Spelling suggestions: "subject:"countermeasures"" "subject:"eountermeasures""
21 |
Návrh zavedení bezpečnostních opatření pro danou společnost / Proposal for the introduction of security measures for the companyKrídla, Matúš January 2021 (has links)
This diploma thesis deals with the design and implementation of security measures within a selected company. The aim of the work is to create a proposal for measures against possible security threats. The first chapter deals with a general introduction to the issue, describes and defines the concepts from a theoretical point of view. The second part deals with the description of the current state and analysis of selected areas of the company. At the end of this work, we focus on raising awareness of security threats and proposing measures that contribute to increasing the security of information.
|
22 |
Legalita jednostranných protiopatření v mezinárodním právu / The Legality of Unilateral Countermeasures in International LawVelechovský, David January 2021 (has links)
The Legality of Unilateral Countermeasures in International Law Abstract The aim of this thesis is to examine the legality of unilateral countermeasures in international law. The term refers to measures adopted by a State in response to a wrongful act committed by another State in order to induce the wrongdoing State to comply with its obligations of cessation and / or reparation. Given the decentralized character of contemporary international law, countermeasures represent the effective mechanism of enforcement equally available (at least formally) to all States to seek the restoration of the legal relationship with the responsible State. Nevertheless, like other forms of self-help, countermeasures are liable to abuse, which is only aggravated by the controversial history of reprisals and factual inequalities between States. For this reason, countermeasures are lawful only if certain conditions are met. These conditions, nowadays codified in Draft Articles on Responsibility of States for Internationally Wrongful Acts, are the main subject of interest of this thesis, which is divided into four chapters. Chapter One deals with the concept of State responsibility and the enforcement of international law. Chapter Two is concerned with the role of countermeasures in international law, the International Law...
|
23 |
Aplikace principu náležité péče v kybernetickém prostoru / The Application of the Due Diligence Principle in CyberspaceBotek, Adam January 2020 (has links)
The due diligence principle is a well-established general principle of international law. The adequacy of its use proved in many special regimes of international law, especially in international environmental law. Cyberspace is another regime where the application of the due diligence principle is desirable. An adequate application of the due diligence principle might mitigate the problem of attribution of cyber operations and help in denying safe havens of non-state actors, who conduct malicious operations in cyberspace. The adequacy of the application of the due diligence principle in cyberspace is further indicated by the results of discussions in international fora and by the emerging trend of support of the application in official declarations of States on the application of international law in cyberspace. The thesis further suggests how the due diligence principle should be applied by introducing three elements that trigger the due diligence obligation and three possible adjustments to them. It also identifies the essence of some controversial aspects of the application of the due diligence principle and introduces cyber- specific considerations for the determination of breaches of the due diligence obligation and evaluation of lawfulness of responses to the breach, which consist of acts of retorsion...
|
24 |
Causes and Countermeasures for Nappe Oscillation: An Experimental ApproachAnderson, Aaron Allan 01 May 2014 (has links)
Weirs are commonly used as spillways to release flows from a reservoir. The free-falling jet on the downstream side of the weir is called the nappe. Under certain hydraulic conditions, determined mainly by the size, design, and construction of the weir, nappe oscillation, otherwise known as nappe vibration, can occur. Characteristics of this dynamic behavior include excessive acoustic energy manifested as sound pressure waves and lowfrequency noise accompanied by horizontal waves or banding on the nappe. Mitigation of this process may be required, especially if the weir operates in close proximity to occupied structures. Instability of water jets moving through air has been a topic of study for over a century, although studies specific to curvilinear weir nappe flow are less common. The objective of this research is to further the understanding related to the mechanisms that cause nappe vibration, document the occurrence conditions, and investigate mitigation techniques.
Research was conducted at the Utah Water Research Laboratory (UWRL) using three physical models: A 6 ft wide x 3.5 ft tall weir with a quarter round crest (model #1)
A 15.4 ft wide x 11 ft tall weir with a broad crest (model #2)
A 16 ft wide x 12 ft tall weir with a quarter round crest (model #3)
Testing included confined and unconfined nappe conditions (open air cavity behind the nappe vs. closed air cavity) for model #1 and model #3. Vibration frequencies were recorded and analyzed using an accelerometer and microphone. Comparisons were made between the three models of different scale. Testing included modifications to the weir crest and the weir apron to study the effect on the behavior of the nappe.
The results of this study are presented, including a review of previous literature and theories. The mechanisms that sustain and amplify the nappe vibration phenomenon varied at the different size-scales, while evidence exists that the root cause of initial instability leading to self-induced vibration can be traced to the same source. The results of this study should be of practical use to engineers, researchers, and those concerned with dam safety.
|
25 |
Hot Spot Identification and Analysis MethodologyFarnsworth, Jacob S. 20 November 2013 (has links) (PDF)
The Utah Department of Transportation (UDOT) Traffic and Safety Division continues to advance the safety of roadway sections throughout the state. To aid UDOT in meeting their goal the Department of Civil and Environmental Engineering at Brigham Young University (BYU) has worked with the Statistics Department in developing analysis tools for safety. The most recent of these tools has been the development of a hierarchical Bayesian Poisson Mixture Model (PMM) statistical model of traffic crashes and safety on UDOT roadways statewide and the integration of the results of this model in a Geographic Information System (GIS) framework. This research focuses on the enhancement of the framework for highway safety mitigation in Utah with its six primary steps: 1) network screening, 2) diagnosis, 3) countermeasure selection, 4) economic appraisal, 5) project prioritization, and 6) effectiveness evaluation. The framework was enhanced by developing a methodology for accomplishing the steps of network screening, diagnosis, and countermeasure selection. This methodology is titled, "Hot Spot Identification and Analysis." The hot spot identification and analysis methodology consists of the following seven steps: 1) identify problematic segments with safety concern, 2) identify problem spots within the segments, 3) micro analysis of problematic segments and spots, 4) defining the segment, 5) defining the problem, 6) evaluation of possible countermeasures, and 7) selection and recommendation of feasible countermeasures. The methodology is to help in the identification of hot spots with safety concerns so that they can be analyzed and countermeasures can be identified to mitigate the safety issues. Examples of how the methodology is to function are given with specific examples from Utah's state roadway network.
|
26 |
Hardware Fault Attack Detection Methods for Secure Embedded SystemsDeshpande, Chinmay Ravindra 15 February 2018 (has links)
In our daily life, we are increasingly putting our trust in embedded software applications, which run on a range of processor-based embedded systems from smartcards to pay-TV units. This trend expands the threat model of embedded applications from software into hardware. Over the last 20 years, fault attacks have emerged as an important class of hardware attacks against embedded software security. In fault attacks, an adversary breaks the security by injecting well chosen, targeted faults during the execution of embedded software, and systematically analyzing softwares fault response.
In this work, we propose cycle-accurate and fully digital techniques that can efficiently detect different types of fault attacks. The detection methods are low-cost regarding the area and power consumption and can be easily implemented using the standard cell based VLSI design flow. In addition to the architecture of the detectors, we present a detailed analysis of the design considerations that affect the cost and accuracy of the detectors. The functionality of the detectors is validated by implementing on ASIC and FPGA platforms (Spartan-6, Cyclone IV). Additionally, the proposed detection methods have demonstrated to successfully detect all of the injected faults without any false alarm. / Master of Science / Embedded systems nowadays play a very crucial role in day to day life. They are always gathering sensitive and private data of the users. So they become an attractive target for the attackers to steal this important data. As a result, the security of these devices has become a grave concern.
Fault attacks are a class of hardware attacks where the attacker injects faults into the system while it is executing a known program and observes the reaction. The abnormal reactions of the system are later analyzed to obtain the valuable data. Several mechanisms to detect such attacks exist in the literature, but they are not very effective. In this work, we first analyze the effect of different types of fault attacks on the embedded processor. Then we propose various low-cost digital techniques that can efficiently detect these attacks.
|
27 |
On the Resistance of RSA Countermeasures at Algorithmic, Arithmetic and Hardware Levels Against Chosen-Message, Correlation and Single-Execution Side-Channel Attacks / Sur la résistance de contre-mesures RSA aux niveaux algorithmique, l'arithmétique et de matériel contre les attaques par canaux cachées par message choisi, de corrélation et de simple exécutionPerin, Guilherme 28 May 2014 (has links)
De nos jours, les concepteurs de dispositifs cryptographiques doivent non seulement mettre en œuvre des algorithmes robustes, mais ils doivent également s'assurer qu'il n'y ait pas de fuites d'informations à travers plusieurs canaux latéraux lors de l'exécution d'un algorithme. En effet, si ce n'est pas le cas, les implémentations cryptographiques, tant symétriques qu'asymétriques, seront vulnérables aux attaques par canaux auxiliaires. Pour les algorithmes à clé publique tels que le RSA, l'opération principale que doit être rendue robuste est l'exponentiation modulaire sur un anneau fini. Les principales solutions (contremesures) permettant de rendre robuste l'exponentiation modulaire à ces attaques par canaux auxiliaires sont basées sur la randomisation des données traitées. La randomisation de l'exposant et celle des messages sont en effet des techniques particulièrement efficaces pour contrecarrer les attaques par collision et par analyse des corrélations verticales. Toutefois, ces solutions éculées montrent leurs limites par rapport aux attaques dites horizontales qui n'exploitent qu'une exponentiation. Dans ce contexte, ce document relate le travail de conception, tant matériel que logiciel, d'un chiffreur RSA basé sur les systèmes modulaires de représentation des nombres (RNS). Ce chiffreur incorpore différentes contremesures définies à divers niveaux d'abstraction. L'évaluation de sa robustesse aux attaques par canaux cachés tant horizontales que verticales a démontré sa pertinence. / Not only designers of cryptographic devices have to implement the algorithmsefficiently, they also have to ensure that sensible information that leaks throughseveral side-channels (time, temperature, power consumption, electromagneticemanations, etc.) during the execution of an algorithm, remains unexploitedby an attacker. If not sufficiently protected, both symmetric and asymmetriccryptographic implementations are vulnerable to these so-called side-channelattacks (SCA). For public-key algorithms such as RSA, the main operation to bearmoured consists of a multi-digit exponentiation over a finite ring.Countermeasures to defeat most of side-channel attacks onexponentiations are based on randomization of processed data. The exponentand the message blinding are particular techniques to thwartsimple, collisions, differential and correlation analyses. Attacks based ona single (trace) execution of exponentiations, like horizontal correlationanalysis and profiled template attacks, have shown to be efficient againstmost of popular countermeasures.This work proposes a hardware and software implementations of RSA based on Residue Number System (RNS). Different countermeasures are implemented on different abstraction levels. Then, chosen-message and correlation attacks, based on both multi-trace and single-trace attacks are applied to evaluate the robustness of adopted countermeasures. Finally, we propose an improved single-execution attack based on unsupervised learning and multi-resolution analysis using the wavelet transform.
|
28 |
A comprehensive investigation of retrodirective cross-eye jammingDu Plessis, W.P. (Warren Paul) 12 June 2010 (has links)
Cross-eye jamming is an Electronic Attack (EA) technique that induces an angular error in the radar being jammed. The main benefit of cross-eye jamming is that it is effective against monopulse tracking radars, which are largely immune to other forms of jamming. The objective of this research is to gain a complete understanding of cross-eye jamming so that systems that might be developed in future can be properly specied. The main contribution of this work is a comprehensive mathematical and experimental study of retrodirective cross-eye jamming. The mathematical analysis considers all aspects of an isolated, single-loop, retrodirective cross-eye jamming engagement, thereby avoiding the approximations inherent in other cross-eye jamming analyses. Laboratory experiments that accurately represent reality by using the radar for both transmission and reception, and simulating a true retrodirective cross-eye jammer were performed to validate the theoretical analysis. Lastly, the relationship between the angular error induced in the radar being jammed and the matching required from a cross-eye jammer system is explored. The most important conclusion of this work is that the traditional analyses of cross- eye jamming are inaccurate for the conditions under which cross-eye jammers operate. These inaccuracies mean that the traditional analyses are overly conservative, particularly at short ranges and for high cross-eye gains, suggesting that practical cross-eye jammers can be realised more easily than is generally believed. / Thesis (PhD)--University of Pretoria, 2010. / Electrical, Electronic and Computer Engineering / unrestricted
|
29 |
The single public service and local government turnaround strategy: incompatible or complimentary for improved local government service delivery?Kroukamp, H. January 2011 (has links)
Published Article / The South African public service has unfortunately rapidly gained a reputation for inefficiency, corruption and incompetence. Government has therefore introduced a variety of legislative measures to ensure that the public service would play a meaningful role in a well-functioning country, one that maximises its development potential and the welfare of its citizens. Examples of these measures are the Single Public Service (SPS) and the Local Government Turnaround Strategy (LGTAS), two seemingly contradictory measures to accomplish the above-mentioned objectives. Concerns that a SPS was a move towards recentralisation by central government were countered by the LGTAS to strengthen local government per se. It was found that both projects endeavour facilitative measures for improved coordination and integration of services in local government to provide efficient and effective services.
|
30 |
Analyse des émissions électromagnétiques des circuits intégrés / Electromagnetic emissions analysis of integrated circuitsOrdas, Thomas 18 January 2010 (has links)
Dans le domaine de la sécurisation des circuits intégrés, tel que les cartes à puce, les concepteurs de circuits sont contraints à innover, inlassablement, afin de trouver de nouvelles parades aux nouvelles attaques, notamment par canaux cachés. En effet, ces attaques, comme l'analyse des émissions électromagnétiques, permettent d'extraire des informations, contenues à l'intérieur des circuits, sensées être secrètes. Partant de ce constat, dans cette thèse, nous nous sommes focalisés sur l'étude et l'analyse électromagnétique et ce afin de quantifier les possibilités de ces attaques. Ce manuscrit est organisé de la manière qui suit. Dans un premier temps, une plateforme de mesures des émissions électromagnétiques temporelles, que nous avons développées, est présentée, ainsi que des résultats qui ont été obtenus, avec celle-ci, sur différents circuits. A partir de ces résultats, une synthèse des possibilités, relatives à la menace sécuritaire que constituent les analyses électromagnétiques est proposée ainsi que, des propositions de solutions, visant à réduire le rayonnement électromagnétique des circuits intégrés. Dans un second temps, nous nous sommes intéressés aux méthodes de simulation de ces émissions électromagnétiques. Un état de l'art, des outils de simulation existants aujourd'hui, nous a permis de mettre en évidence qu'aucun d'eux ne permet d'avoir une résolution suffisamment fine en termes d'émissions électromagnétiques. Afin de combler ce manque, un flot de simulation a été développé. Pour valider ce flot, une comparaison entre les résultats de mesure et les résultats de simulation a été effectuée. / In the area of secure integrated circuits, such as smart cards, circuit designers are always looking to innovate to find new countermeasures against attacks by the various side channels that exist today. Indeed, side channels attacks such as the analysis of electromagnetic emissions permit to extract secret information contained in circuits. Based on this observation, in this thesis, we focused on the study of electromagnetic analysis to observe the analysis possibilities. This manuscript is organized as follows. Initially, we presented a measurement system for electromagnetic emissions in time domain, and the results obtained on different circuits. From these results, a summary of opportunities, relating to the security threat, posed by electromagnetic analysis, is proposed as well as solutions proposals to reduce electromagnetic radiations of integrated circuits. In a second step, we are interested in the simulation of electromagnetic emissions. A state of the art of simulation tools which exist today, has allowed us to demonstrate that none of them allowed to have a fine enough resolution in terms of electromagnetic emissions. To fill this gap, a simulation tool has been developed and to validate this flow, a comparison between measurement results and simulation results was performed.
|
Page generated in 0.0755 seconds