potentially synergistic, laser-based methods for sensing threat agents. For each method, we have briefly outlined the technique and report on the current level of capability.

  14. Nuclear proliferation and the potential threat of nuclear terrorism. 8 November 2004, Sydney, Australia, Asia-Pacific Nuclear Safeguards and Security Conference

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Today, the focus of the world is on nuclear proliferation and the potential threat of nuclear terrorism in Asia and the Pacific, and this address is presenting the perspectives on the challenges IAEA faces, and how the IAEA is working to strengthen nuclear security and the nuclear non-proliferation regime. But one would emphasize at the outset that, while much of our work must begin locally and regionally, we must not forget to think globally, because ultimately the existence of a nuclear threat anywhere is a threat everywhere, and as a global community, we will win or lose this battle together. This presentation, discusses cooperation, assistance, regional and international networks, and the importance of learning from each other. In effect, the focal subject is 'security culture', a mindset that, while providing the impetus for local and regional action, thinks globally and is fully capable of extending across borders. Sixty years ago, on a day in August, the dawn of the Nuclear Age in Asia left nearly a quarter of a million people dead, with two devices considered crude by modern standards. For six decades, we have managed to avoid a repeat of that event, but remain haunted by the prospect. It is my firm belief that we cannot move out from under the shadow of Hiroshima and Nagasaki until we are ready to make that move collectively, and build a system of security that transcends borders, that focuses on the equal value of every human life, and in which nuclear weapons have no place. May it not ultimately be said of our civilization that we created the inventions that led to our own demise

  15. Applications of Quantum Cascade Laser Scanners for Remote Detection of Chemical and Biological Threats and Weapons of Mass Destruction

    Science.gov (United States)

    2014-07-09

    Lolita Rodríguez, Fernando A. Souto-Bachiller, Samuel P. Hernández-Rivera. TNT removal from culture media by three commonly available wild plants...Highly Sensitive Filter Paper Substrate for SERS Field Detection of Trace Threat Chemicals”, PITTCON-2013: Forensic Analysis in the Lab and Crime Scene...endospores which are highly resistant to chemical and thermal extremes in their latent state, was one of the bacteria chosen for this study [10]. The life

  16. The Emergence of Ebola as a Global Health Security Threat: From ‘Lessons Learned’ to Coordinated Multilateral Containment Efforts

    Science.gov (United States)

    Kalra, Sarathi; Kelkar, Dhanashree; Galwankar, Sagar C.; Papadimos, Thomas J.; Stawicki, Stanislaw P.; Arquilla, Bonnie; Hoey, Brian A.; Sharpe, Richard P.; Sabol, Donna; Jahre, Jeffrey A.

    2014-01-01

    First reported in remote villages of Africa in the 1970s, the Ebolavirus was originally believed to be transmitted to people from wild animals. Ebolavirus (EBOV) causes a severe, frequently fatal hemorrhagic syndrome in humans. Each outbreak of the Ebolavirus over the last three decades has perpetuated fear and economic turmoil among the local and regional populations in Africa. Until now it has been considered a tragic malady confined largely to the isolated regions of the African continent, but it is no longer so. The frequency of outbreaks has increased since the 1970s. The 2014 Ebola outbreak in Western Africa has been the most severe in history and was declared a public health emergency by the World Health Organization. Given the widespread use of modern transportation and global travel, the EBOV is now a risk to the entire Global Village, with intercontinental transmission only an airplane flight away. Clinically, symptoms typically appear after an incubation period of approximately 11 days. A flu-like syndrome can progress to full hemorrhagic fever with multiorgan failure, and frequently, death. Diagnosis is confirmed by detection of viral antigens or Ribonucleic acid (RNA) in the blood or other body fluids. Although historically the mortality of this infection exceeded 80%, modern medicine and public health measures have been able to lower this figure and reduce the impact of EBOV on individuals and communities. The treatment involves early, aggressive supportive care with rehydration. Core interventions, including contact tracing, preventive initiatives, active surveillance, effective isolation and quarantine procedures, and timely response to patients, are essential for a successful outbreak control. These measures, combined with public health education, point-of-care diagnostics, promising new vaccine and pharmaceutical efforts, and coordinated efforts of the international community, give new hope to the Global effort to eliminate Ebola as a public

  17. The emergence of Ebola as a global health security threat: From ′lessons learned′ to coordinated multilateral containment efforts

    Directory of Open Access Journals (Sweden)

    Sarathi Kalra

    2014-01-01

    Full Text Available First reported in remote villages of Africa in the 1970s, the Ebolavirus was originally believed to be transmitted to people from wild animals. Ebolavirus (EBOV causes a severe, frequently fatal hemorrhagic syndrome in humans. Each outbreak of the Ebolavirus over the last three decades has perpetuated fear and economic turmoil among the local and regional populations in Africa. Until now it has been considered a tragic malady confined largely to the isolated regions of the African continent, but it is no longer so. The frequency of outbreaks has increased since the 1970s. The 2014 Ebola outbreak in Western Africa has been the most severe in history and was declared a public health emergency by the World Health Organization. Given the widespread use of modern transportation and global travel, the EBOV is now a risk to the entire Global Village, with intercontinental transmission only an airplane flight away. Clinically, symptoms typically appear after an incubation period of approximately 11 days. A flu-like syndrome can progress to full hemorrhagic fever with multiorgan failure, and frequently, death. Diagnosis is confirmed by detection of viral antigens or Ribonucleic acid (RNA in the blood or other body fluids. Although historically the mortality of this infection exceeded 80%, modern medicine and public health measures have been able to lower this figure and reduce the impact of EBOV on individuals and communities. The treatment involves early, aggressive supportive care with rehydration. Core interventions, including contact tracing, preventive initiatives, active surveillance, effective isolation and quarantine procedures, and timely response to patients, are essential for a successful outbreak control. These measures, combined with public health education, point-of-care diagnostics, promising new vaccine and pharmaceutical efforts, and coordinated efforts of the international community, give new hope to the Global effort to eliminate Ebola

  18. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  19. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  20. The institutional dimension of the European Union’s combat transnational crime, as one of the main threats to European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the role of the leading institutions of European Union in the fight with transnational crime. It was determined that the problem of transnational crime occupies one of the central places in the field of European security. This is due to the fact that the overall level of crime in Europe in recent years has increased several times compared with the beginning of the XXI century. It was found that today transnational crime is becoming a serious obstacle on the way of building stability and sustainable development. It is nothing less than terrorism, illegal immigration affects the state of European security, creating the new center of a danger in Europe. It is proved that each institution has its own specific of struggle, but the unifying factor is that all of them are working on the same thing – the elimination of the threat in order to increase the level of security in Europe in general and in EU in particular. Substantiated the thesis that it is important to further developing of close and constructive cooperation between the main European institutions, as well as mutual exchange of information and data regarding the recent changes and the manifestations of transnational crime. This will give an opportunity to strengthen the European security system, as well as implement common practical methods of counteraction. It was determined that the actualization of the practical component in the framework of EU institutional dimension in the future will contribute to strengthening European.

  1. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    ... between private security and the KCPD. To empower this resource as a terrorism prevention force multiplier the development of a web based virtual knowledge sharing initiative was explored in this study as a solution to provide "one stop...

  2. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    Each day approximately 6,800 members of the private security workforce are deployed across Kansas City to provide protection services at venues, many of which have been identified as being critical...

  3. Counterintelligence Screening Needed lo Reduce Security Threat That Unscreened Local National Linguists Pose to U.S. Forces (REDACTED)

    Science.gov (United States)

    2012-12-07

    Logistics Civil Augmentation Program MEP Mission Essential Personnel MFR Memorandum for Record OCI Organizational Conflict of Interest OCONUS Outside...reports would draw conclusions and recollllllel1dations on the retention, hir.ing, or threat posed by the LNs. MEP would send thjl MFRs to tlie...office responsible for issning badges on the local installations if the MFRs had no negative CI infonnation. If the MFRs had CI exploitable information

  4. Prospects for improved detection of chemical, biological, radiological, and nuclear threats

    Energy Technology Data Exchange (ETDEWEB)

    Wuest, Craig R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hart, Brad [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Slezak, Thomas R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2012-07-31

    Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.

  5. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  6. Wearable Flexible and Stretchable Glove Biosensor for On-Site Detection of Organophosphorus Chemical Threats

    Science.gov (United States)

    2017-03-03

    right) linear stretch; scale bar, 10 mm. (D) On-glove swiping protocol for sampling chemical threat residues from tomato and stainless steel surfaces. (E...xylene (8 mL), mixed thoroughly in an ultrasonic bath, and then homogenized in a shaker for 2 h. Thereafter, the carbon/PS-PI-PS composite ink was...was cast on the surface of the fruits and vegetables (apples, grapes, green peppers, and tomatoes ) and other target surfaces, such as wood, stainless

  7. Novel X-ray backscatter technique for detection of dangerous materials: application to aviation and port security

    International Nuclear Information System (INIS)

    Kolkoori, S; Wrobel, N; Osterloh, K; Zscherpel, U; Ewert, U

    2013-01-01

    Radiological inspections, in general, are the nondestructive testing (NDT) methods to detect the bulk of explosives in large objects. In contrast to personal luggage, cargo or building components constitute a complexity that may significantly hinder the detection of a threat by conventional X-ray transmission radiography. In this article, a novel X-ray backscatter technique is presented for detecting suspicious objects in a densely packed large object with only a single sided access. It consists of an X-ray backscatter camera with a special twisted slit collimator for imaging backscattering objects. The new X-ray backscatter camera is not only imaging the objects based on their densities but also by including the influences of surrounding objects. This unique feature of the X-ray backscatter camera provides new insights in identifying the internal features of the inspected object. Experimental mock-ups were designed imitating containers with threats among a complex packing as they may be encountered in reality. We investigated the dependence of the quality of the X-ray backscatter image on (a) the exposure time, (b) multiple exposures, (c) the distance between object and slit camera, and (d) the width of the slit. At the end, the significant advantages of the presented X-ray backscatter camera in the context of aviation and port security are discussed

  8. Novel X-ray backscatter technique for detection of dangerous materials: application to aviation and port security

    Science.gov (United States)

    Kolkoori, S.; Wrobel, N.; Osterloh, K.; Zscherpel, U.; Ewert, U.

    2013-09-01

    Radiological inspections, in general, are the nondestructive testing (NDT) methods to detect the bulk of explosives in large objects. In contrast to personal luggage, cargo or building components constitute a complexity that may significantly hinder the detection of a threat by conventional X-ray transmission radiography. In this article, a novel X-ray backscatter technique is presented for detecting suspicious objects in a densely packed large object with only a single sided access. It consists of an X-ray backscatter camera with a special twisted slit collimator for imaging backscattering objects. The new X-ray backscatter camera is not only imaging the objects based on their densities but also by including the influences of surrounding objects. This unique feature of the X-ray backscatter camera provides new insights in identifying the internal features of the inspected object. Experimental mock-ups were designed imitating containers with threats among a complex packing as they may be encountered in reality. We investigated the dependence of the quality of the X-ray backscatter image on (a) the exposure time, (b) multiple exposures, (c) the distance between object and slit camera, and (d) the width of the slit. At the end, the significant advantages of the presented X-ray backscatter camera in the context of aviation and port security are discussed.

  9. Security Attacks in Optical Access Networks – Simultaneous Detection and Localization

    DEFF Research Database (Denmark)

    Saltykov, Anton; Glagolev, Sergey; Jensen, Jesper Bevensee

    2011-01-01

    Fiber macrobend tapping is a simple yet unsolved security breach in passive optical networks. We prove the possibility of such attacks, and propose a novel method for their detection and localization.......Fiber macrobend tapping is a simple yet unsolved security breach in passive optical networks. We prove the possibility of such attacks, and propose a novel method for their detection and localization....

  10. Maize lethal necrosis (MLN), an emerging threat to maize-based food security in sub-Saharan Africa

    Science.gov (United States)

    In sub-Saharan Africa, maize is a staple food and key determinant of food security for smallholder farming communities. Pest and disease outbreaks are key constraints to maize productivity. In September 2011, a serious disease outbreak, later diagnosed as maize lethal necrosis (MLN), was reported on...

  11. Enhanced threat detection in experienced riot police officers: cognitive evidence from the face-in-the-crowd effect.

    Science.gov (United States)

    Damjanovic, Ljubica; Pinkham, Amy E; Clarke, Philip; Phillips, Jeremy

    2014-05-01

    We explored how varying levels of professional expertise in hostile crowd management could enhance threat detection capabilities as assessed by the face in the crowd paradigm. Trainee police officers and more experienced police officers specialized in, and having extensive experience with, riot control, were compared with participants with no experience in hostile crowd management on their search times and accuracy levels in detecting angry and happy face targets against a display of emotional and neutral distractor faces. The experienced officers relative to their trainee counterparts and nonpolice controls showed enhanced detection for threatening faces in both types of display along with a greater degree of inhibitory control over angry face distractors. These findings help to reinforce the ecological validity of the face in the crowd paradigm and provide a new theoretical link for the role of individual differences on the attentional processing of socially relevant stimuli.

  12. Changes in Arable Land Demand for Food in India and China: A Potential Threat to Food Security

    Directory of Open Access Journals (Sweden)

    Reshmita Nath

    2015-04-01

    Full Text Available India and China are two similar developing countries with huge populations, rapid economic growth and limited natural resources, therefore facing the massive pressure of ensuring food security. In this paper, we will discuss the food security situations in these two countries by studying the historical changes of food supply-demand balance with the concept of agricultural land requirements for food (LRF from 1963–2009. LRF of a country is a function of population, per capita consumption/diet, cropping yield and cropping intensity. We have attempted to discuss and compare our results in a framework which links consumption of different groups of food items to diet patterns; then, to the total land requirement for food in a scenario when population is growing rapidly and diet diversification and urbanization due to economic reform impose excessive pressure on food security of both countries. We also elaborate on the role of technology dissemination and critically analyze the achievements and drawbacks of government policies to ensure food self-sufficiency and food security of nations. Our results show that the total LRF increases approximately by 42% and 40%, whereas per capita LRF decreases significantly by about 48% and 30% from 1963–2009, for India and China, respectively. Furthermore, our studies reveal that population growth dominates most of the increase in total LRF for India; whereas diet pattern change induced by income growth drives the major increase in LRF for China. Therefore, sustainable management of agricultural land resource is an urgent need both for India and China as there will be demand for more food to meet the diet requirement for the entire population. We also demonstrate the role of India and China in future global food security programs and the challenges to implement the new land reform policies domestically.

  13. Department of Defense Information Network (DODIN): A Study of Current Cyber Threats and Best Practices for Network Security

    Science.gov (United States)

    2016-06-10

    had made the decision to move a memorial of the Soviet liberation of Estonia from the Nazis to a “less prominent and visible location in Tallinn... erased . The attack occurred when hackers gained access after a scam e-mail was opened, and a bad link was clicked which allowed access; “In a matter of...with security implications 1995 LINK Symbolic link following 45 46 MEMLEAK Memory leak (doesn’t free memory when it should) 258 METACHAR

  14. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-09-05

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  15. Potential Threats Posed by Tetrodotoxins in UK Waters: Examination of Detection Methodology Used in Their Control

    Directory of Open Access Journals (Sweden)

    Andrew D. Turner

    2015-12-01

    Full Text Available Tetrodotoxin is a neurotoxin responsible for many human fatalities, most commonly following the consumption of pufferfish. Whilst the source of the toxin has not been conclusively proven, it is thought to be associated with various species of marine bacteria. Whilst the toxins are well studied in fish and gastropods, in recent years, there have been a number of reports of tetrodotoxin occurring in bivalve shellfish, including those harvested from the UK and other parts of Europe. This paper reviews evidence concerning the prevalence of tetrodotoxins in the UK together with methodologies currently available for testing. Biological, biomolecular and chemical methods are reviewed, including recommendations for further work. With the recent development of quantitative chromatographic methods for these and other hydrophilic toxins, as well as the commercial availability of rapid testing kits, there are a number of options available to ensure consumers are protected against this threat.

  16. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  17. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients ( p  = 0.0001) and 50 of 97 reported inconvenience when traveling ( n  = 50 of 97 patients; p  = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  18. Insider threat data sharing

    OpenAIRE

    Sellen, Jeremey J.

    2016-01-01

    Approved for public release; distribution is unlimited Insider threat is a significant problem for both governmental and private organizations. Individuals can do immense harm with their trusted accesses. To combat this threat, organizations have created departments with trained analysts whose sole purpose is to deter, detect, and mitigate the insider threat. These analysts monitor employees and analyze activities to detect dangerous practices, whether witting or unwitting, and report thes...

  19. Door Security using Face Detection and Raspberry Pi

    Science.gov (United States)

    Bhutra, Venkatesh; Kumar, Harshav; Jangid, Santosh; Solanki, L.

    2018-03-01

    With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of Engineering and Technology, Pilani, Rajasthan, India.

  20. What we are watching—five top global infectious disease threats, 2012: a perspective from CDC’s Global Disease Detection Operations Center

    Science.gov (United States)

    Christian, Kira A.; Ijaz, Kashef; Dowell, Scott F.; Chow, Catherine C.; Chitale, Rohit A.; Bresee, Joseph S.; Mintz, Eric; Pallansch, Mark A.; Wassilak, Steven; McCray, Eugene; Arthur, Ray R.

    2013-01-01

    Disease outbreaks of international public health importance continue to occur regularly; detecting and tracking significant new public health threats in countries that cannot or might not report such events to the global health community is a challenge. The Centers for Disease Control and Prevention’s (CDC) Global Disease Detection (GDD) Operations Center, established in early 2007, monitors infectious and non-infectious public health events to identify new or unexplained global public health threats and better position CDC to respond, if public health assistance is requested or required. At any one time, the GDD Operations Center actively monitors approximately 30–40 such public health threats; here we provide our perspective on five of the top global infectious disease threats that we were watching in 2012: (1) avian influenza A (H5N1), (2) cholera, (3) wild poliovirus, (4) enterovirus-71, and (5) extensively drug-resistant tuberculosis. PMID:23827387

  1. Threat Analysis : Work Package 1.2 - Expert Group on the security and resilience of Communication networks and Information systems for Smart Grids

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    In order to be aware of the various threats that are relevant to Smart Grids, the team designed an all hazards threat taxonomy taking into account threats that may harm Smart Grid stakeholders. The analysis and weighting of these threats makes it easier to determine how measures can be taken in

  2. Hatrick: A System for Real-time Threat Detection in Cyber Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wickramaarachchi, Charith [Univ. of Southern California, Los Angeles, CA (United States); Kumbhare, Alok [Univ. of Southern California, Los Angeles, CA (United States); Chelmis, Charalampos [Univ. of Southern California, Los Angeles, CA (United States); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2011-12-07

    Complexity of cyber attacks has grown rapidly over the last few decades. Novel advance techniques are needed in order to counter these attacks. Detecting some of these complex cyber attacks can be reduced to detecting patterns and dynamics in computer network traffic. These patterns can be molded as directed graphs based on their propagation through the cyber physical systems. This work in progress report presents an implemented system, Hatrick, which enable scalable, low latency dynamic graph analytics on clouds and commodity clusters. Hatrick will enable continuous monitoring of cyber physical systems to detect attack patterns in real-time.

  3. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  4. Nuclear Security Detection Architectures – Detection Systems and Measures for Nuclear and other Radioactive Material out of Regulatory Control

    International Nuclear Information System (INIS)

    Wittrock, M.; Espy, J.; Ung, E.

    2017-01-01

    The International Atomic Energy Agency (IAEA) and its partners have undertaken substantial efforts to promote national-level nuclear security detection architectures through the development of guidance documents, hosting international consultancies and through myriad training courses. This guidance and training has been recognized by other initiatives like the Nuclear Security Summit (NSS). Beyond the publication of the IAEA Nuclear Security Series #21 “Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control” in 2013, the importance of developing nuclear detection architectures was endorsed for the first time at the April 2016 NSS, demonstrating the continued high-level commitment of the international community to focus on this issue. Building on the momentum of the 2016 NSS, the IAEA hosted an International Coordination Meeting (ICM) in Siem Reap, Cambodia in April 2016 to discuss “Good Practices and Challenges in Developing and Sustaining a Nuclear Detection Architecture”. The ICM exemplifies the efforts of 23 IAEA Member States working in cooperation to measure the impact of IAEA guidance and its complimentary suite of courses, as well as appreciate a better understanding of the current state of nuclear security detection architecture development, implementation challenges and to consider potential mitigating strategies. The ICM held in Cambodia was the first of its kind and provided unique insights into member states’ progress made, lessons learned, and challenges related to the development and sustainment of national-level nuclear security detection architectures. Building on the momentum of this notable event, as well as utilizing the IAEA’s role as one of the successor institutions to the NSS process, the IAEA should promote Member States’ organization around a common framework to further nuclear security detection efforts. This framework delineates the requisite milestones associated with

  5. Threat to food security under current levels of ground level ozone: A case study for Indian cultivars of rice

    Science.gov (United States)

    Rai, Richa; Agrawal, Madhoolika; Agrawal, S. B.

    2010-11-01

    A higher ozone concentration in rural agricultural region poses threat to food production in developing countries. The present study was conducted to evaluate the growth, biomass accumulation and allocation pattern, quantitative and qualitative characteristics of grains for two tropical rice cultivars ( Oryza sativa L. cv NDR 97 and Saurabh 950) at ambient O 3 concentrations at a rural site in the Indo Gangetic plains of India. Percent inhibition in number of leaves was higher for NDR 97, but in leaf area for Saurabh 950 grown in non filtered chambers (NFCs) compared to filtered chambers (FCs). Higher inhibition in root biomass was recorded in Saurabh 950 and in leaf and standing dead biomass for NDR 97. During vegetative phase, relative growth rate showed more percent inhibition in Saurabh 950, but at reproductive phase in NDR 97. Net assimilation rate showed higher values for Saurabh 950 than NDR 97 in NFCs but percent inhibition in leaf area ratio was higher for former than latter cultivar in NFCs. The ozone resistance was higher in NDR 97 during vegetative phase, but in Saurabh 950 at reproductive phase. Number of grains was higher in NDR 97 than Saurabh 950, but test weight and weight of grains m -2 showed reverse trends. Concentrations of starch, protein, P, N, Ca, Mg and K decreased, while reducing and total soluble sugar increased in grains of both the cultivars in NFCs compared to FCs. The study concluded that under ambient condition of O 3 exposure, the two cultivars responded differently. Saurabh 950 favoured biomass translocation priority towards ear in reproductive phase and hence showed higher resistivity due to maintenance of higher test weight. NDR 97, however, showed better growth during vegetative period, but could not allocate efficiently to developing ears, hence higher number of unfilled grains in NFCs led lower test weight.

  6. Rapid Detection Strategies for the Global Threat of Zika Virus: Current State, New Hypotheses and Limitations

    Directory of Open Access Journals (Sweden)

    Shruti Shukla

    2016-10-01

    Full Text Available The current scenario regarding the widespread Zika virus (ZIKV has resulted in numerous diagnostic studies, specifically in South America and in locations where there is frequent entry of travelers returning from ZIKV-affected areas, including pregnant women with or without clinical symptoms of ZIKV infection. The World Health Organization, WHO, announced that millions of cases of ZIKV are likely to occur in the United States of America in the near future. This situation has created an alarming public health emergency of international concern requiring the detection of this life-threatening viral candidate due to increased cases of newborn microcephaly associated with ZIKV infection. Hence, this review reports possible methods and strategies for the fast and reliable detection of ZIKV with particular emphasis on current updates, knowledge and new hypotheses that might be helpful for medical professionals in poor and developing countries that urgently need to address this problem. In particular, we emphasize liposome-based biosensors. Although these biosensors are currently among the less popular tools for human disease detection, they have become useful tools for the screening and detection of pathogenic bacteria, fungi and viruses because of their versatile advantageous features compared to other sensing devices. This review summarizes the currently available methods employed for the rapid detection of ZIKV and suggests an innovative approach involving the application of a liposome-based hypothesis for the development of new strategies for ZIKV detection and their use as effective biomedicinal tools.

  7. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    The main purpose with firewall is to protect against unauthorized external attacks but it will normally leave the network unprotected from internal attacks or intrusions. Fire walls and access control have been the most important components used in order to secure network and its resources. They work to prevent attacks from ...

  8. Behavioral Compliance and Devaluation of the Forbidden Object as a Function of Probability of Detection and Severity of Threat

    Science.gov (United States)

    Biaggio, Angela; Rodrigues, Aroldo

    1971-01-01

    Thirty-nine second grade children were subjects of an experiment devised to test the prediction derived from cognitive dissonance theory that mild threats are more effective than severe threats in obtaining internalization of prohibitions. (Author/NH)

  9. Maize Lethal Necrosis (MLN), an Emerging Threat to Maize-Based Food Security in Sub-Saharan Africa.

    Science.gov (United States)

    Mahuku, George; Lockhart, Benham E; Wanjala, Bramwel; Jones, Mark W; Kimunye, Janet Njeri; Stewart, Lucy R; Cassone, Bryan J; Sevgan, Subramanian; Nyasani, Johnson O; Kusia, Elizabeth; Kumar, P Lava; Niblett, C L; Kiggundu, Andrew; Asea, Godfrey; Pappu, Hanu R; Wangai, Anne; Prasanna, Boddupalli M; Redinbaugh, Margaret G

    2015-07-01

    In sub-Saharan Africa, maize is a staple food and key determinant of food security for smallholder farming communities. Pest and disease outbreaks are key constraints to maize productivity. In September 2011, a serious disease outbreak, later diagnosed as maize lethal necrosis (MLN), was reported on maize in Kenya. The disease has since been confirmed in Rwanda and the Democratic Republic of Congo, and similar symptoms have been reported in Tanzania, Uganda, South Sudan, and Ethiopia. In 2012, yield losses of up to 90% resulted in an estimated grain loss of 126,000 metric tons valued at $52 million in Kenya alone. In eastern Africa, MLN was found to result from coinfection of maize with Maize chlorotic mottle virus (MCMV) and Sugarcane mosaic virus (SCMV), although MCMV alone appears to cause significant crop losses. We summarize here the results of collaborative research undertaken to understand the biology and epidemiology of MLN in East Africa and to develop disease management strategies, including identification of MLN-tolerant maize germplasm. We discuss recent progress, identify major issues requiring further research, and discuss the possible next steps for effective management of MLN.

  10. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  11. Standoff detection of chemical and biological threats using laser-induced breakdown spectroscopy.

    Science.gov (United States)

    Gottfried, Jennifer L; De Lucia, Frank C; Munson, Chase A; Miziolek, Andrzej W

    2008-04-01

    Laser-induced breakdown spectroscopy (LIBS) is a promising technique for real-time chemical and biological warfare agent detection in the field. We have demonstrated the detection and discrimination of the biological warfare agent surrogates Bacillus subtilis (BG) (2% false negatives, 0% false positives) and ovalbumin (0% false negatives, 1% false positives) at 20 meters using standoff laser-induced breakdown spectroscopy (ST-LIBS) and linear correlation. Unknown interferent samples (not included in the model), samples on different substrates, and mixtures of BG and Arizona road dust have been classified with reasonable success using partial least squares discriminant analysis (PLS-DA). A few of the samples tested such as the soot (not included in the model) and the 25% BG:75% dust mixture resulted in a significant number of false positives or false negatives, respectively. Our preliminary results indicate that while LIBS is able to discriminate biomaterials with similar elemental compositions at standoff distances based on differences in key intensity ratios, further work is needed to reduce the number of false positives/negatives by refining the PLS-DA model to include a sufficient range of material classes and carefully selecting a detection threshold. In addition, we have demonstrated that LIBS can distinguish five different organophosphate nerve agent simulants at 20 meters, despite their similar stoichiometric formulas. Finally, a combined PLS-DA model for chemical, biological, and explosives detection using a single ST-LIBS sensor has been developed in order to demonstrate the potential of standoff LIBS for universal hazardous materials detection.

  12. Securing social media in the enterprise

    CERN Document Server

    Dalziel, Henry

    2015-01-01

    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media wi

  13. Radar-Based Intruder Detection for a Robotic Security System

    National Research Council Canada - National Science Library

    Cory, Phil

    1998-01-01

    .... The system includes multiple supervised-autonomous platforms equipped with intrusion detection, barrier assessment, and inventory assessment subsystems commanded from an integrated control station...

  14. Threats and vulnerabilities

    Science.gov (United States)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    In this chapter, we present a review of threats and vulnerabilities that could afflict society and individuals in the AmI world in the context of the key policy issues of privacy, identity, trust, security and digital divide. We define a threat as the potential for one or more unwanted consequences caused by a circumstance, capability, action or event that could be harmful to a system or person. Threats can be caused naturally, accidentally or intentionally. In essence, a threat is a ubiquitous phenomenon. A vulnerability is a flaw or weakness in a system's design, its implementation, operation or management that could be exploited to violate the system and, consequently, cause a threat. Vulnerabilities may have different dimensions: technical, functional or behavioural.1

  15. Development of a bead-based Luminex assay using lipopolysaccharide specific monoclonal antibodies to detect biological threats from Brucella species.

    Science.gov (United States)

    Silbereisen, Angelika; Tamborrini, Marco; Wittwer, Matthias; Schürch, Nadia; Pluschke, Gerd

    2015-10-05

    Brucella, a Gram-negative bacterium, is classified as a potential bioterrorism agent mainly due to the low dose needed to cause infection and the ability to transmit the bacteria via aerosols. Goats/sheep, cattle, pigs, dogs, sheep and rodents are infected by B. melitensis, B. abortus, B. suis, B. canis, B. ovis and B. neotomae, respectively, the six classical Brucella species. Most human cases are caused by B. melitensis and B. abortus. Our aim was to specifically detect Brucellae with 'smooth' lipopolysaccharide (LPS) using a highly sensitive monoclonal antibody (mAb) based immunological assay. To complement molecular detection systems for potential bioterror agents, as required by international biodefense regulations, sets of mAbs were generated by B cell hybridoma technology and used to develop immunological assays. The combination of mAbs most suitable for an antigen capture assay format was identified and an immunoassay using the Luminex xMAP technology was developed. MAbs specific for the LPS O-antigen of Brucella spp. were generated by immunising mice with inactivated B. melitensis or B. abortus cells. Most mAbs recognised both B. melitensis and B. abortus and antigen binding was not impeded by inactivation of the bacterial cells by γ irradiation, formalin or heat treatment, a step required to analyse the samples immunologically under biosafety level two conditions. The Luminex assay recognised all tested Brucella species with 'smooth' LPS with detection limits of 2×10(2) to 8×10(4) cells per mL, depending on the species tested. Milk samples spiked with Brucella spp. cells were identified successfully using the Luminex assay. In addition, the bead-based immunoassay was integrated into a multiplex format, allowing for simultaneous, rapid and specific detection of Brucella spp., Bacillus anthracis, Francisella tularensis and Yersinia pestis within a single sample. Overall, the robust Luminex assay should allow detection of Brucella spp. in both natural

  16. India Sinking: Threats to the Right to Food, Food Security & Development, in an Era of Economic Growth

    Directory of Open Access Journals (Sweden)

    Sukanya Pillay

    2009-02-01

    Full Text Available Despite reports of being Asia’s next economic superpower, India is experiencing a crisis in food that threatens development, peace, and security. Affecting 700 million Indians, the food crisis is caused by the State’s failures to uphold its legal obligations to protect the international human right to food. Conflicting post-Independence agricultural policies, the Green Revolution, and neoliberal reforms imposed at the behest of the World Bank, the International Monetary Fund, and the World Trade Organization, have dismantled the country’s food production capacity. The result is increased hunger, poverty, malnutrition, starvation, deaths, vast social inequities, inflated food prices, the decimation of small-scale farming, epidemic farmer suicides, and the loss of biodiversity, each of which violate the international human right to food, and threaten development, peace, and security. Part II of this article sets out India’s legal obligations to protect the right to food, the prerequisite of this right for development, and the duty of the State to ensure non-State actors respect this right. Part III of this article explains how and why policy reforms in India have removed key resources from small-scale farmers and rural Indians, leaving India with the highest malnutrition, poverty, and hunger rates in the world. Part IV concludes that the neoliberal reforms have resulted in the failure of the right to food and the right to development in the country, and have perpetuated poverty, powerlessness, and exclusion among India’s poor; India must pursue a development strategy that is human-rights centered, and must implement economic reforms that are grounded in justice, equity, and respect for the inherent dignity of the human being. Some initial areas for reform are identified as a means for the Indian government to protect the right to food, and to work towards the realization of the full benefits of development for all Indians. Malgré les

  17. Animal Botulism Outcomes in the AniBioThreat Project

    DEFF Research Database (Denmark)

    Woudstra, Cédric; Tevell Åberg, Annica; Skarin, Hanna

    2013-01-01

    and botulinum neurotoxins are considered potential weapons for bioterrorism and have been included in the Australia Group List of Biological Agents. In 2010 the European Commission (DG Justice, Freedom and Security) funded a 3-year project named AniBioThreat to improve the EU's capacity to counter animal...... bioterrorism threats. A detection portfolio with screening methods for botulism agents and incidents was needed to improve tracking and tracing of accidental and deliberate contamination of the feed and food chain with botulinum neurotoxins and other Clostridia. The complexity of this threat required acquiring...

  18. Securing 'supportive environments' for health in the face of ecosystem collapse: meeting the triple threat with a sociology of creative transformation.

    Science.gov (United States)

    Poland, Blake; Dooris, Mark; Haluza-Delay, Randolph

    2011-12-01

    In this paper, we reflect on and explore what remains to be done to make the concept of supportive environments--one of the Ottawa Charter's five core action areas--a reality in the context of growing uncertainty about the future and accelerated pace of change. We pay particular attention to the physical environment, while underscoring the inextricable links between physical and social environments, and particularly the need to link social and environmental justice. The paper begins with a brief orientation to three emerging threats to health equity, namely ecological degradation, climate change, and peak oil, and their connection to economic instability, food security, energy security and other key determinants of health. We then present three contrasting perspectives on the nature of social change and how change is catalyzed, arguing for an examination of the conditions under which cultural change on the scale required to realize the vision of 'supportive environments for all' might be catalyzed, and the contribution that health promotion as a field could play in this process. Drawing on sociological theory, and specifically practice theory and the work of Pierre Bourdieu, we advocate rethinking education for social change by attending more adequately to the social conditions of transformative learning and cultural change. We conclude with an explication of three key implications for health promotion practice: a more explicit alignment with those seeking to curtail environmental destruction and promote environmental justice, strengthening engagement with local or settings-focused 'communities of practice' (such as the Transition Town movement), and finding new ways to creatively 'engage emergence', a significant departure from the current dominant focus on 'risk management'.

  19. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, J.; Hargrove, W. W.; Gasser, J.; Smoot, J.; Kuper, P.

    2011-12-01

    This presentation discusses an effort to compute and post weekly MODIS forest change products for the conterminous US (CONUS), as part of a web-based national forest threat early warning system (EWS) known as the U.S. Forest Change Assessment Viewer (FCAV). The US Forest Service, NASA, USGS, and ORNL are working collaboratively to contribute weekly change products to this EWS. Large acreages of the nation's forests are being disturbed by a growing multitude of biotic and abiotic threats that can act either singularly or in combination. When common at regional scales, such disturbances can pose hazards and threats to floral and faunal bio-diversity, ecosystem sustainability, ecosystem services, and human settlements across the conterminous US. Regionally evident forest disturbances range from ephemeral periodic canopy defoliation to stand replacement mortality events due to insects, disease, fire, hurricanes, tornadoes, ice, hail, and drought. Mandated by the Healthy Forest Restoration Act of 2003, this forest threat EWS has been actively developed since 2006 and on-line since 2010. The FCAV system employs 250-meter MODIS NDVI-based forest change products as a key element of the system, providing regional and CONUS scale products in near real time every 8 days. Each of our forest change products in FCAV is based on current versus historical 24 day composites of NDVI data gridded at 231.66 meter resolution. Current NDVI is derived from USGS eMODIS expedited products. MOD13 NDVI is used for constructing historical baselines. CONUS change products are computed for all forests as % change in the current versus historical NDVI for a given 24 day period. Change products are computed according to previous year, previous 3 year and previous 8 year historical baselines. The use of multiple baselines enables apparent forest disturbance anomalies to be more fully assessed. CONUS forest change products are posted each week on the FCAV, a web mapping service constructed and

  20. Contribution of Near Real Time MODIS-Based Forest Disturbance Detection Products to a National Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, Joseph P.; Hargrove, William; Glasser, Jerry; Kuper, Philip D.

    2011-01-01

    This presentation discusses an effort to compute and post weekly MODIS forest change products for the conterminous US (CONUS), as part of national forest threat early warning system (EWS) known as the U.S. Forest Change Assessment Viewer (FCAV). The US Forest Service, NASA, USGS, and ORNL are working collaboratively to contribute weekly change products to this EWS. Large acreages of the nation's forests are being disturbed by a growing multitude of biotic and abiotic threats that can act either singularly or in combination. When common at regional scales, such disturbances can pose hazards and threats to floral and faunal bio-diversity, ecosystem sustainability, ecosystem services, and human settlements across the conterminous US. Regionally evident forest disturbances range from ephemeral periodic canopy defoliation to stand replacement mortality events due to insects, disease, fire, hurricanes, tornadoes, ice, hail, and drought. Mandated by the Healthy Forest Restoration Act of 2003, this forest threat EWS has been actively developed since 2006 and on-line since 2010. This FCAV system employs 250-meter MODIS NDVI-based forest change products as a key element of the system, providing regional and CONUS scale products in near real time every 8 days. Each forest change product in FCAV is based on current versus historical 24 day composite NDVI data gridded at 231.66 meter resolution. Current NDVI is derived from USGS eMODIS expedited products. MOD13 NDVI is used for constructing historical baselines. CONUS change products are computed for all forests as % change in the current versus historical NDVI. Change products are computed according to previous year, previous 3 years and previous 8 year historical baselines. The use of multiple baselines enables disturbance anomaly phenology to be more fully assessed. CONUS forest change products are posted each week on the FCAV, a web mapping service maintained by the National Environmental Modeling and Analysis Center. The

  1. Climate change: A threat towards achieving ‘Sustainable Development Goal number two’ (end hunger, achieve food security and improved nutrition and promote sustainable agriculture in South Africa

    Directory of Open Access Journals (Sweden)

    Shingirai S. Mugambiwa

    2017-02-01

    Full Text Available This article aims to assess the impacts of climate change towards the achievement of Sustainable Development Goal number two (SDG 2 as well as examining the poverty alleviation strategies by subsistence farmers in South Africa. Widespread hunger and poverty continue to be among the most life-threatening problems confronting mankind. Available statistics show that global poverty remains a serious challenge around the world. Across the globe, one in five people lives on less than $1 a day and one in seven suffers from chronic hunger. Similarly, the developing world is adversely affected by poverty and hunger. In the sub-Saharan Africa, research has revealed a higher prevalence of hunger, malnutrition, poverty and food insecurity. SDG 2 focuses more on eliminating hunger and promoting sustainable agriculture. The study employed an exploratory design and a qualitative method. Snowball sampling was used in selecting relevant sources which led the researchers to other research work on the same field through keywords and reference lists. The researchers employed discourse analysis to analyse data. The study discovered that there are numerous potential effects climate change could have on agriculture. It affects crop growth and quality and livestock health. Farming practices could also be affected as well as animals that could be raised in particular climatic areas. The impact of climate change as well as the susceptibility of poor communities is very immense. The article concludes that climate change reduces access to drinking water, negatively affects the health of people and poses a serious threat to food security.

  2. Climate change: A threat towards achieving ‘Sustainable Development Goal number two’ (end hunger, achieve food security and improved nutrition and promote sustainable agriculture in South Africa

    Directory of Open Access Journals (Sweden)

    Shingirai S. Mugambiwa

    2017-01-01

    Full Text Available This article aims to assess the impacts of climate change towards the achievement of Sustainable Development Goal number two (SDG 2 as well as examining the poverty alleviation strategies by subsistence farmers in South Africa. Widespread hunger and poverty continue to be among the most life-threatening problems confronting mankind. Available statistics show that global poverty remains a serious challenge around the world. Across the globe, one in five people lives on less than $1 a day and one in seven suffers from chronic hunger. Similarly, the developing world is adversely affected by poverty and hunger. In the sub-Saharan Africa, research has revealed a higher prevalence of hunger, malnutrition, poverty and food insecurity. SDG 2 focuses more on eliminating hunger and promoting sustainable agriculture. The study employed an exploratory design and a qualitative method. Snowball sampling was used in selecting relevant sources which led the researchers to other research work on the same field through keywords and reference lists. The researchers employed discourse analysis to analyse data. The study discovered that there are numerous potential effects climate change could have on agriculture. It affects crop growth and quality and livestock health. Farming practices could also be affected as well as animals that could be raised in particular climatic areas. The impact of climate change as well as the susceptibility of poor communities is very immense. The article concludes that climate change reduces access to drinking water, negatively affects the health of people and poses a serious threat to food security.

  3. Radiological Health Protection Issues Associated with Use of Active Detection Technology Systems for Detection of Radioactive Threat Materials

    Science.gov (United States)

    2013-07-01

    materials, such as lead, tin, gadolinium and boron to improve the photon detection efficiency of the base material. These organic scintillators also...shielding material and the stopping of a muon within SNM produces highly-energetic x rays that are isotope specific (Close et al., 1978; NCRP, 2003c) and...should also be processed through a multi- channel analyzer (MCA) to provide for an accurate identification of isotopes in SNM (Stocki, 2010

  4. No Dark Corners: Defending Against Insider Threats to Critical Infrastructure

    Science.gov (United States)

    2009-09-01

    Delphi survey on the insider threat. The next round will focus on telltale signs or indicators (aka traplines). The final round will focus on...control systems, and to places or assets equipped with surveillance cameras, alarms, or access control devices. Corporate sentinels are the...Chief of detectives. Former military policeman. Expert 5 Critical infrastructure security director. Former undercover agent of federal law

  5. Summary Report for the Radiation Detection for Nuclear Security Summer School 2012

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Baciak, James E.; Stave, Jean A.

    2012-08-22

    The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.

  6. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.

    Science.gov (United States)

    Zhang, Guomei; Sun, Hao

    2016-12-16

    We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.

  7. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    Science.gov (United States)

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  8. Optical detection of random features for high security applications

    Science.gov (United States)

    Haist, T.; Tiziani, H. J.

    1998-02-01

    Optical detection of random features in combination with digital signatures based on public key codes in order to recognize counterfeit objects will be discussed. Without applying expensive production techniques objects are protected against counterfeiting. Verification is done off-line by optical means without a central authority. The method is applied for protecting banknotes. Experimental results for this application are presented. The method is also applicable for identity verification of a credit- or chip-card holder.

  9. Internal Security Threats to Pakistan

    Science.gov (United States)

    2004-12-01

    DENSITY (PERSON/SQ. MILE) URBANIZATION (PERCENTAGE) LITERACY (PERCENTAGE) 1951 1961 1951 1961 1951 1961 1951 1961 East Pakistan 41.9 50.8...issues, affected the Mohajirs of urban Sindh and thus, triggered their demand for identification as a fifth ethnic group in Pakistan . To safeguard...noticeable progress in agricultural sector. Pakistan was considered to be a model capitalist economy in the 1960s.176 Periods of rapid growth

  10. Emerging Threats to National Security

    National Research Council Canada - National Science Library

    Treverton, Gregory F

    2005-01-01

    Statement of Gregory F. Treverton, Director, Intelligence Policy Center, RAND Corporation, Associate Dean, Pardee RAND Graduate School, before the Permanent Select Committee on Intelligence, given before the United States...

  11. Extracting Cyber Threat Intelligence From Hacker Forums

    OpenAIRE

    Deliu, Isuf

    2017-01-01

    The use of more sophisticated tools and methods from cyber criminals has urged the cyber security community to look for enhancements to traditional security controls. Cyber Threat Intelligence represents one such proactive approach and includes the collection and analysis of information for potential threats from multiple diverse sources of data. The objective is to understand the methodology that different threat actors are using to launch their campaigns, and proactively adapt security cont...

  12. The correlation between concepts of «uncertainty», «risk», «challenge», «threat», «danger» in the context of the sociology of operating security

    Directory of Open Access Journals (Sweden)

    L. V. Kalashnikova

    2017-07-01

    Analysis of the concepts led to the conclusion that all these concepts are related to one another by the degree of damage to the individual, society and state. The use of these categories will allow ranking the range of possible threats to the security of life and will contribute to the development of adequate, appropriate technologies to combat it, to minimize their negative effects and, consequently, will improve the current system of ensuring safety of personality, society and state.

  13. Security sonar for water intakes

    International Nuclear Information System (INIS)

    Rothenbuhler, D.E.

    1987-01-01

    The security of the water approaches to nuclear facilities has been largely neglected because of the lack of solutions to the intrusion problem. This paper reviews underwater scanning sonar in general, highlights a number of problems encountered in a threat detection system using sonar and suggests some procedures that can help make such a system workable. Information is drawn from recent experience with several security projects in the governmental and private sectors, one of which was a nuclear facility

  14. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  15. Assessing Psycho-Social Resilience in Diplomatic, Civilian & Military Personnel Serving in a High-Threat Security Environment during Counter-Insurgency and Counter-Terrorism Operations in Iraq

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2012-08-01

    Full Text Available Currently thousands of military, diplomatic and civilian personnel are deployed under NATO, UN, and other multi-national, as well as national auspices in high-threat security environments, including active conflict zones such as Iraq and Afghanistan.  Soldiers are generally well trained and prepared psychologically to face armed conflict. Civilian contractors and diplomats, on the other hand, often are not.  Moreover in today’s high-threat security environments terrorists, insurgents and even child soldiers may be the opposing force, creating a more uncertain and anxiety provoking environment and more difficult to identify security threat. These facts have serious implications for the psycho-social resilience of diplomatic, civilian and military personnel deployed in such environments.  This article investigates psycho-social resilience in a small exploratory sample of US embassy staff, contractors and US forces serving in Iraq during 2007, a time when Improvised Explosive Devices (IEDs, roadside bombings, mortar attacks, kidnappings, murders and sniper fire were an everyday occurrence in Iraq.

  16. Appropriateness of using integrated security systems for better protection against terroristic threats to objects of high importance, vulnerable to acts of sabotage

    OpenAIRE

    Rogozhin, Alexander; Drimba, Stanislav; Gerba, Julius

    2008-01-01

    Questions of integrated security systems design of a large industrial object of vital importance, and choice of the optimal construction option, are described in the article. A structure of integrated security system, providing complete security of objects, is suggested by means of the following subsystems integration: access control, video surveillance, security and fire protection alarm system and life-support control.

  17. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  18. Improving Security Incidents Detection for Networked Multilevel Intelligent Control Systems in Railway Transport

    Directory of Open Access Journals (Sweden)

    A. V. Chernov

    2016-06-01

    Full Text Available Security monitoring and incident management systems have become the main research focus in the area of intelligent railway control systems. In this work, we discuss a system architecture of multilevel intelligent control system in Russian Railway transport and security incident classification and the handling of theprocess. We make a detailed explanation of problems and tasks of security information and event management system as an important part of a multilevel intelligent control system. We use a rough sets theory to detect an abnormal activity in the considered system. Our main result consists in the development of simple and fast detection techniques that are based on rough sets theory and allow investigating a new type of incidents.

  19. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  20. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  1. Summary Report for the Radiation Detection for Nuclear Security Summer School 2014

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baciak, James E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodring, Mitchell L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Jenno, Diana M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-09-01

    Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.

  2. A design of toxic gas detecting security robot car based on wireless path-patrol

    Directory of Open Access Journals (Sweden)

    Cheng Ho-Chih

    2017-01-01

    Full Text Available Because a toxic gas detecting/monitoring system in a chemical plant is not movable, a gas detecting/monitoring system will be passive and the detecting range will also be constrained. This invention is an active multi-functional wireless patrol car that can substitute for humans that inspect a plant's security. In addition, to widen the monitoring vision within the environment, two motors used to rotate a wireless IPCAM with two axes are presented. Also, to control the robot car's movement, two axis motors used to drive the wheel of the robot car are also installed. Additionally, a toxic gas detector is linked to the microcontroller of the patrol car. The detected concentration of the gas will be fed back to the server pc. To enhance the robot car's patrolling duration, a movable electrical power unit in conjunction with a wireless module is also used. Consequently, this paper introduces a wireless path-patrol and toxic gas detecting security robot car that can assure a plant's security and protect workers when toxic gases are emitted.

  3. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  4. Russian Security Strategy under Putin: U.S. and Russian Perspectives. U.S. Interests in the New Eurasia. Russia'a Threat Perception and Strategic Posture

    National Research Council Canada - National Science Library

    Nation, R. C; Trenin, Dimitri

    2007-01-01

    .... Recent Russian policies reflect that perception and Moscow's adaptation to it. We may think this threat perception to be misguided, even bizarrely misconceived, given our own beliefs about what American policy is and what...

  5. Attack Detection/Isolation via a Secure Multisensor Fusion Framework for Cyberphysical Systems

    Directory of Open Access Journals (Sweden)

    Arash Mohammadi

    2018-01-01

    Full Text Available Motivated by rapid growth of cyberphysical systems (CPSs and the necessity to provide secure state estimates against potential data injection attacks in their application domains, the paper proposes a secure and innovative attack detection and isolation fusion framework. The proposed multisensor fusion framework provides secure state estimates by using ideas from interactive multiple models (IMM combined with a novel fuzzy-based attack detection/isolation mechanism. The IMM filter is used to adjust the system’s uncertainty adaptively via model probabilities by using a hybrid state model consisting of two behaviour modes, one corresponding to the ideal scenario and one associated with the attack behaviour mode. The state chi-square test is then incorporated through the proposed fuzzy-based fusion framework to detect and isolate potential data injection attacks. In other words, the validation probability of each sensor is calculated based on the value of the chi-square test. Finally, by incorporation of the validation probability of each sensor, the weights of its associated subsystem are computed. To be concrete, an integrated navigation system is simulated with three types of attacks ranging from a constant bias attack to a non-Gaussian stochastic attack to evaluate the proposed attack detection and isolation fusion framework.

  6. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  7. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  8. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  9. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, G.; Salvador, M.R.; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  10. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  11. Use of computer programs to evaluate effectiveness of security systems

    Energy Technology Data Exchange (ETDEWEB)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-07-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis.

  12. MedMon: securing medical devices through wireless monitoring and anomaly detection.

    Science.gov (United States)

    Zhang, Meng; Raghunathan, Anand; Jha, Niraj K

    2013-12-01

    Rapid advances in personal healthcare systems based on implantable and wearable medical devices promise to greatly improve the quality of diagnosis and treatment for a range of medical conditions. However, the increasing programmability and wireless connectivity of medical devices also open up opportunities for malicious attackers. Unfortunately, implantable/wearable medical devices come with extreme size and power constraints, and unique usage models, making it infeasible to simply borrow conventional security solutions such as cryptography. We propose a general framework for securing medical devices based on wireless channel monitoring and anomaly detection. Our proposal is based on a medical security monitor (MedMon) that snoops on all the radio-frequency wireless communications to/from medical devices and uses multi-layered anomaly detection to identify potentially malicious transactions. Upon detection of a malicious transaction, MedMon takes appropriate response actions, which could range from passive (notifying the user) to active (jamming the packets so that they do not reach the medical device). A key benefit of MedMon is that it is applicable to existing medical devices that are in use by patients, with no hardware or software modifications to them. Consequently, it also leads to zero power overheads on these devices. We demonstrate the feasibility of our proposal by developing a prototype implementation for an insulin delivery system using off-the-shelf components (USRP software-defined radio). We evaluate its effectiveness under several attack scenarios. Our results show that MedMon can detect virtually all naive attacks and a large fraction of more sophisticated attacks, suggesting that it is an effective approach to enhancing the security of medical devices.

  13. Security training symposium: Meeting the challenge: Firearms and explosives recognition and detection

    Energy Technology Data Exchange (ETDEWEB)

    1990-09-01

    These conference proceedings have been prepared in support of the US Nuclear Regulatory Commission's Security Training Symposium on Meeting the Challenge -- Firearms and Explosives Recognition and Detection,'' November 28 through 30, 1989, in Bethesda, Maryland. This document contains the edited transcripts of the guest speakers. It also contains some of the speakers' formal papers that were distributed and some of the slides that were shown at the symposium (Appendix A).

  14. 77 FR 55218 - Homeland Security Advisory Council

    Science.gov (United States)

    2012-09-07

    ... environment; evolving threats in cyber security; Transportation Security Administration operations; DHS... associated with airport security. Specifically, there will be material presented regarding the latest viable... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0055] Homeland Security Advisory Council...

  15. Arc Security System Based on Harmonics Detection for the TS ICRH Transmitter

    International Nuclear Information System (INIS)

    Berger-by, G.; Beaumont, B.; Lombard, G.; Millon, L.; Mollard, P.; Volpe, D.

    2006-01-01

    Since 1999 and with the help of I.P.P. (Institut fuer Plasmaphysik) Garching, we have tested in the Tore Supra (T.S.) ICRH transmitter, arcs security systems based on harmonics detection in a frequency band lower than the generator frequency. These systems have been designed for ASDEX in order to discriminate between the arcs and the ELMS mismatches during H-mode plasmas; they have been supplied to T.S. by a loan contract by I.P.P. The first tests done in T.S. were very successful and have permitted in 2000 to build a prototype matching T.S. technical requirements. These systems have some advantages in comparison with traditional securities which are based on use of a level on the V r /V f (Reflected to Forward voltage ratio) calculation . They do not use calculation, calibration with frequency or level. They can use RF signals from directional couplers or probes, so they are fully independent of the measurement systems. The detection bandwidth (4 MHz-35 MHz on TS) is independent of the antennae working frequencies. The detection principle is therefore insensitive to the crosstalk between the antennae and to the antennae coupling variations. The RF arc security box is installed in the generator hall which can be located far from the torus hall and the antennae (about 50 m on T.S.) a feature which is very relevant for the ITER transmitters. In 2001 we have built 3 systems based on our prototype in order to improve the protection of the 3 ICRH generators and antennae. These systems use industrial pass-band filters and a very sensitive linear detection (- 60 dBm) in order to facilitate the adjustment. Optical fibbers are used to transfer, with a very high immunity, the trip information to the generator electronic pilot. To guarantee safe operation, a checking test of the entire security chain is performed with a 10 MHz RF oscillator before each plasma start. The RF principle used on T.S. ICRH transmitter and its electronic interactions with the VME command control of

  16. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  17. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  18. Securing a Home Energy Managing Platform

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard; Jacobsen, Rune Hylsberg

    2016-01-01

    for balancing the electrical grid and a surveillance unit in private homes, security and privacy become essential to address. In this chapter, we identify and address potential threats Home Energy Management Platform (HEMP) developers should consider in the progress of designing architecture, selecting hardware...... and building software. Our approach starts with a general view of the involved stakeholders and the HEMS. Given the system overview, a threat model is constructed from the HEMP developer's point of view. Based on the threats that have been detected, possible mitigation strategies are proposed taking...

  19. 49 CFR 1540.115 - Threat assessments regarding citizens of the United States holding or applying for FAA...

    Science.gov (United States)

    2010-10-01

    ... Administrator, poses a security threat. (b) Definitions. The following terms apply in this section... piracy or terrorism; (3) A threat to airline or passenger security; or (4) A threat to civil aviation...

  20. 49 CFR 1540.117 - Threat assessments regarding aliens holding or applying for FAA certificates, ratings, or...

    Science.gov (United States)

    2010-10-01

    ... security threat. (b) Definitions. The following terms apply in this section: Assistant Administrator means...— (1) A threat to transportation or national security; (2) A threat of air piracy or terrorism; (3) A...

  1. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Directory of Open Access Journals (Sweden)

    Min-Joo Kang

    Full Text Available A novel intrusion detection system (IDS using a deep neural network (DNN is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN, therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN bus.

  2. Security enhancement of hand geometry scanners using optical blood flow detection

    Science.gov (United States)

    Crihalmeanu, Musat C.; Jerabek, Mark A.; Meehan, Kathleen

    2004-08-01

    In today's security conscious society the efficiency of biometric systems has an increasing tendency to replace the classic but less effective keys and passwords. Hand geometry readers are popular biometrics used for acces control and time and attendance applications. One of their weaknesses is vulnerability to spoofing using fake hands (latex, play-doh or dead-hands). The object of this paper is to design a feature to be added to the hand geometry scanner in order to detect vitality in the hand, reducing the possibilities for spoofing. This paper demonstrates how the hand reader was successfully spoofed and shows the implementation of the vitality detection feature through an inexpensive but efficient electronic design. The method used for detection is photo-plethysmography. The Reflectance Sensor built is of original conception. After amplifying, filtering and processing the sensor's signal, a message is shown via an LCD display, concerning the liveness of the hand and the pulse rate.

  3. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Science.gov (United States)

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  4. Increasing security in inter-chip communication

    Science.gov (United States)

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  5. Air Cargo Security

    Science.gov (United States)

    2007-07-30

    security identification display areas ( SIDAs ). This effectively elevates the required security measures for these cargo handling areas and requires...monitoring. Additional technologies, such as computer algorithms for highlighting potential threat objects, may also be considered to aid human observers

  6. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung; Schneider, Erich

    2015-01-01

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values

  7. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  8. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2013-01-01

    Nuclear terrorism and the illicit trafficking of nuclear and other radioactive material threaten the security of all States. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The possibility that nuclear and other radioactive material may be used for terrorist acts cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material, and to establish capabilities for detection and response to nuclear and other radioactive material out of regulatory control. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This approach recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in nuclear and other radioactive material; national response plans; and contingency measures. Within its nuclear security programme, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking; and to detect and respond to nuclear security events. This is an Implementing Guide on nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control. The objective of the publication is to provide guidance to Member States for the

  9. Consideration on Measures against Insiders Threats in ROK

    International Nuclear Information System (INIS)

    Lee, Seungmin; Yim, Hobin; Hong, Yunjeong

    2015-01-01

    They can also threaten cyber security, safety measures, and material control and accountancy (MC and A). Insiders are likely to have the time to plan their actions. In addition, they may work with an external adversary who shares their objectives. Because of these reasons, IAEA published 'The Implementing Guide Preventive and Protective Measures against Insider Threats, IAEA Nuclear Security Series No. 8' to help understanding of the Member States. This paper focus on the current status of the measures to prevent, detect and respond to potential insiders at nuclear facilities in Republic of KOREA. Insiders are able to take advantage of their access rights and knowledge of facilities where they are working or have worked to bypass dedicated security measures. Therefore, insiders can be the most dangerous threats to cyber security, safety measures, and material control and accountancy of nuclear facilities. Preventive and protective measures against the potential insiders in the nuclear facilities are yet insufficient according to the security inspection results. Especially, preventive and protective measures for unauthorized removal of nuclear material by insiders are the weakest area of whole security systems and should be further strengthened

  10. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  11. Sampling and mass spectrometry approaches for the detection of drugs and foreign contaminants in breath for homeland security applications

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Audrey Noreen [Michigan State Univ., East Lansing, MI (United States)

    2009-01-01

    Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid

  12. Protecting the source. Securing nuclear material and strong radiation sources. New threats of terrorism are prompting the need for swift action to better secure nuclear material and strong radiation sources. Are measures already in place enough? The Stanford-Salzburg initiative suggests not

    International Nuclear Information System (INIS)

    Steinhausler, F.; Bunn, G.

    2003-01-01

    At a time of growing concern over threats of terrorism, the security of nuclear and radioactive material is an urgent and serious issue. Working with a range of partners, the IAEA has put into place a multi-faceted Action Plan to help countries upgrade their capabilities. But more needs to be done to counter new types of threats. One particular area that needs to be strengthened is the physical protection of nuclear and radioactive material. The attacks of 11 September 2001 opened our eyes to i he urgent need to strengthen national physical protection (PP) practices for nuclear and other radioactive material. The principle that highly radioactive material will protect itself does not apply to the newest generation of terrorists. Existing PP systems were not designed to deal with the threat of suicidal terrorists commanding the numbers, skills, training, and resources available to those who carried out the attacks in the US. Moreover, because there are no mandatory international standards for domestic PP systems for nuclear or radioactive material, protection measures vary greatly from country to country. The IAEA recommended standards (Inference/225/Rev. 4) were not designed with the new terrorist threats in mind and national practices often fall short of even these recommendations. The result is inadequate protection against the new form of terrorism. Few argue the point that national physical protection practices for nuclear and other radioactive material need to be strengthened. This article summarizes a Stanford-Salzburg plan developed by experts from Stanford University's Center for International Security and Cooperation, (USA) and revised at the EU-Physical Protection NUMAT Conference in September 2002 in Salzburg, Austria. It includes six recommended elements to consider in addition to what the IAEA is now doing to improve PP practices around the world: Establish a global list of physical protection priorities; Create a multilateral security cooperation

  13. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  14. Hot Under the Collar: Lessons from the 2003 Heatwave in France and the Security Implications for Coping with Environmental Threats in the EU

    Directory of Open Access Journals (Sweden)

    Paul J. Stephenson

    2009-08-01

    Full Text Available In the sweltering temperatures of August 2003 there were over 15,000 fatalities in France, the majority among the elderly. The heatwave (canicule was the greatest natural catastrophe in Europe for 50 years. Political mismanagement contributed to the death toll and government initially to blame medical services. However, other politico-cultural, societal and psychological factors may have contributed to the failure to protect the most vulnerable citizens. This article identifies 20 obstacles (“pathogens” to ensuring effective response in the face of environmental or weather-related threats, distinguishing between state-institutional and individual-community barriers, most of which have a cultural dimension. These factors require greater consideration by policy-makers to improve preparedness for environmental threats in the EU. The case raises questions about crisis management and how best to reduce risk for elderly populations, illustrating the limits of the state in offering social protection through institutionalised solidarity mechanisms, and recognises calls to strengthen community-capacity.

  15. KEAMANAN JARINGAN MENGGUNAKAN UNIFIED THREAT MANAGEMENT PADA SERVER BERBASISKAN LINUX

    Directory of Open Access Journals (Sweden)

    Bambang Heru

    2007-05-01

    Full Text Available UTM is an application which integrated many security features become a single hardware platform. The reasonbehind this research is to build a system that protects the network in St. Bellarminus school. Research method that hasbeen used in this research is spiral method, whereas the development of the application is continues and can be modifiedeasily if there is new version of the security tools implemented in the application, or if there is a better security tools to beused. The outcome of the system is very good, because it can protects the network: cross-platform firewall, IntrusionDetection System, Proxy Server, email protection against virus and spam. In conclusion, the application can producehigh effectiveness with low cost and this application is very useful in monitoring and configuring the network in St.Bellarminus school.Keywords: security network, unified threat management, anti virus, server, proxy, firewall

  16. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  17. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  18. A seguridade social sob a ameaça do ajuste recessivo no Brasil (Social security under threat of recessive adjustment in Brazil

    Directory of Open Access Journals (Sweden)

    Lúcia Cortes Costa

    2017-10-01

    Full Text Available O artigo apresenta reflexão sobre a seguridade social como direito do cidadão. Discute o impacto das transferências de renda da seguridade social na redução da pobreza no Brasil. Apresenta as medidas de ajustes recessivos promovidas pelo Governo federal a partir de 2015 em relação à seguridade social. O texto organiza-se em 04 itens, parte da discussão sobre a seguridade social como direito de cidadania, apresenta o contexto neoliberal da década de 1990, a experiência de ampliação da proteção social no período de 2003-2015 e, para finalizar a discussão das medidas adotadas pela EC 095/2016 e da PEC 287/16. O objetivo é apresentar argumentos em defesa da seguridade social como instrumento importante para a redução da pobreza no país. Os dados foram obtidos por meio de pesquisa bibliográfica, documental e dados de sites oficiais do governo federal.Palavras-chave: Seguridade social, transferência de rendas, pobreza, cidadaniaAbstract: The article presents a reflection on social security as a citizen’s right. It discusses the impact of social security income transfers on poverty reduction in Brazil. It presents the measures of recessive adjustments promoted by the FederalGovernment from 2015 on social security. The text is  organized in 04 sessions, part of the discussion on social security as a right of citizenship, presents the neoliberal context of the 1990s, the experience of expanding social protection in the period 2003-2015 and, to finalize the discussion of the measures adopted by EC 095/2016 and PEC 287/16. The objective is to present arguments in defense of social security as an important instrument for the reduction of poverty in the country. The data were obtained through bibliographical research, documentary and data from official websites of the federal government.Key words: Social security, income transfer, poverty,  citizenship

  19. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  20. Identification of Genomic Signatures for the Design of Assays for the Detection and Monitoring of Anthrax Threats

    National Research Council Canada - National Science Library

    Draghici, Sorin; Khatri, Purvesh; Liu, Yanhong; Chase, Kitty J; Bode, Elizabeth A; Kulesh, David A; Wasieloski, Leonard P; Norwood, David A; Reifman, Jaques

    2005-01-01

    .... Such DNA signatures are particularly important for the identification of genetic source of drug resistance of a strain or for the detection of organisms that can be used as biological agents in warfare or terrorism...

  1. El crimen organizado en Europa: Una grave amenaza para la seguridad y el orden público/The crime organized in Europe: A serious threat to the security and public order

    Directory of Open Access Journals (Sweden)

    Francisco José Rodrigo Luelmo (España

    2009-01-01

    Full Text Available El crimen organizado es una de las amenazas más graves para la seguridad internacional y de los Estados por la multitud de actividades delictivas que practica, pero también por su mundialización. Su existencia ha preocupado a organizaciones como Naciones Unidas y la Unión Europea, que lo han intentado definir para mejorar la eficacia jurídico-policial en la lucha contra este riesgo. Europa es un espacio muy afectado por el crimen organizado, en forma de mafias (por ejemplo, en Italia y Rusia y narcotraficantes de droga. Se trata, pues, de un fenómeno criminal que pone en riesgo la integridad de los ciudadanos y el respeto al Estado de Derecho en Europa y en el resto del mundo. The organized crime is one of the most important threats for the international and states’ security, because of the enormous variety of punishable activities which practices, but also because of its global spreading. Its existence has worried some organizations such as United Nations and European Union, which have tried to define it in order to improve the judicial and police efficiency in the fight against this threat. Europe is a space very affected by the organized crime, with mafias (e.g., in Italy and Russia and drugs-traffickers. So, this criminal phenomenon risks the citizen’s integrity and the respect for the rule of law in Europe and in the rest of the world.

  2. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  3. Radiation Detection and Dual-Energy X-Ray Imaging for Port Security

    Energy Technology Data Exchange (ETDEWEB)

    Pashby, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Glenn, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Divin, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Martz, H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-08-09

    Millions of cargo containers are transported across the United States border annually and are inspected for illicit radioactive material and contraband using a combination of passive radiation portal monitors (RPM) and high energy X-ray non-intrusive inspection (NII) systems. As detection performance is expected to vary with the material composition of cargo, characterizing the types of material present in cargo is important to national security. This work analyzes the passive radiation and dual energy radiography signatures from on RPM and two NII system, respectively. First, the cargos were analyzed to determine their ability to attenuate emissions from an embedded radioactive source. Secondly, dual-energy X-ray discrimination was used to determine the material composition and density of the cargos.

  4. Thinking about threats: Memory and prospection in human threat management.

    Science.gov (United States)

    Bulley, Adam; Henry, Julie D; Suddendorf, Thomas

    2017-03-01

    Humans have evolved mechanisms for the detection and management of possible threats in order to abate their negative consequences for fitness. Internally generated ('detached') cognition may have evolved in part because of its contributions to this broad function, but important questions remain about its role in threat management. In this article, we therefore present a taxonomy of threat-related internally generated cognition comprising episodic and semantic formats of memory and prospection. We address the proximate mechanisms of each of the capacities in this taxonomy, and discuss their respective contributions to adaptive threat management in humans. For instance, mental time travel empowers people to contemplate and learn from threats experienced long ago, as well as to plan for dangers that might arise in the distant future. However, despite their functional benefits, these thought processes are also central to contemporary anxiety disorders and may be a potent source of distress. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems

    NARCIS (Netherlands)

    Gadyatskaya, Olga

    2016-01-01

    Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the detected threats. However, the existing

  6. Detection of maximum loadability limits and weak buses using Chaotic PSO considering security constraints

    International Nuclear Information System (INIS)

    Acharjee, P.; Mallick, S.; Thakur, S.S.; Ghoshal, S.P.

    2011-01-01

    Highlights: → The unique cost function is derived considering practical Security Constraints. → New innovative formulae of PSO parameters are developed for better performance. → The inclusion and implementation of chaos in PSO technique is original and unique. → Weak buses are identified where FACTS devices can be implemented. → The CPSO technique gives the best performance for all the IEEE standard test systems. - Abstract: In the current research chaotic search is used with the optimization technique for solving non-linear complicated power system problems because Chaos can overcome the local optima problem of optimization technique. Power system problem, more specifically voltage stability, is one of the practical examples of non-linear, complex, convex problems. Smart grid, restructured energy system and socio-economic development fetch various uncertain events in power systems and the level of uncertainty increases to a great extent day by day. In this context, analysis of voltage stability is essential. The efficient method to assess the voltage stability is maximum loadability limit (MLL). MLL problem is formulated as a maximization problem considering practical security constraints (SCs). Detection of weak buses is also important for the analysis of power system stability. Both MLL and weak buses are identified by PSO methods and FACTS devices can be applied to the detected weak buses for the improvement of stability. Three particle swarm optimization (PSO) techniques namely General PSO (GPSO), Adaptive PSO (APSO) and Chaotic PSO (CPSO) are presented for the comparative study with obtaining MLL and weak buses under different SCs. In APSO method, PSO-parameters are made adaptive with the problem and chaos is incorporated in CPSO method to obtain reliable convergence and better performances. All three methods are applied on standard IEEE 14 bus, 30 bus, 57 bus and 118 bus test systems to show their comparative computing effectiveness and

  7. Personal privacy, information assurance, and the threat posed by malware techology

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2006-04-01

    In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.

  8. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    Energy Technology Data Exchange (ETDEWEB)

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  9. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment.

  10. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber security; and provide information on the threat of an electromagnetic pulse attack and its associated... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal...

  11. An electrochemiluminescence assay for the detection of bio threat agents in selected food matrices and in the screening of Clostridium botulinum outbreak strains associated with type A botulism.

    Science.gov (United States)

    Sachdeva, Amita; Singh, Ajay K; Sharma, Shashi K

    2014-03-15

    Specific screening methods for complex food matrices are needed that enable unambiguous and sensitive detection of bio threat agents (BTAs) such as Bacillus anthracis spores and microbial toxins (e.g. staphylococcal enterotoxin B (SEB) and clostridial botulinum neurotoxins (BoNTs)). The present study describes an image-based 96-well Meso Scale Discovery (MSD) electrochemiluminescence (ECL) assay for simultaneous detection of BTAs in dairy milk products. The limit of detection of this ECL assay is 40 pg mL⁻¹ for BoNT/A complex, 10 pg mL⁻¹ for SEB and 40000 CFU mL⁻¹ for Bacillus anthracis spores in dairy milk products. The ECL assay was successfully applied to screen type A Clostridium botulinum outbreak strains. The results of the study indicate that this ECL assay is very sensitive, rapid (<6 h) and multiplex in nature. The ECL assay has potential for use as an in vitro screening method for BTAs over other comparable immunoassays. © 2013 Society of Chemical Industry.

  12. Optical and digital techniques for information security

    CERN Document Server

    2005-01-01

    Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...

  13. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  14. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  15. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  16. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  17. 49 CFR 15.5 - Sensitive security information.

    Science.gov (United States)

    2010-10-01

    ... sources and methods used to gather or develop threat information, including threats against cyber..., including threat images and descriptions of threat images for threat image projection systems. (10) Security... 49 Transportation 1 2010-10-01 2010-10-01 false Sensitive security information. 15.5 Section 15.5...

  18. Mobile Detection Assessment and Response Systems (MDARS): A Force Protection, Physical Security Operational Success

    National Research Council Canada - National Science Library

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-01-01

    ... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...

  19. Transcranial direct current stimulation augments perceptual sensitivity and 24-hour retention in a complex threat detection task.

    Directory of Open Access Journals (Sweden)

    Brian Falcone

    Full Text Available We have previously shown that transcranial direct current stimulation (tDCS improved performance of a complex visual perceptual learning task (Clark et al. 2012. However, it is not known whether tDCS can enhance perceptual sensitivity independently of non-specific, arousal-linked changes in response bias, nor whether any such sensitivity benefit can be retained over time. We examined the influence of stimulation of the right inferior frontal cortex using tDCS on perceptual learning and retention in 37 healthy participants, using signal detection theory to distinguish effects on perceptual sensitivity (d' from response bias (ß. Anodal stimulation with 2 mA increased d', compared to a 0.1 mA sham stimulation control, with no effect on ß. On completion of training, participants in the active stimulation group had more than double the perceptual sensitivity of the control group. Furthermore, the performance enhancement was maintained for 24 hours. The results show that tDCS augments both skill acquisition and retention in a complex detection task and that the benefits are rooted in an improvement in sensitivity (d', rather than changes in response bias (ß. Stimulation-driven acceleration of learning and its retention over 24 hours may result from increased activation of prefrontal cortical regions that provide top-down attentional control signals to object recognition areas.

  20. Ozone threat

    International Nuclear Information System (INIS)

    Rajput, M.A.

    1995-01-01

    Ozone hole was first discovered in 1980. Thus 15 years even after the first warming, the world is no where near to the elimination of man made gases that threaten to destroy the ozone layer. Ozone depletion has become a matter of enormous threat which remains to be solved by the Scientists and intelligentia of the world. Ozone (O3) is a pungent poisonous gas. It forms a layer at a distance of about 15 miles above the earth's surface which helps shield living things from the sun shearing ultra violet light. If ozone is lost, more ultra violet light reaches the earth, which can lead to increasing rate of skin cancer, the death of micro organisms and the failure of crops and plants. It was in 1974 when it was discovered that Chlorofluorocarbons (CFCs) cold rise slowly to the upper atmosphere and destroy the earth's fragile ozone shield. Chlorofluorocarbons are commonly used as coolants (such as Freon) for home and automobile air conditioners and in the making of fast food containers. CFCs take about 100 years or more to reach he stratosphere to damage the ozone layers. In 1988, Scientists confirmed that upto 3% of the ozone layer over the more populated Northern Hemisphere has been destroyed. it is believed that for every 1% decrease in ozone, skin cancers are expected to rise 5 to 6 per cent due to the increase of ultraviolet light. Cases of cataracts and certain human immune system diseases are also expected to rise. (author)

  1. Technology for the detection of airborne intruders approaching the high-security high-value asset

    Science.gov (United States)

    Greneker, Eugene F., III

    1995-05-01

    Security plans to protect high-value assets usually concentrate on stopping potential ground intruders before they reach the asset. Barriers, such as fences, are the first line of defense against the found intruder, providing a delay mechanism. The sight of 10 to 12 foot high fencing topped with razor wire, guard towers, and roving patrols also serves as a psychological deterrent to the potential ground intrusion sensors between an outer and an inner barrier. This visible 'hardness' of a high-value asset makes airborne penetration more attractive, even though the airborne intruder may require training in the use of an aircraft or other airborne conveyance system. Certain airborne intrusion scenarios allow an adversary to penetrate much deeper and faster through delay and defense systems designed to deter the ground intruder. Since an airborne intruder can quickly reach the high-value asset, early detection critical to asset defense. Early detection of the airborne intruder also ensures appropriate use of the deadly force doctrine because the guard force has time to coordinate the response.

  2. A new feature detection mechanism and its application in secured ECG transmission with noise masking.

    Science.gov (United States)

    Sufi, Fahim; Khalil, Ibrahim

    2009-04-01

    With cardiovascular disease as the number one killer of modern era, Electrocardiogram (ECG) is collected, stored and transmitted in greater frequency than ever before. However, in reality, ECG is rarely transmitted and stored in a secured manner. Recent research shows that eavesdropper can reveal the identity and cardiovascular condition from an intercepted ECG. Therefore, ECG data must be anonymized before transmission over the network and also stored as such in medical repositories. To achieve this, first of all, this paper presents a new ECG feature detection mechanism, which was compared against existing cross correlation (CC) based template matching algorithms. Two types of CC methods were used for comparison. Compared to the CC based approaches, which had 40% and 53% misclassification rates, the proposed detection algorithm did not perform any single misclassification. Secondly, a new ECG obfuscation method was designed and implemented on 15 subjects using added noises corresponding to each of the ECG features. This obfuscated ECG can be freely distributed over the internet without the necessity of encryption, since the original features needed to identify personal information of the patient remain concealed. Only authorized personnel possessing a secret key will be able to reconstruct the original ECG from the obfuscated ECG. Distribution of the would appear as regular ECG without encryption. Therefore, traditional decryption techniques including powerful brute force attack are useless against this obfuscation.

  3. Reducing the threat of wildlife-vehicle collisions during peak tourism periods using a Roadside Animal Detection System.

    Science.gov (United States)

    Grace, Molly K; Smith, Daniel J; Noss, Reed F

    2017-12-01

    Roadside Animal Detection Systems (RADS) aim to reduce the frequency of wildlife-vehicle collisions. Unlike fencing and wildlife passages, RADS do not attempt to keep animals off the road; rather, they attempt to modify driver behavior by detecting animals near the road and warning drivers with flashing signs. A RADS was installed in Big Cypress National Park (Florida, USA) in 2012 in response to an increased number of Florida panther mortalities. To assess driver response, we measured the speed of individual cars on the road when the RADS was active (flashing) and inactive (not flashing) during the tourist season (November-March) and the off-season (April-October), which vary dramatically in traffic volume. We also used track beds and camera traps to assess whether roadside activity of large mammal species varied between seasons. In the tourist season, the activation of the RADS caused a significant reduction in vehicle speed. However, this effect was not observed in the off-season. Track and camera data showed that the tourist season coincided with peak periods of activity for several large mammals of conservation interest. Drivers in the tourist season generally drove faster than those in the off-season, so a reduction in speed in response to the RADS is more beneficial in the tourist season. Because traffic volume and roadside activity of several species of conservation interest both peak during the tourist season, our study indicates that the RADS has the potential to reduce the number of accidents during this period of heightened risk. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Network security: a survey of modern approaches

    International Nuclear Information System (INIS)

    Zafar, M.F.; Naheed, F.; Ahmad, Z.; Anwar, M.M.

    2008-01-01

    Security is an essential element of information technology (IT) infrastructure and applications. Concerns about security of networks and information systems have been growing along with the rapid increase in the number of network users and the value of their transactions. The hasty security threats have driven the development of security products known as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to detect and protect the network, server and desktop infrastructure ahead of the threat. Authentication and signing techniques are used to prevent integrity threats. Users, devices, and applications should always be authenticated and authorized before they are allowed to access networking resources. Though a lot of information is available on the internet about IDS and IPS but it all is spread on so many sites and one has to spend a considerable part of his precious time to search it. In this regard a thorough survey has been conducted to facilitate and assist the researchers. The issues and defend challenges in fighting with cyber attacks have been discussed. A comparison of the categories of network security technologies has been presented. In this paper an effort has been made to gather the scattered information and present it at one place. This survey will provide best available up-to-date advancement in the area. A brief description of open source IPS has also been presented. (author)

  5. Environmental Threats to Security, Stability, and U.S. Interests in Southern Africa: Opportunity Knocks - Time for a Comprehensive Region Defense Environmental International Cooperation and Environmental Security Assistance Strategy

    Science.gov (United States)

    2009-01-01

    the region are largely on the wane but, environmental trends and stresses which significantly threaten human security and state stability in the...development in southern Africa. Average annual rainfall for the SADC countries is 948mm; however most of the region‟s area including all of Botswana...the largest proportion being in Mozambique, followed by Angola , South Africa, Zambia and Malawi.”23 Southern Africa has also been hit by acute

  6. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We

  7. US-Central Asian Security. Balancing Opportunities and Challenges

    National Research Council Canada - National Science Library

    Babus, Sylvia

    1999-01-01

    .... While their greatest security threats are internal political repression, inequitable distribution of income, ethnic and tribal unrest their leaders focus instead on external threats such as hostile...

  8. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  9. Secure Transportation Management

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. The Hydra regeneration assay reveals ecological risks in running waters: a new proposal to detect environmental teratogenic threats.

    Science.gov (United States)

    Traversetti, Lorenzo; Del Grosso, Floriano; Malafoglia, Valentina; Colasanti, Marco; Ceschin, Simona; Larsen, Stefano; Scalici, Massimiliano

    2017-03-01

    The regenerative ability of Hydra vulgaris was tested as potential biomarker for the development of a new eco-toxicological index. The test is based on the regeneration rate and the aberration frequency of the columna (body and adhesive foot) after separation from head and tentacles by a bistoury. Particularly, 45 columnae were submerged in the rearing solution (that is Hydra medium) to have control, and 285 in potential contaminated waters to have treatments, collected from 19 sites along 10 rivers in central Italy. ANCOVA and chi-square tests were used to compare values from each site to a laboratory control. Subsequently the values on regeneration rate and aberration frequency were inserted in a double entry matrix, where the match of the two entries in the matrix provides the score of the proposed Teratogenic Risk Index (TRI). Each score corresponded to one of the 5 teratogenic risk classes, to which a risk level was associated: from 1 (no risk) to 5 (very high risk). On the whole, 32% of the studied sites were classified as no teratogenic risk while the remaining showed a variable risk level from low to very high. This study proposed for the first time an early warning system to detect the presence of teratogens in running waters, providing a rapid and cost-effective evaluation method. Therefore, TRI may contribute to initiate adequate measures to manage riverine habitats, and to monitor the running water teratogenic status. Specifically, this index may provide the opportunity to identify the disturbance sources and then to drive the decisions, together with competent authorities, on the catchment and landscape management and on the possible use of waters for urban, agricultural, and industrial activities, since they may show significant effects on the human health.

  11. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  12. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    National Research Council Canada - National Science Library

    2002-01-01

    ... (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  13. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  14. Method and device for detecting impact events on a security barrier which includes a hollow rebar allowing insertion and removal of an optical fiber

    Science.gov (United States)

    Pies, Ross E.

    2016-03-29

    A method and device for the detection of impact events on a security barrier. A hollow rebar is farmed within a security barrier, whereby the hollow rebar is completely surrounded by the security barrier. An optical fiber passes through the interior of the hollow rebar. An optical transmitter and an optical receiver are both optically connected to the optical fiber and connected to optical electronics. The optical electronics are configured to provide notification upon the detection of an impact event at the security barrier based on the detection of disturbances within the optical fiber.

  15. Dynamic Network Security Control Using Software Defined Networking

    Science.gov (United States)

    2016-03-24

    rapidly respond to host level security events using SDN flow table updates, role-based flow classes , and Advanced Messaging Queuing Protocol to auto...the success of most organizations. One approach is to apply host and network-based security systems, which typically come in the form of antivirus or...intrusion detection/prevention products to man- age these threats. However, since traditional networks require manual configuration, an antivirus alert

  16. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  17. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  18. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  19. Distance bounded energy detecting ultra-wideband impulse radio secure protocol.

    Science.gov (United States)

    Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J

    2014-01-01

    We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks.

  20. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  1. Bridging the health security divide: department of defense support for the global health security agenda.

    Science.gov (United States)

    Moudy, Robin M; Ingerson-Mahar, Michael; Kanter, Jordan; Grant, Ashley M; Fisher, Dara R; Jones, Franca R

    2014-01-01

    In 2011, President Obama addressed the United Nations General Assembly and urged the global community to come together to prevent, detect, and fight every kind of biological danger, whether a pandemic, terrorist threat, or treatable disease. Over the past decade, the United States and key international partners have addressed these dangers through a variety of programs and strategies aimed at developing and enhancing countries' capacity to rapidly detect, assess, report, and respond to acute biological threats. Despite our collective efforts, however, an increasingly interconnected world presents heightened opportunities for human, animal, and zoonotic diseases to emerge and spread globally. Further, the technical capabilities required to develop biological agents into a weapon are relatively low. The launch of the Global Health Security Agenda (GHSA) provides an opportunity for the international community to enhance the linkages between the health and security sectors, accelerating global efforts to prevent avoidable epidemics and bioterrorism, detect threats early, and respond rapidly and effectively to biological threats. The US Department of Defense (DoD) plays a key role in achieving GHSA objectives through its force health protection, threat reduction, and biodefense efforts at home and abroad. This article focuses on GHSA activities conducted in the DoD Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense.

  2. FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems

    OpenAIRE

    Borgohain, Rajdeep

    2012-01-01

    With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics in recent years. This paper gives an overview of the Intrusion Detection System and looks at two major machine learning paradigms used in Intrusion Detection System, Genetic Algorithms and Fuzzy Logic and how to apply them for intrusion dete...

  3. An Enhancement of Optimized Detection Rule of Security Monitoring and Control for Detection of Cyberthreat in Location-Based Mobile System

    Directory of Open Access Journals (Sweden)

    Wonhyung Park

    2017-01-01

    Full Text Available A lot of mobile applications which provided location information by using a location-based service are being developed recently. For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However, the information leakage and the crime that misused the leaked information caused by the cyberattack of mobile information system occurred. So the interest and importance of information security are increasing. Also the number of users who has used mobile devices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has been used to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kinds of equipment. It is expected that the security of mobile information system would be improved and information leakage would be blocked by selecting options through optimization of Snort detection policy to protect users who are using location-based service in mobile information system environment in this paper.

  4. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    him with his own weapon come close to the myth of the beginning of time when a Lapp managed to secure his existence and defend his community against an outside threat. Without the proto-Lapp battle against evil, the community would not have had a chance to exist, the right to live in its area, as the community does nowadays.

  5. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  6. Threat model framework and methodology for personal networks (PNs)

    DEFF Research Database (Denmark)

    Prasad, Neeli R.

    2007-01-01

    To be able to build a secure network, it is essential to model the threats to the network. A methodology for building a threat model has been proposed in the paper. Several existing threat models and methodologies will be compared to the proposed methodology. The aim of the proposed methodology i...... been used. Also risk assessment methods will be discussed. Threat profiles and vulnerability profiles have been presented....

  7. Advanced Sensors for Safety and Security

    CERN Document Server

    Khudaverdyan, Surik

    2013-01-01

    This book results from a NATO Advanced Research Workshop titled “Technological Innovations in CBRNE Sensing and Detection for Safety, Security, and Sustainability” held in Yerevan, Armenia in 2012. The objective was to discuss and exchange views as to how fusion of advanced technologies can lead to improved sensors/detectors in support of defense, security, and situational awareness. The chapters range from policy and implementation, advanced sensor platforms using stand-off (THz and optical) and point-contact methods for detection of chemical, nuclear, biological, nuclear and explosive agents and contaminants in water, to synthesis methods for several materials used for sensors.  In view of asymmetric, kinetic, and distributed nature of threat vectors, an emphasis is placed to examine new generation of sensors/detectors that utilize an ecosystems of innovation and advanced sciences convergence in support of effective counter-measures against  CBRNE threats. The book will be of considerable interest and...

  8. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  9. Security practices and resettlement

    Directory of Open Access Journals (Sweden)

    Shoshana Fine

    2017-02-01

    Full Text Available A widely held misconception about the terrorist threat is particularly evident in refugee resettlement practices, where refugees are placed on a security continuum alongside transnational criminals and terrorists.

  10. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    .... However, policy makers have received mixed signals about the relative security risk posed by GA, due to its diversity and a general lack of detailed information regarding the threat and vulnerability...

  11. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2008-01-01

    .... However, policymakers have received mixed signals about the relative security risk posed by GA, due to its diversity and a general lack of detailed information regarding the threat and vulnerability...

  12. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  14. Perspectives on the International and Internal Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2015-01-01

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime

  15. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  16. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  17. Secure Border Gateway Protocol and the External Routing Intrusion Detection System

    National Research Council Canada - National Science Library

    Kent, Stephen

    2000-01-01

    ...), is a critical component of the Internet's routing infrastructure. It is highly vulnerable to a variety of malicious attacks due to the lack of a secure means of verifying the authenticity and legitimacy of BGP control traffic...

  18. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

    2011-04-01

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

  19. Building a Secure Library System.

    Science.gov (United States)

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  20. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  1. Threats and Challenges in Reconfigurable Hardware Security

    Science.gov (United States)

    2008-07-01

    logic synthesis tools from EDA companies like Cadence, Mentor Graphics, Synopsys, and Magma . Finally, phys- ical synthesis tools transform the logic...example of the former is that DRAM cells contain their contents for seconds to minutes after power- down, even at room temperature and even if removed from...effect that temperature plays on the remanence. It is well-known that SRAM bits at lower temperatures hold charge longer than those at higher

  2. Obesity: A Threat to National Security?

    Science.gov (United States)

    2011-03-16

    the leading causes of premature death in the United States, including our nation‟s biggest killer: heart disease. Furthermore, obesity is now the...Some of the health conditions they face include, but are not limited to:  Sleep apnea  Coronary heart disease  Hypertension  Type 2

  3. Complacency: A Threat to Homeland Security

    Science.gov (United States)

    2014-06-01

    employ vast numbers of men and women made it impractical to select individuals for specific jobs. Thus, the focus shifted to designing for people’s...research scientist, academician, businessman, and philanthropist, started the Santa Fe Institute in Los Alamos, New Mexico ; Stephen Wolfram began the...symptoms of groupthink, including illusions of invulnerability and a sense of superiority, collective rationalization, and stereotyping of outsiders

  4. Narcocultura: A Threat to Mexican National Security?

    Science.gov (United States)

    2012-12-01

    bands account for approximately two-thirds of domestic Latin music sales .132 The style of the narcocorrido is an institutionalized tradition in...derribado aviones que nos han caído al campo a quemarnos los plantíos donde sale el polvo blanco con bazucas y metrallas los hemos mandado al Diablo...legitimacy of the Mexican government’s actions. In August 2011, the Veracruz state government arrested two individuals who falsely reported the kidnapping

  5. The Submersible Threat to Maritime Homeland Security

    Science.gov (United States)

    2013-09-01

    clandestine shipyard in the jungles of Ecuador (Popkin, 2011). Although no drugs were recovered in the raid on the shipyard, this discovery was...July 2, 2010, authorities in Ecuador confiscated a nearly completed 74-foot fully-submersible submarine made of Kevlar and carbon fiber (Popkin, 2011...protect its citizens • Discourage foreign investments, tourism , or assistance programs that can affect the target country’s economy and support of

  6. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  7. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  8. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  9. Physical security workshop summary: entry control

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1982-01-01

    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  10. Mining social networks and security informatics

    CERN Document Server

    Özyer, Tansel; Rokne, Jon; Khoury, Suheil

    2013-01-01

    Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for soci

  11. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  12. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  13. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  14. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    Science.gov (United States)

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  15. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  16. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  17. Global nuclear security engagement

    International Nuclear Information System (INIS)

    Kulp, W.D. III

    2012-01-01

    Full text: The Nuclear Security Summits in Washington (2010) and Seoul (2012) were convened with the goal of reducing the threat of nuclear terrorism. These meetings have engaged States with established nuclear fuel cycle activities and encouraged their commitment to nuclear security. The participating States have reaffirmed that it is a fundamental responsibility of nations to maintain effective nuclear security in order to prevent unauthorized actors from acquiring nuclear materials. To that end, the participants have identified important areas for improvement and have committed to further progress. Yet, a broader message has emerged from the Summits: effective nuclear security requires both global and regional engagement. Universal commitment to domestic nuclear security is essential, if only because the peaceful use of nuclear energy remains a right of all States: Nations may someday adopt nuclear energy, even if they are not currently developing nuclear technology. However, the need for nuclear security extends beyond domestic power production. To harvest natural resources and to develop part of a nuclear fuel cycle, a State should embrace a nuclear security culture. Nuclear materials may be used to produce isotopes for medicine and industry. These materials are transported worldwide, potentially crossing a nation's borders or passing by its shores. Regrettably, measures to prevent the loss of control may not be sufficient against an adversary committed to using nuclear or other radioactive materials for malicious acts. Nuclear security extends beyond prevention measures, encompassing efforts to detect illicit activities and respond to nuclear emergencies. The Seoul Communique introduces the concept of a Global Nuclear Security Architecture, which includes multilateral instruments, national legislation, best practices, and review mechanisms to promote adoption of these components. Key multilateral instruments include the Convention on Physical Protection of

  18. ITAC, an insider threat assessment computer program

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.

    1988-01-01

    The insider threat assessment computer program, ITAC, is used to evaluate the vulnerability of nuclear material processing facilities to theft of special nuclear material by one or more authorized insider adversaries. The program includes two main parts: one is used to determine the timeliness of nuclear material accounting tests for loss of special nuclear material, and the other determines pathway aggregate detection probabilities for physical protection systems and material control procedures that could detect the theft. Useful features of ITAC include its ability to (1) evaluate and quantify the timeliness of material accounting tests, (2) analyze branching systems of physical pathways and adversary strategies, (3) analyze trickle or abrupt theft situations for combinations of insiders, (4) accept input probabilities and times in the form of ranges rather than discrete points, and (5) simulate input data using Monte Carlo methods to produce statistically distributed aggregate delay times and detection probabilities. The ITAC program was developed by the Security Applications Center of Westinghouse Hanford Comapny and Boeing Computer Services, Richland, WA

  19. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  20. 76 FR 4123 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-01-24

    .... The closed portions of the meeting will address threats to our homeland security, results of a cyber... regarding domestic and international threats to our homeland security; a presentation on the timely sharing... who wish to attack our cyber security, and hence, would certainly frustrate the successful...

  1. On the Road to Holistic Decision Making in Adaptive Security

    Directory of Open Access Journals (Sweden)

    Mahsa Emami-Taba

    2013-08-01

    Full Text Available Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system's behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.

  2. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  3. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  4. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  5. Perception of the Threat of Terrorism.

    Science.gov (United States)

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat. © The Author(s) 2016.

  6. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  7. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  8. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a... threat to our national security from traditional cold-war era foreign intelligence services, foreign...

  9. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  10. PBX Security and Forensics A Practical Approach

    CERN Document Server

    Androulidakis, Iosif I

    2013-01-01

    PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.

  11. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  12. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  13. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  14. 77 FR 27208 - Renewal of Threat Reduction Advisory Committee

    Science.gov (United States)

    2012-05-09

    ... Threat Reduction Agency mission- related matters. The Committee shall be composed of not more than 30... security affairs, weapons of mass destruction, nuclear physics, chemistry, and biology. The Committee...

  15. Preparedness and response to cyber threats require a CSIRT

    CSIR Research Space (South Africa)

    Robertson, J

    2008-07-01

    Full Text Available The military’s decision to move from proprietary software to commercially available software leaves the military’s Information Technology security vulnerable and potentially unprotected. To be sufficiently prepared to these threats, the military...

  16. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  17. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  18. Employing Program Semantics for Malware Detection

    OpenAIRE

    Naval, S.; Laxmi, V.; Rajarajan, M.; Gaur, M. S.; Conti, M.

    2015-01-01

    In recent years, malware has emerged as a critical security threat. Additionally, malware authors continue to embed numerous anti–detection features to evade existing malware detection approaches. Against this advanced class of malicious programs, dynamic behavior–based malware detection approaches outperform the traditional signature–based approaches by neutralizing the effects of obfuscation and morphing techniques. The majority of dynamic behavior detectors rely on system–calls to model th...

  19. An Intelligent Threat Prevention Framework with Heterogeneous Information

    OpenAIRE

    Ma, WenJun; Liu, Weiru

    2014-01-01

    Three issues usually are associated with threat prevention intelligent surveillance systems. First, the fusion and interpretation of large scale incomplete heterogeneous information; second, the demand of effectively predicting suspects’ intention and ranking the potential threats posed by each suspect; third, strategies of allocating limited security resources (e.g., the dispatch of security team) to prevent a suspect’s further actions towards critical assets. However, in the literature, the...

  20. COOPERATIVE THREAT REDUCTION: DOD Has Adequate Oversight of Assistance, but Procedural Limitations Remain

    National Research Council Canada - National Science Library

    2001-01-01

    ... more than $3 billion for the Cooperative Threat Reduction (CTR) program to help Russia, Belarus, Ukraine, Kazakhstan, Uzbekistan, Moldova, and Georgia secure and eliminate weapons of mass destruction...