Search results for "vulnerabilities"

showing 10 items of 12 documents

Childhood maltreatment, personality vulnerability profiles, and borderline personality disorder symptoms in adolescents.

2021

AbstractAdverse childhood experiences are significant risk factors in the development of adolescent borderline personality disorder symptoms (BPDs). Theorists have posited that two personality vulnerabilities factors, self-criticism and dependency, may inform our understanding of this relationship. However, no research has examined the associations between early negative experiences, personality vulnerabilities, and adolescent BPDs. The current study aimed to identify profiles of dependency and self-criticism to examine the associations of these profiles with cumulative forms of childhood maltreatment (CM) and BPDs as well as to explore the mediating and moderating role of vulnerable person…

050103 clinical psychologyMediation (statistics)Vulnerable personalityAdolescentPersonality Inventorymedia_common.quotation_subjectVulnerabilityPersonality DisordersSettore M-PSI/04 - Psicologia Dello Sviluppo E Psicologia Dell'Educazione03 medical and health sciencesborderline personality disorder cumulative childhood maltreatment dependency personality vulnerabilities self-criticism0302 clinical medicineBorderline Personality DisorderSettore M-PSI/08 - Psicologia ClinicaDevelopmental and Educational PsychologymedicinePersonalityHumans0501 psychology and cognitive sciencesSignificant riskChild AbuseAdverse Childhood ExperiencesChildBorderline personality disordermedia_common05 social sciencesmedicine.disease030227 psychiatryPsychiatry and Mental healthPsychologyClinical psychologyPersonalityDevelopment and psychopathology
researchProduct

Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems

2022

In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed

sulautettu tietotekniikkacybersecurityprotocolsasejärjestelmätilmailucyber-physical systemsfirmwaretakaisinmallinnusvideo surveillanceesineiden internetCCTVkyberturvallisuushaavoittuvuusvulnerabilitieswireless pyrotechnicsremote firing systemsexploitsvalvontajärjestelmätreverse engineeringZigbeeprotokollatcritical infrastructureaviationRFinfrastruktuuritbinareADS-B
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Trabajo Social en Italia: una profesión en constante desarrollo

2022

The current landscape of Social Work has certainly changed since the 1980s: the profession enjoys general recognition, an established professional status and a university career that goes as far as a doctorate. The question raised by the profession no longer refers to the search for theoretical models of reference: the current challenges refer to the professional identity of the social worker in a postmodern social and labor context (Folgheriter, 2004) and to the climate of deprivation due to the redefinition of Well-being. In addition, social workers have to reckon with the transformations of social services and the drastic cutback in planning and innovation, due to the reduction in public…

Trabajo social vulnerabilidades desarrollo profesionalSettore SPS/07 - Sociologia GeneraleSocial work vulnerabilities professional development
researchProduct

Città, diritti e pratiche di mutualismo: riflessioni a partire dalle istanze comunitarie ai tempi della pandemia

2022

During the pandemic crisis, the “community” practices of mutualism have characterized the urban space by operating in a subsidiary, if not a substitute, manner with respect to public institutions. Their actions have been political in the sense in which Hannah Arendt defined this concept. Starting from a reflection on vulnerabilities, taking a case study as the object, and dialoguing with Orsetta Giolo’s essay, The rights against the city. Urban space, subjectivity and the public sphere, published in 2021, the potential and limits of these practices will be analyzed, along with their relationship with established power, with respect to the renewed tension between rights and territoriality, w…

Settore IUS/20 - Filosofia Del DirittoPractices of mutualism rights for/against the city Hannah Arendt vulnerabilities
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct

Tactics of invisibility : How people in vulnerable positions make datafied everyday life livable

2022

Various data platforms force the individual into constant presence and visibility. However, the ways in which datafied environments relate to experienced vulnerabilities in our everyday lives remain unclear. Through diaries produced by and interviews with participants from three groups who occupy presumably vulnerable positions and who currently live in Finland, we explore the ways in which people challenge expectations and prior assumptions related to forced visibility. Using the concept of tactics developed by de Certeau, we aim to understand how individuals make everyday surveillance culture livable through what we call tactics of invisibility. Based on our analysis, we identify three k…

6131 Theatre dance music other performing artsvulnerabilitiesSociology and Political ScienceCommunicationtacticssurveillancenäkymättömyysinvisibilitytarkkailudata platformshaavoittuvuustaktiikka
researchProduct

E-health systems in digital environments

2019

As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…

vulnerabilitiescyber threathealthcare systemsterveysalaetäpalvelutcyber-attackstelemedicineteleterveydenhuoltokyberturvallisuusdigitalisaatioverkkohyökkäyksethaavoittuvuus
researchProduct

Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures

2022

Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…

vulnerabilitiesATCcybersecurity1090MHzlentoliikenneAerospace Engineeringcountermeasuresavionics978MHzdatalinkATMpentestingaviationexperimental platformElectrical and Electronic EngineeringUATlennonjohtoEFBkyberturvallisuusverkkohyökkäyksetlennonvarmistusADS-B1090ESIEEE Transactions on Aerospace and Electronic Systems
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct