Search results for "vulnerabilities"
showing 10 items of 12 documents
Childhood maltreatment, personality vulnerability profiles, and borderline personality disorder symptoms in adolescents.
2021
AbstractAdverse childhood experiences are significant risk factors in the development of adolescent borderline personality disorder symptoms (BPDs). Theorists have posited that two personality vulnerabilities factors, self-criticism and dependency, may inform our understanding of this relationship. However, no research has examined the associations between early negative experiences, personality vulnerabilities, and adolescent BPDs. The current study aimed to identify profiles of dependency and self-criticism to examine the associations of these profiles with cumulative forms of childhood maltreatment (CM) and BPDs as well as to explore the mediating and moderating role of vulnerable person…
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
Ontology and protocol secure for SCADA
2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…
Trabajo Social en Italia: una profesión en constante desarrollo
2022
The current landscape of Social Work has certainly changed since the 1980s: the profession enjoys general recognition, an established professional status and a university career that goes as far as a doctorate. The question raised by the profession no longer refers to the search for theoretical models of reference: the current challenges refer to the professional identity of the social worker in a postmodern social and labor context (Folgheriter, 2004) and to the climate of deprivation due to the redefinition of Well-being. In addition, social workers have to reckon with the transformations of social services and the drastic cutback in planning and innovation, due to the reduction in public…
Città, diritti e pratiche di mutualismo: riflessioni a partire dalle istanze comunitarie ai tempi della pandemia
2022
During the pandemic crisis, the “community” practices of mutualism have characterized the urban space by operating in a subsidiary, if not a substitute, manner with respect to public institutions. Their actions have been political in the sense in which Hannah Arendt defined this concept. Starting from a reflection on vulnerabilities, taking a case study as the object, and dialoguing with Orsetta Giolo’s essay, The rights against the city. Urban space, subjectivity and the public sphere, published in 2021, the potential and limits of these practices will be analyzed, along with their relationship with established power, with respect to the renewed tension between rights and territoriality, w…
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall
2016
Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …
Tactics of invisibility : How people in vulnerable positions make datafied everyday life livable
2022
Various data platforms force the individual into constant presence and visibility. However, the ways in which datafied environments relate to experienced vulnerabilities in our everyday lives remain unclear. Through diaries produced by and interviews with participants from three groups who occupy presumably vulnerable positions and who currently live in Finland, we explore the ways in which people challenge expectations and prior assumptions related to forced visibility. Using the concept of tactics developed by de Certeau, we aim to understand how individuals make everyday surveillance culture livable through what we call tactics of invisibility. Based on our analysis, we identify three k…
E-health systems in digital environments
2019
As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures
2022
Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…