Exploring vulnerabilities in preparedness – rail bound traffic and terrorist attacks
نویسندگان
چکیده
منابع مشابه
Classes of Vulnerabilities and Attacks
In the first part of this chapter, popular vulnerability and attack types used in books, vulnerability disclosures and databases are reviewed. They are discussed in the context of what makes them useful, and how they fail to meet scientific criteria, without going into the exploit details. Practical efforts such as the various MITRE enumerations and lists of common security problems by other or...
متن کاملGeographic Profiling of Terrorist Attacks
Terrorism is defined by the Federal Bureau of Investigation (FBI) as “ the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives” (1). Since the terrorist attacks that occurred in the United States on September 11, 2001, attempts have been made to devel...
متن کاملPsychological interventions following terrorist attacks.
BACKGROUND Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. SOURCES OF DATA A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. AREAS OF AGREEMENT Common aspec...
متن کاملScheduler Vulnerabilities and Attacks in Cloud Computing
In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance. As in an operating system, the scheduler may be vulnerable to malicious behavio...
متن کاملVulnerabilities and Attacks in Wireless Sensor Networks
We investigate how wireless sensor networks can be attacked in practice. From this we develop a generic adversary model that allows to classify adversaries according to two dimensions of power: presence and intervention. Thus, we provide a framework for realistic security analysis in wireless sensor networks.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Transportation Security
سال: 2017
ISSN: 1938-7741,1938-775X
DOI: 10.1007/s12198-017-0178-5