counter measures
Recently Published Documents


TOTAL DOCUMENTS

654
(FIVE YEARS 182)

H-INDEX

22
(FIVE YEARS 4)

Author(s):  
Eid Rehman ◽  
Muhammad Haseeb-ud-Din ◽  
Arif Jamal Malik ◽  
Tehmina Karmat Khan ◽  
Aaqif Afzaal Abbasi ◽  
...  

2022 ◽  
pp. 121-136
Author(s):  
Duane Nickull

Social media networks have the capability to allow the spread of both factual information and disinformation amongst general populations at a pace unforeseen at any previous time in history. Those who are responsible for continuing to protect democratic principles can benefit from studying, understanding, and adapting to counteract this unheralded spread of data. Developing tactics and strategies to counter the antics of those who propagate disinformation to further their own causes will become necessary to protect the integrity of elections and other national and international interests. This chapter explores and reveals some of the general threats and potential counter measures to keep general populations protected from the negative effects of such campaigns.


2021 ◽  
Vol 107 (7) ◽  
pp. 5-17
Author(s):  
Aleksei Drynochkin ◽  
◽  
Lyubov Shishelina ◽  

In the article, the authors, pointing out the main challenges faced by the Central European countries in the last two years, analyze the measures taken by the governments of the Visegrad countries ‒ individually and jointly ‒ in an effort to overcome the negative consequences of crisis situations and to give a new impetus to the development of societies in social, political and economic spheres. The pandemic of 2020/2021 in a certain sense can be considered as a milestone measuring the effectiveness of political and economic systems established over three decades in these countries. The authors have chosen for this publication only some, but decisive measures, such as internal political stabilization, social, as well as economic devices to help the population in a pandemic. Analyzing the main “alarming points” of Central European countries, the authors come to the conclusion that the democratic parliamentary system established in these countries over the years of reforms, based on a network of non-governmental organizations, plays a significant positive role in overcoming them; the manifestation of independence in taking decisions affecting the interests of the nation despite delays or counter-measures of Brussels; taking into account the peculiarities of national and regional development in other areas.


Author(s):  
Spriha Pandey* ◽  
Ashawani Kumar

Cognitive radio has proved to be an efficient and promising technology for the future of wireless networks. Its major and fundamental aim is to utilize the spectrum bands which are not efficiently exercised. These bands can be accessed using Opportunistic Spectrum Access (OSA), by a secondary user only when primary user is not transmitting over the channel. Cognitive radio manages spectrum through its cognitive radio cycle, which performs a set of management functions such as, spectrum sensing, spectrum assignment, spectrum sharing and spectrum mobility/handoff. During this cycle, at several stages, cognitive radio is very much vulnerable to security attacks. This is also due to the exposed nature of cognitive radio architecture. One such security attack which has not been much explored and can cause serious security issues is Cognitive User Emulation Attack (CUEA). This attack is expected to occur at the time of spectrum handoff. In this article the reason of occurrence of CUEA is explained along with counter measures to prevent this threat in the network by implementing trust mechanism using fuzzy logic. The proposed system is simulated and analyzed using MATLAB tool.


2021 ◽  
Vol 8 (2) ◽  
Author(s):  
Abdullah Almoqbil ◽  
Brian O'Connor ◽  
Richard Anderson ◽  
Jibril Shittu ◽  
Patrick McLeod

Information manipulation for deception continues to evolve at a remarkable rate. Artificial intelligence has greatly reduced the burden of combing through documents for evidence of manipulation; but it has also enabled the development of clever modes of deception. In this study, we modeled deception attacks by examining phishing emails that successfully evaded detection by the Microsoft 365 filtering system. The sample population selected for this study was the University of North Texas students, faculty, staff, alumni and retirees who maintain their university email accounts. The model explains why certain individuals and organizations are selected as targets, and identifies potential counter measures and counter attacks. Over a one-year period, 432 phishing emails with different features, characters, length, context and semantics successfully passed through Microsoft Office 365 filtering system. The targeted population ranged from 18 years old up to those of retirement age; ranged across educational levels from undergraduate through doctoral levels; and ranged across races. The unstructured data was preprocessed by filtering out duplicates to avoid overemphasizing a single attack. The term frequency-inverse document frequency (TF-IDF) and distribution of words over documents (topic modeling) were analyzed. Results show that staff and students were the main target audience, and the phishing email volume spiked in the summer and holiday season. The TF-IDF analysis showed that the phishing emails could be categorized under six categories: reward, urgency, job, entertainment, fear, and curiosity. Analysis showed that attackers use information gap theory to bait email recipients to open phishing emails with no subject line or very attractive subject line in about thirty percent of cases. Ambiguity remains the main stimulus used by phishing attackers, while the reinforcements used to misinform the targets range from positive reinforcements (prize, reward) to negative reinforcements (blackmail, potential consequences).


Author(s):  
Hina Mahmood ◽  
Murtaza Zaidi ◽  
Tayyaba Saleem ◽  
Muhammad Farhan Khan

Aim: Musculoskeletal disorders have significantly been related to poor ergonomics practice during clinics. There is limited data regarding the prevalence and reasons for work-related musculoskeletal disorders in young dentists. This study was conducted to find out the prevalence of musculoskeletal disorders in young dentists, identification of the perceived reasons for musculoskeletal disorders, and measures taken to manage them. Study Design: Cross-sectional observational study. Methods: A cross-sectional study was conducted on 408 house officers from ten dental institutes of twin cities and Karachi, Pakistan. The subjects were inquired through a validated questionnaire about the presence of muscular pain, affected body regions, frequency, intensity, nature of onset, aggravating factors, and average duration of the pain episodes. They were also asked about measures taken to counter musculoskeletal pain and their effectiveness. Results: The overall prevalence of musculoskeletal disorders was n=231(56.6%) with n=172(39.2%) of participants reporting it to be work-related with a higher percentage of females n=138/172 (80.2%) The most affected body regions were the back n=101/172 (58.7%), shoulders n=91/172 (52.9%) and neck n=80/172(46.5%). Improper posture n=108(62.8%) followed by prolonged sitting n=88(51.2%) were the most common reasons perceived by the young dentists for their pain. Bed rest was adopted 93(54.1%) to alleviate pain followed by posture rectification 76(44.2%). Most n=134(77.9%) of them thought that these measures are helpful for the alleviation of pain. Conclusion: The prevalence of work-related musculoskeletal disorders among young dentists is high. The back, shoulder, and neck areas were more frequently affected. A higher percentage of females suffered from MSD as compared to males. Bed rest was the most common measure adopted to alleviate the pain. Very few of them sought professional help for their musculoskeletal disorders.


2021 ◽  
Author(s):  
Hideharu Yonebayashi ◽  
Atsushi Kobayashi ◽  
Susumu Hirano ◽  
Masami Okawara ◽  
Takao Iwata

Abstract As a part of laboratory Health, Safety and Environment (HSE) management system, the working environment control is applied to eliminate various occupational hazards for workers. This control is a continuous effort in our petroleum R&D laboratory as the working environment management system. As an element in the management system, workplace inspection has been taken into the regular HSE activity. Even traditional and well established, the workplace inspection has been continuously improved and optimized from various aspect of inspection design, inspection members selection, check list, and feedback. To make the continual improving practices more practical and effective, workplace features such as laboratory specific environment and ad-hoc research programs have been incorporated into the inspection design. All findings are summarized immediately after every inspection, and subsequently which types of risks hidden in the findings and necessary corrective actions are discussed. All of them: findings, risks, and corrective measures should be swiftly shared with all employees in the workplace. A check list format has been optimized from both aspects of easier recording by inspectors and correctly feedback to responsible personnel to take right counter measures. The paper analyses a large data of workplace inspection results in recent 10 years. The analysis reveals that hazardous sources are decreasing in recent years because of maturity of HSE culture in our laboratory. A combined cycle of inspection activity and data analysis would be useful for understanding the current status of working environment control and considering further updating plan. This paper discusses a practical example of laboratory HSE management system from both of detailed and high levels. Furthermore, a potential is discussed for a future workplace inspection using artificial intelligence and deep learning. The enterprising discussion contributes employee's traditional mindset fresh.


2021 ◽  
Vol 18 (12) ◽  
pp. iii-vi
Author(s):  
Yingchang Liang ◽  
Yue Gao ◽  
Liang Xiao ◽  
Yulong Zou ◽  
Guoru Ding

2021 ◽  
Author(s):  
Indra Kumar Sahu ◽  
Manisha J Nene

Paradigm shift towards cloud computing offers plethora of advantages both for cloud users and Cloud Service Provider (CSP). For cloud users, it offers saving of cost, scaling of resources, pay per use, elastic and on-demand services. On the other hand, it offers centralized resource management and provisioning of operations, safety and security for CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components and software) over the internet, Infrastructure-as-a-Service (IaaS) serves as fundamental layer for all other delivery models. Along with benefits of IaaS, there exists several security and privacy issues and threats to confidentiality, integrity, authentication, access control and availability. In this paper, detailed study of IaaS components, associated security and privacy issues are explored and counter measures for the same are determined. Furthermore, as a result of the study, Model for IaaS Security and Privacy (MISP) is proposed. The model presents a cubical structure and adds more features than the existing models to enhance the security and privacy of data and operations and guide security assessment for safer adoption by enterprises.


Sign in / Sign up

Export Citation Format

Share Document