Academic literature on the topic 'Insider attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Insider attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Insider attack"

1

Nasraddin, Jehan Turki, Eynas Hassan Balkhair, and Dr Manar Salamh. "Detection of Malicious Privileged Access Using a RuleBased Approach." International Journal of Engineering Research and Applications 14, no. 10 (2024): 63–72. http://dx.doi.org/10.9790/9622-14106372.

Full text
Abstract:
Privilege insiders are harder to detect by organizations. An organization's systems are subjected to threats that will affect missions, assets, and individuals of the organization. Many organizations affected by threats over a year. This paper modeled the path of actors that aims to publish and share sensitive data of the company such as files to unauthorized users by insider attack by using State Transition Diagram and developed detection of the modeled insider attack paths using the rule-based approach. There are seventy-seven attack steps that can be taken to achieve goals of publishing and sharing sensitive company files which are done by an insider attack. After deep studying of the attacks steps, the designed diagram has layered the attack steps based on analysis and aggregated them to five groups. This paper also uses offline analysis, which use the log file after the attack occurred, publish process is not affected in offline analysis. Rules and pseudocode are explained in detail.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Shehari, Taher, and Rakan A. Alsowail. "An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques." Entropy 23, no. 10 (2021): 1258. http://dx.doi.org/10.3390/e23101258.

Full text
Abstract:
Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and public organizations, as an insider attack can cause extensive damage to organization assets much more than external attacks. Most existing approaches in the field of insider threat focused on detecting general insider attack scenarios. However, insider attacks can be carried out in different ways, and the most dangerous one is a data leakage attack that can be executed by a malicious insider before his/her leaving an organization. This paper proposes a machine learning-based model for detecting such serious insider threat incidents. The proposed model addresses the possible bias of detection results that can occur due to an inappropriate encoding process by employing the feature scaling and one-hot encoding techniques. Furthermore, the imbalance issue of the utilized dataset is also addressed utilizing the synthetic minority oversampling technique (SMOTE). Well known machine learning algorithms are employed to detect the most accurate classifier that can detect data leakage events executed by malicious insiders during the sensitive period before they leave an organization. We provide a proof of concept for our model by applying it on CMU-CERT Insider Threat Dataset and comparing its performance with the ground truth. The experimental results show that our model detects insider data leakage events with an AUC-ROC value of 0.99, outperforming the existing approaches that are validated on the same dataset. The proposed model provides effective methods to address possible bias and class imbalance issues for the aim of devising an effective insider data leakage detection system.
APA, Harvard, Vancouver, ISO, and other styles
3

Henge, Santosh Kumar, Aditya Upadhyay, Ashok Kumar Saini, Neha Mishra, Dimpal Sharma, and Gajanand Sharma. "Analysis and detection of insider attacks using behaviour rule based architecture in enterprise multitenancy." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 707–18. http://dx.doi.org/10.47974/jdmsc-1743.

Full text
Abstract:
The enterprise level data security and privacy are one of the focal key challenges to the pr enterprise and security companies to prevent private data from outside and inside attacks. The insider threats and attacks can pretense a real defense risk to the various internal multi-tenants of various enterprises and companies. The data thievery by insiders of the companies is as a great deal the consequence of enterprises failing to execute the scheme and expertise to member of staff supervise activities and administrate the authenticated data-access to data as it the authentic spiteful activities of member of staff looking for economic benefits in multi-tenancy environment. This research composed with three major objectives: Description of insider attack causes with their impact factors; Implications of behavior rule-based architecture in enterprise multitenancy; Integration of behavior rules with prevention thresholds to control user accessibility for prevention of insider attacks and threats; This paper has described the efficient security scenario to avoid insider attaching complexities. This research is more helping the cyber security experts and network administrators to reduce the insider attacks by building the efficient monitoring intelligent system. The experimental scenarios built with125 authenticated, 29 non-authenticated internal users, and 62 authenticated, 18 non-authenticated external users of single enterprise level and avoided insider attacks and threats.
APA, Harvard, Vancouver, ISO, and other styles
4

Glancy, Fletcher, David P. Biros, Nan Liang, and Andy Luse. "Classification of malicious insiders and the association of the forms of attacks." Journal of Criminal Psychology 10, no. 3 (2020): 233–47. http://dx.doi.org/10.1108/jcp-03-2020-0012.

Full text
Abstract:
Purpose The authors argue that the current studies about malicious insiders confuse the fact that malicious attacks belong to two different categories, namely, those that launch instrumental attacks and expressive attacks. The authors collect malicious insider data from publicly available sources and use text-mining techniques to analyze the association between malicious insiders’ characteristics and the different types of attack. Design/methodology/approach The authors investigated the relationship between personality characteristics and different types of malicious attacks. For the personality characteristics, the authors use the same method as Liang et al. (2016), which extracted these characteristics based on a keyword-characteristic dictionary. For different types of malicious attacks, two raters rated each case based on criteria modified from criminology research to determine the degree of expressiveness and instrumentality. Findings The results show that malicious insiders who are manipulative or seeking personal gain tend to carry out instrumental attacks. Malicious insiders who are arrogant tend to conduct expressive attacks. Research limitations/implications This study uses third party articles to identify the personality characteristics of known malicious insiders. As such, not all personality characteristics may have been reported. Data availability was an issue. Practical implications Understanding if different personality characteristics lead different types of attacks can help managers identify employees who exhibit them and mitigate an attack before it occurs. Social implications Malicious insider attacks can have devastating results on businesses and employees. Help to identify potential malicious insiders before they act, may prevent undue harm. Originality/value This study used 132 cases of none malicious insiders to examine their attack objectives. No other study that the authors know of used that many cases.
APA, Harvard, Vancouver, ISO, and other styles
5

Paul, Swagata, Sajal Saha, and Radha Tamal Goswami. "Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster." International Journal of Computer Network and Information Security 14, no. 5 (2022): 47–59. http://dx.doi.org/10.5815/ijcnis.2022.05.04.

Full text
Abstract:
Big data applications running on a big data cluster, creates a set of process on different nodes and exchange data via regular network protocols. The nodes of the cluster may receive some new type of attack or unpredictable internal attack from those applications submitted by client. As the applications are allowed to run on the cluster, it may acquire multiple node resources so that the whole cluster becomes slow or unavailable to other clients. Detection of these new types of attacks is not possible using traditional methods. The cumulative network traffic of the nodes must be analyzed to detect such attacks. This work presents an efficient testbed for internal attack generation, data set creation, and attack detection in the cluster. This work also finds the nodes under attack. A new insider attack named BUSY YARN Attack has been identified and analyzed in this work. The framework can be used to recognize similar insider attacks of type DOS where target node(s) in the cluster is unpredictable.
APA, Harvard, Vancouver, ISO, and other styles
6

Stiawan, Deris, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, and Rahmat Budiarto. "Investigating Brute Force Attack Patterns in IoT Network." Journal of Electrical and Computer Engineering 2019 (April 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/4568368.

Full text
Abstract:
Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. Experimental results validate the investigation.
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.

Full text
Abstract:
The insider threats have always been one of the most severe challenges to cybersecurity. It can lead to the destruction of the organisation’s internal network system and information leakage, which seriously threaten the confidentiality, integrity and availability of data. To make matters worse, since the attacker has authorized access to the internal network, they can launch the attack from the inside and erase their attack trace, which makes it challenging to track and forensics. A blockchain traceability system for insider threats is proposed in this paper to mitigate the issue. First, this paper constructs an insider threat model of the internal network from a different perspective: insider attack forensics and prevent insider attacker from escaping. Then, we analyze why it is difficult to track attackers and obtain evidence when an insider threat has occurred. After that, the blockchain traceability system is designed in terms of data structure, transaction structure, block structure, consensus algorithm, data storage algorithm, and query algorithm, while using differential privacy to protect user privacy. We deployed this blockchain traceability system and conducted experiments, and the results show that it can achieve the goal of mitigating insider threats.
APA, Harvard, Vancouver, ISO, and other styles
8

Dusane, Palash Sandip. "Logic Bomb: An Insider Attack." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (2020): 3662–65. http://dx.doi.org/10.30534/ijatcse/2020/176932020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

., Sonika, Sandeep Kumar Arora, and Mahedi Masud. "Review on Security Based Vehicular Ad-Hoc Network." International Journal of Engineering & Technology 7, no. 3.8 (2018): 125. http://dx.doi.org/10.14419/ijet.v7i3.8.16846.

Full text
Abstract:
VANET a vehicular ad-hoc network provides the security to vehicles. To provide security in VANET, we are using Elliptical curve cryptography. In this paper we are going to discuss various techniques of cryptography, the techniques such are Advanced Encryption Standard, Data Encryption Standard, and Triple Data Encryption Standard. These techniques are part of symmetric and asymmetric cryptography. In addition to this there are some attacks which we are discussing in this paper like, masquerade attack, replay attack, insider attack, mutual authentication attack, and parallel session attack. These attacks are on different layer. At the end we are comparing these attacks with each other and compare their quality of services.
APA, Harvard, Vancouver, ISO, and other styles
10

Chowdhury, Morshed, Biplob Ray, Sujan Chowdhury, and Sutharshan Rajasegarar. "A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things." ACM Transactions on Internet of Things 2, no. 4 (2021): 1–23. http://dx.doi.org/10.1145/3466721.

Full text
Abstract:
Due to the widespread functional benefits, such as supporting internet connectivity, having high visibility and enabling easy connectivity between sensors, the Internet of Things (IoT) has become popular and used in many applications, such as for smart city, smart health, smart home, and smart vehicle realizations. These IoT-based systems contribute to both daily life and business, including sensitive and emergency situations. In general, the devices or sensors used in the IoT have very limited computational power, storage capacity, and communication capabilities, but they help to collect a large amount of data as well as maintain communication with the other devices in the network. Since most of the IoT devices have no physical security, and often are open to everyone via radio communication and via the internet, they are highly vulnerable to existing and emerging novel security attacks. Further, the IoT devices are usually integrated with the corporate networks; in this case, the impact of attacks will be much more significant than operating in isolation. Due to the constraints of the IoT devices, and the nature of their operation, existing security mechanisms are less effective for countering the attacks that are specific to the IoT-based systems. This article presents a new insider attack, named loophole attack , that exploits the vulnerabilities present in a widely used IPv6 routing protocol in IoT-based systems, called RPL (Routing over Low Power and Lossy Networks). To protect the IoT system from this insider attack, a machine learning based security mechanism is presented. The proposed attack has been implemented using a Contiki IoT operating system that runs on the Cooja simulator, and the impacts of the attack are analyzed. Evaluation on the collected network traffic data demonstrates that the machine learning based approaches, along with the proposed features, help to accurately detect the insider attack from the network traffic data.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Insider attack"

1

Nsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.

Full text
Abstract:
This study was carried out with the intention of examining the defensive mechanism employed against the latest cyber espionage methods including both insider and outsider attacks. The main focus of this study was on web servers as the targets of the cyber attacks. Information in connection to the study was obtained from researchers’ online articles. A survey was also conducted at MidSweden University in order to obtain information about the latest cyber attacks on web servers and about the existing defensive mechanism against such attacks. The existing defensive mechanism was surveyed and a simple design was created to assist in the investigation of the efficiency of the system. Some simple implementations of the existing defensive mechanism were made in order to provide some practical results that were used for the study. The existing defensive mechanism was surveyed and improved upon where possible. The improved defensive mechanism was designed and implemented and its results were compared with the results from the existing defensive mechanism. Due to the fact that the majority of the attackers use defensive mechanisms’ vulnerability in order to find their way into devices such as web servers, it was felt that, even with the most sophisticated improved defensive mechanism in place, it would not be entirely correct to claim that it is possible to fully protect web servers against such attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Doss, Gary. "An Approach to Effectively Identify Insider Attacks within an Organization." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/138.

Full text
Abstract:
The purpose of this research is to identify the factors that influence organizational insiders to violate information security policies. There are numerous accounts of successful malicious activities conducted by employees and internal users of organizations. Researchers and organizations have begun looking at methods to reduce or mitigate the insider threat problem. Few proposed methods and models to identify, deter, and prevent the insider threat are based on empirical data. Additionally, few studies have focused on the targets or goals of the insider with organizational control as a foundation. From a target perspective, an organization might be able to control the outcome of a malicious insider threat attack. This research applied a criminology lens as an organization policy violation is, or resembles, a criminal activity. This research uses the Routine Activities Theory (RAT) as a guide to develop a theoretical model. The adoption of RAT was for its focus on the target and the protective controls, while still taking into account the motivated offender. The study identified the components of the model concerning insider threats, espionage, and illicit behavior related to information systems through literature. This led to the development of 10 hypotheses regarding the relationships of key factors that influence malicious insider activity. Data was collected using a scenario-based survey, which allowed for impartial responses from a third-person perspective. This technique has become popular in the field of criminology, as the effects of social desirability, acceptance, or repudiation will not be a concern. A pilot test verified the survey's ability to collect the appropriate data. The research employed Structural Equation Modeling (SEM) and Confirmatory Factor Analysis (CFA) techniques to analyze and evaluate the data. SEM and CFA techniques identified the fit of the model and the factors that influence information security policy violations. The result of the analysis provided criteria to accept the hypotheses and to identify key factors that influence insider Information System policy violations. This research identified the relationships and the level of influence between each factor.
APA, Harvard, Vancouver, ISO, and other styles
3

Usmani, Wali Ahmed. "Not able to resist the urge : social insider attacks on Facebook." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/60294.

Full text
Abstract:
Facebook accounts are secured against unauthorized access through passwords, and through device-level security. Those defenses, however, may not be sufficient to prevent social insider attacks, where attackers know their victims, and gain access to their accounts using the victim's device. To characterize these attacks, we ran two Amazon Mechanical Turk studies geographically restricting participant pool to US only. Our major goal was to establish social insider attack prevalence and characteristics to justify a call to action for better protective and preventative countermeasures against it. In the first study involving 1308 participants, we used the list experiment, a quantitative method to estimate that 24% of participants had perpetrated social insider attacks, and that 21% had been victims to it (and knew about it). In the second, qualitative study with 45 participants, we collected stories detailing personal experiences with such attacks. Using thematic analysis, we typified attacks around 5 motivations (fun, curiosity, jealousy, animosity and utility), and explored dimensions associated with each type. Our combined findings indicate a number of trends in social insider attacks. We found that they are common, they can be perpetrated by almost all social relations and often have serious emotional consequences. Effective mitigation would require a variety of approaches as well as better user awareness. Based on the results of our experiments, we propose methodological steps to study the perception of severity of social insider attacks. In this procedure, we include an experimental design of the study and its possible limitations. The study consists of presenting stories collected in the previously mentioned second study to a new cohort of participants. It the asks them to provide a Likert Scale rating and justification for how severe they perceive the attack in the story to be if they were the victim as well as how likely they feel they might be a victim to such an attack. Lastly, we discuss possible future work in creating countermeasures to social insider attacks, their viability and limitations. We conclude that no single technique is complete solution. Instead mitigation will require a number of techniques in combination to be effective.<br>Science, Faculty of<br>Computer Science, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
4

Aditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.

Full text
Abstract:
In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. Information security is a major challenge in such systems. From the customer’s perspective, one of the big risks in adopting big data systems is in trusting the service provider who designs and owns the infrastructure, with data security and privacy. However, big data frameworks typically focus on performance and the opportunity for including enhanced security measures is limited. In this dissertation, the problem of mitigating insider attacks is extensively investigated and several static and dynamic run-time techniques are developed. The proposed techniques are targeted at big data systems but applicable to any data system in general. First, a framework is developed to host the proposed security techniques and integrate with the underlying distributed computing environment. We endorse the idea of deploying this framework on special purpose hardware and a basic model of the software architecture for such security coprocessors is presented. Then, a set of compile-time and run-time techniques are proposed to protect user data from the perpetrators. These techniques target detection of insider attacks that exploit data and infrastructure. The compile-time intrusion detection techniques analyze the control flow by disassembling program binaries while the run-time techniques analyze the memory access patterns of processes running on the system. The proposed techniques have been implemented as prototypes and extensively tested using big data applications. Experiments were conducted on big data frameworks such as Hadoop and Spark using cloud-based services. Experimental results indicate that the proposed techniques successfully detect insider attacks in the context of data loss, data degradation, data exposure and infrastructure degradation.
APA, Harvard, Vancouver, ISO, and other styles
5

JUNG, SANG SHIN. "Attacking and Securing Beacon-Enabled 802.15.4 Networks." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/cs_theses/74.

Full text
Abstract:
The IEEE 802.15.4 has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS scheme’s security still leave the 802.15.4 MAC vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 either focus on non beacon-enabled 802.15.4 or cannot defend against insider attacks for beacon-enabled 802.15.4. In this thesis, we illustrate this by demonstrating attacks on the availability and integrity of the beacon-enabled 802.15.4. To proof the attacks, we implement the attacks using Tmote Sky motes for a malicious node along with regular nodes. We show that the malicious node can freely exploit the beacon frames to compromise the integrity and availability of the network. For the defense, we present beacon-enabled MiniSec (BCN-MiniSec) and analyze its cost.
APA, Harvard, Vancouver, ISO, and other styles
6

Kambhampaty, Krishna Kanth. "Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices." Diss., North Dakota State University, 2019. https://hdl.handle.net/10365/29914.

Full text
Abstract:
There are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. Provision of platform to users is as much important as its security. In this dissertation we propose a security approach that captures user behavior for identifying malicious activities. System users exhibit certain behavioral patterns while utilizing the resources. User behaviors such as device location, accessing certain files in a server, using a designated or specific user account etc. If this behavior is captured and compared with normal users? behavior, anomalies can be detected. In our model, we have identified malicious users and have assigned trust value to each user accessing the system. When a user accesses new files on the servers that have not been previously accessed, accessing multiple accounts from the same device etc., these users are considered suspicious. If this behavior continues, they are categorized as ingenuine. A trust value is assigned to users. This value determines the trustworthiness of a user. Genuine users get higher trust value and ingenuine users get a lower trust value. The range of trust value varies from zero to one, with one being the highest trustworthiness and zero being the lowest. In our model, we have sixteen different features to track user behavior. These features evaluate users? activities. From the time users? log in to the system till they log out, users are monitored based on these sixteen features. These features determine whether the user is malicious. For instance, features such as accessing too many accounts, using proxy servers, too many incorrect logins attribute to suspicious activity. Higher the number of these features, more suspicious is the user. More such additional features contribute to lower trust value. Identifying malicious users could prevent and/or mitigate the attacks. This will enable in taking timely action against these users from performing any unauthorized or illegal actions. This could prevent insider and masquerade attacks. This application could be utilized in mobile, cloud and pervasive computing platforms.
APA, Harvard, Vancouver, ISO, and other styles
7

Radhouani, Amira. "Méthodes formelles pour l'extraction d'attaques internes des Systèmes d'Information." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM025/document.

Full text
Abstract:
La sécurité des Systèmes d’Information (SI) constitue un défi majeur car elle conditionne amplement la future exploitation d’un SI. C’est pourquoi l’étude des vulnérabilités d’un SI dès les phases conceptuelles est cruciale. Il s’agit d’étudier la validation de politiques de sécurité, souvent exprimées par des règles de contrôle d’accès, et d’effectuer des vérifications automatisées sur des modèles afin de garantir une certaine confiance dans le SI avant son opérationnalisation. Notre intérêt porte plus particulièrement sur la détection des vulnérabilités pouvant être exploitées par des utilisateurs internes afin de commettre des attaques, appelées attaques internes, en profitant de leur accès légitime au système. Pour ce faire, nous exploitons des spécifications formelles B générées, par la plateforme B4MSecure, à partir de modèles fonctionnels UML et d’une description Secure UML des règles de contrôle d’accès basées sur les rôles. Ces vulnérabilités étant dues à l’évolution dynamique de l’état fonctionnel du système, nous proposons d’étudier l’atteignabilité des états, dits indésirables, donnant lieu à des attaques potentielles, à partir d’un état normal du système. Les techniques proposées constituent une alternative aux techniques de model-checking. En effet, elles mettent en œuvre une recherche symbolique vers l’arrière fondée sur des approches complémentaires : la preuve et la résolution de contraintes. Ce processus de recherche est entièrement automatisé grâce à notre outil GenISIS qui a montré, sur la base d’études de cas disponibles dans la littérature, sa capacité à retrouver des attaques déjà publiées mais aussi des attaques nouvelles<br>The early detection of potential threats during the modelling phase of a Secure Information System (IS) is required because it favours the design of a robust access control policy and the prevention of malicious behaviours during the system execution. This involves studying the validation of access control rules and performing vulnerabilities automated checks before the IS operationalization. We are particularly interested in detecting vulnerabilities that can be exploited by internal trusted users to commit attacks, called insider attacks, by taking advantage of their legitimate access to the system. To do so, we use formal B specifications which are generated by the B4MSecure platform from UML functional models and a SecureUML modelling of role-based access control rules. Since these vulnerabilities are due to the dynamic evolution of the functional state, we propose to study the reachability of someundesirable states starting from a normal state of the system. The proposed techniques are an alternative to model-checking techniques. Indeed, they implement symbolic backward search algorithm based on complementary approaches: proof and constraint solving. This rich technical background allowed the development of the GenISIS tool which automates our approach and which was successfully experimented on several case studies available in the literature. These experiments showed its capability to extract already published attacks but also new attacks
APA, Harvard, Vancouver, ISO, and other styles
8

"A Model for Calculating Damage Potential in Computer Systems." Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53889.

Full text
Abstract:
abstract: For systems having computers as a significant component, it becomes a critical task to identify the potential threats that the users of the system can present, while being both inside and outside the system. One of the most important factors that differentiate an insider from an outsider is the fact that the insider being a part of the system, owns privileges that enable him/her access to the resources and processes of the system through valid capabilities. An insider with malicious intent can potentially be more damaging compared to outsiders. The above differences help to understand the notion and scope of an insider. The significant loss to organizations due to the failure to detect and mitigate the insider threat has resulted in an increased interest in insider threat detection. The well-studied effective techniques proposed for defending against attacks by outsiders have not been proven successful against insider attacks. Although a number of security policies and models to deal with the insider threat have been developed, the approach taken by most organizations is the use of audit logs after the attack has taken place. Such approaches are inspired by academic research proposals to address the problem by tracking activities of the insider in the system. Although tracking and logging are important, it is argued that they are not sufficient. Thus, the necessity to predict the potential damage of an insider is considered to help build a stronger evaluation and mitigation strategy for the insider attack. In this thesis, the question that seeks to be answered is the following: `Considering the relationships that exist between the insiders and their role, their access to the resources and the resource set, what is the potential damage that an insider can cause?' A general system model is introduced that can capture general insider attacks including those documented by Computer Emergency Response Team (CERT) for the Software Engineering Institute (SEI). Further, initial formulations of the damage potential for leakage and availability in the model is introduced. The model usefulness is shown by expressing 14 of actual attacks in the model and show how for each case the attack could have been mitigated.<br>Dissertation/Thesis<br>Masters Thesis Computer Science 2019
APA, Harvard, Vancouver, ISO, and other styles
9

Wong, Angela S. L. "Multimedia transaction tracking from a mutual distrust perspective." 2007. http://hdl.handle.net/2440/49549.

Full text
Abstract:
In this thesis, we present a novel, elegant and simple method for secure transaction authentication and non-repudiation for trading multimedia content. Multimedia content can be video, images, text documents, music, or any form of digital signal, however here we will focus particular on still images with application to video. We will provide proof that not only can receiving parties within a transaction be untrustworthy, but the owner, or members within an owning party, also cannot be trusted. Known as the insider attack, this attack is particularly prevalent in multimedia transactions. Thus the focus of the thesis is on the prevention of piracy, with particular emphasis on the case where the owner of a document is assumed to be capable of deceit, placing the system under the assumption of mutual distrust. We will introduce a concept called staining, which will be used to achieve authentication and non-repudiation. Staining is composed of two key components: (1) public-key cryptography; and (2) steganographic watermarking. The idea is to watermark a multimedia document after encryption, thereby introducing a stain on the watermark. This stain is due to the non-commutative nature of the scheme, so that decryption will be imperfect, leaving a residue of the cryptographic process upon the watermark. Essentially, secrets from the owner (the watermark) and the receiver (the cryptographic key) are entangled rather than shared, as in most schemes. We then demonstrate our method using image content and will test several different common cryptographic systems with a spread-spectrum type watermark. Watermarking and cryptography are not usually combined in such a manner, due to several issues such as the rigid nature of cryptography. Contrary to the expectation that there will be severe distortions caused to the original document, we show that such an entanglement is possible without destroying the document under protection. We will then attack the most promising combination of systems by introducing geometric distortions such as rotation and cropping, as well as compressing the marked document, to demonstrate that such a method is robust to typical attacks.<br>http://proxy.library.adelaide.edu.au/login?url= http://library.adelaide.edu.au/cgi-bin/Pwebrecon.cgi?BBID=1297339<br>Thesis (Ph.D.) - University of Adelaide, School of Electrical and Electronic Engineering, 2007
APA, Harvard, Vancouver, ISO, and other styles
10

Krauß, Christoph. "Handling Insider Attacks in Wireless Sensor Networks." Phd thesis, 2010. https://tuprints.ulb.tu-darmstadt.de/2158/1/Dissertation_ckrauss.pdf.

Full text
Abstract:
Wireless sensor networks are a relatively new technology for information gathering and processing. A sensor network usually consists of many, resource constrained sensor nodes. These nodes perform measurements of some physical phenomena, process data, generate reports, and send these reports via multihop communication to a central information processing unit called sink. Depending on the scenario, information gathering and processing is collaboratively performed by multiple sensor nodes, e.g., to determine the average temperature in a certain area. Sensor networks can be used in a plethora of application scenarios. Emerging from military research, e.g., sensor networks for target tracking in a battlefield, sensor networks are nowadays used more and more in civil applications such as critical infrastructure monitoring. For ensuring the functionality of a sensor network, especially in malicious environments, security mechanisms are essential for all sensor networks. However, sensor networks differ from classical (wireless) networks and this consequently makes it harder to secure them. Reasons for this are resource constraints of the sensor nodes, the wireless multihop communication, and the possibility of node compromise. Since sensor nodes are often deployed in unattended or even hostile environments and are usually not equipped with tamper-resistant hardware, it is relatively easy to compromise a sensor node. By compromising a sensor node, an adversary gets access to all data stored on the node, such as cryptographic keys. Thus, deployed security mechanisms such as node-based authentication become ineffective and an adversary is able to perform attacks as a "legitimate" member of the network. Such attacks are denoted as insider attacks and pose a serious threat for wireless sensor networks. In this thesis, we develop concepts and mechanisms to cope with insider attacks in wireless sensor networks. The contribution of this thesis is twofold. First, we propose a new general classification to classify the different approaches to protect against insider attacks. Second, we propose several security protocols to protect against insider attacks. In our classification, approaches to protect against insider attacks are first distinguished by the implemented security strategy. The respective strategies are further subclassified by the applied mechanisms. Related work is integrated in the classification to systematically identify open problems and specific properties in the respective areas. The results may be a basis for future protocol design. The protocols, proposed in the second part of this thesis encompass different areas. First, we propose a protocol to protect against a serious Denial-of-Service attack where an adversary injects or replays a large amount of false messages to overload many message forwarding nodes and to (totally) waste their scarce energy resources. Proposed approaches usually apply threshold-based mechanisms to filter such messages out. The drawback of this approach is that messages are not filtered out immediately and if the threshold of compromised nodes is reached, the attack becomes again possible. Our protocol is able to immediately filter such messages while tolerating an arbitrary number of compromised sensor nodes. Further mechanisms are required to additionally protect against an insider attack where an adversary injects false reports to deceive the sink. Usually a redundancy-based approach is used where a report is only valid if it has been collaboratively generated by multiple sensor nodes. However, previously proposed protocols are susceptible to an insider attack where an adversary that has compromised only a single node might be able to impede a successful report generation. So far, only one protocol has been proposed to cope with this issue. However, it is a specific enhancement for a particular protocol and the attacking nodes cannot be identified and excluded. In this thesis, we propose two protocols which protect against the injection of false reports and also enable the detection and exclusion of nodes trying to disrupt the collaborative report generation. In addition, our protocols can be used in combination with or as an extension to any other protocol. In addition, we investigate a general approach to prevent insider attacks and to detect compromised nodes in certain scenarios. We propose to use tamper-resistant hardware in form of the Trusted Platform Module (TPM). Due to cost reasons, the TPM is integrated only in some special sensor nodes that perform some special tasks such as key management, localization or time synchronization in the sensor network. These nodes are a valuable target for an adversary. To detect tampering attempts on these nodes, we propose two efficient attestation protocols. In contrast to attestation protocols proposed for "classical" networks, our protocols have a low communication and computational overhead. They do not require expensive public key operations on the verifying nodes and the few exchanged messages are very short. In addition, compared to software-based attestation, our protocols have the advantage to enable attestation along multiple hops which is of high concern in sensor networks. Using our approach, it is possible to verify the trustworthiness of certain sensor nodes even in unattended or hostile environments making them suitable to perform special tasks.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Insider attack"

1

Stolfo, Salvatore J., Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, and Sara Sinclair, eds. Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Workshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Qing, and Lin Huang. Inside Radio: An Attack and Defense Guide. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8447-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schatzki, Nick. Inside 9/11. National Geographic, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Group, Express, ed. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Group, Express, ed. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Storad, Conrad J. Inside AIDS: HIV attacks the immune system. Lerner Publications Co., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brancik, Kenneth C. Insider computer fraud: An indepth framework for detecting and defending against insider it attacks. Auerbach Publications, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Group, Express. Inside 26/11. Express Group, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

M, Goldstein Donald, and Dillon Katherine V, eds. The Pearl Harbor papers: Inside the Japanese plans. Brasseyʼs (US), 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Insider attack"

1

Haber, Morey J., and Brad Hibbert. "Insider Threats." In Privileged Attack Vectors. Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3048-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haber, Morey J. "Insider and External Threats." In Privileged Attack Vectors. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5914-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chowdhury, Morshed U., Robin Doss, Biplob Ray, Sutharshan Rajasegarar, and Sujan Chowdhury. "IoT Insider Attack - Survey." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49610-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McCormick, Michael. "Data Theft: A Prototypical Insider Threat." In Insider Attack and Cyber Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-77322-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ibrahim, Amjad, Simon Rehwald, Antoine Scemama, Florian Andres, and Alexander Pretschner. "Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks." In Graphical Models for Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62230-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Tong, Sha Ma, Yi Mu, and Shengke Zeng. "ID-Based Encryption with Equality Test Against Insider Attack." In Information Security and Privacy. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60055-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rajamanickam, Siranjeevi, N. Ramasubramanian, and Satyanarayana Vollala. "Insider Attack Prevention using Multifactor Authentication Protocols - A Survey." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2008-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lode, Vijaya, Kekhelo Lasushe, and Anil Pinapati. "Security in VANETs with Insider Attack Resistance and Signature Aggregation." In Advances in Data-Driven Computing and Intelligent Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9521-9_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cui, Xiaohui, Wade Gasior, Justin Beaver, and Jim Treadwell. "ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention." In Computational Science and Its Applications – ICCSA 2012. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31128-4_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kammüller, Florian, Jason R. C. Nurse, and Christian W. Probst. "Attack Tree Analysis for Insider Threats on the IoT Using Isabelle." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39381-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Insider attack"

1

Bardhan, Shuvo. "A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ." In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2024. http://dx.doi.org/10.1109/compsac61105.2024.00190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amri, Jamel, Egil Gulbrandsen, and Ricardo P. Nogueira. "Effect of Acetic Acid on Propagation and Stifling of Localized Attacks in CO2 Corrosion of Carbon Steel." In CORROSION 2009. NACE International, 2009. https://doi.org/10.5006/c2009-09284.

Full text
Abstract:
Abstract The presence of acetic acid (HAc) has been identified as one factor that may contribute to enhance localized top-of-line corrosion attacks in gas condensate pipelines. The role of HAc on the growth of localized attacks in CO2 corrosion of carbon steel pipelines was studied by means of a pre-initiated localized attack electrode assembly (“artificial pit electrode”). The current flowing between the localized attack and the outer surface was measured with a zero resistance ammeter. It is shown that the corrosion potential increases with increasing HAc concentration. Depletion of HAc inside the attack imposed a potential difference that triggered the propagation of the attack at room temperature. The attack did not propagate in absence of HAc. The growth of the attack was self-sustained only to a certain depth, beyond which the dissolution current at the bottom of the attack vanished. This is in good agreement with field observations in the case of top-of-line corrosion phenomena.
APA, Harvard, Vancouver, ISO, and other styles
3

Tenopir, T. J., and B. B. Bavarian. "Localized Corrosion of Carbon and Low Alloy Steels in the Marine Environment." In CORROSION 1988. NACE International, 1988. https://doi.org/10.5006/c1988-88396.

Full text
Abstract:
Abstract The Mk 26 Guided Missile Launching System (GMLS), specifically in the guide arm assemblies, possesses design deficiencies which harbor and promote specific forms of corrosive attack. This paper is focused on corrosion of guide arm assembly hydraulic access cover areas. Energy dispersive spectroscopy analysis was conducted on Mk 26 GMLS corrosion products. 1008, 1018, ASTM A514 Grade B and ASTM A514 Grade E steel specimens were subjected to potentiodynamic, potentiostatic, crevice, atmospheric, and immersion tests in Port Hueneme, CA sea water. No passive films formed on any of these steels when immersed. Pitting occurred at manganese sulfide inclusions and localized areas of corrosion product film breakdown/defects. This form of attack was prevalent in early stages of corrosion, but pit growth soon became effectively reduced or severely retarded, giving way to intergranular attack. Intergranular attack was most severe in plain carbon steels and areas where dissolved oxygen (i.e., bulk electrolyte) was readily available. In plain carbon steels, lamella ferrite in pearlite grains was preferentially attacked. Pitting was predominant and the most aggressive form of attack in tight crevices for all steels tested. Under atmospheric conditions, pitting and intergranular attack occurred where sea water condensed and evaporated in plain carbon steels. Uniform corrosion also occurred in ASTM A514 steels. For ASTM A514 steels, morphology of many pits under atmospheric conditions differed from that of other tests. Under atmospheric conditions, several pits possessed a wide zone of uniform attack at their periphery. In addition, there were abrupt, distinct changes of diameter inside many pits. Pits formed under totally immersed conditions were sharply defined in all steels tested. Numerous pits in ASTM A514 Grade E steel where dissolved oxygen (i.e., bulk electrolyte) was readily available formed distinct cathodically protected peripheral zones which were eventually attacked.
APA, Harvard, Vancouver, ISO, and other styles
4

Tossey, Brett M., John Shingledecker, and Barbara (Nikki) Padgett. "Technical Root Cause Analysis of Localized Corrosion in Wet Flue Gas Desulfurization Slurry at Coal-Fired Power Stations." In CORROSION 2014. NACE International, 2014. https://doi.org/10.5006/c2014-4442.

Full text
Abstract:
Abstract Recent experience with stainless steels in wet flue gas desulfurization service has shown rapid localized attack. This paper discusses a brief historical perspective on the material performance in wet flue gas desulfurization (WFGD) and the findings of a technical root cause analysis (TRCA). Observations of attacked WFGD absorbers shows pitting and crevice corrosion near welds in the immersion zone and inside spray headers. All of the absorbers that were the subject of the TRCA were forced-oxidation limestone absorbers. Vertical spray towers and jet bubbling reactors were inspected and discussed.
APA, Harvard, Vancouver, ISO, and other styles
5

Zewdie, Marshet, Anteneh Girma, and Tilahun Melak Sitote. "Deep Neural Networks for Detecting Insider Threats and Social Engineering Attacks." In 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2024. http://dx.doi.org/10.1109/icecet61485.2024.10698519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sivanagireddy, K., S. Jagadeesh, K. Suresh Kumar, B. A. Chandrika, M. Kranthi Kumar, and P. Rajalingam. "Detecting and Mitigating Insider Threat Attacks in Cloud using Machine Learning." In 2024 IEEE 6th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA). IEEE, 2024. https://doi.org/10.1109/icccmla63077.2024.10871803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Jinwoo, Xinyu He, and Young Moon. "Insider Attack Scenario Assessment Framework." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-69907.

Full text
Abstract:
Abstract Cyber Manufacturing Systems (CMS) brings improvements to the manufacturing system and offers an information-transparent environment. Although CMS’s enhanced system brings many advantages to its manufacturing process, it is at a higher risk of security breach ironically due to its accessibility and connectivity. Therefore, implementing CMS without adequate security measures will make the system vulnerable to intruders including insiders. To identify insider threats, a risk assessment-based framework has been explored by many researchers in the information security community. however, less work has been done to analyze CMS’s vulnerabilities. Therefore, an Insider Attack Scenario Assessment Framework (IASAF) is proposed in this paper. IASAF is developed to detect the system’s security vulnerabilities and evaluate the insider attack scenarios by using five domains including: actor, preparation, implementation, consequence, and recovery. To validate and demonstrate the effectiveness of the framework, a testbed was used to study a case.
APA, Harvard, Vancouver, ISO, and other styles
8

Varsha Suresh, P., and Minu Lalitha Madhavu. "Insider Attack: Internal Cyber Attack Detection Using Machine Learning." In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9579549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhifeng Luo and Chen Liang. "An insider attack on shilling attack detection for recommendation systems." In 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2016. http://dx.doi.org/10.1109/icsess.2016.7883066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Armstrong, Colin. "Mapping Social Media Insider Threat Attack Vectors." In 2013 46th Hawaii International Conference on System Sciences (HICSS). IEEE, 2013. http://dx.doi.org/10.1109/hicss.2013.392.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Insider attack"

1

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Full text
Abstract:
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review focuses on malicious threats to civilian aviation. It, therefore, excludes weather events or accidents. The first section lists major malicious threats to civilian aviation since 1975. It includes both actual and planned events (e.g. hijackings that were prevented) that are recorded in open-source documents. Each threat is listed alongside information on its cause (e.g. terrorism, state actions, crime), the context in which it occurred (broader factors shaping the risk including geography, regime type, technology), and its impact (on passengers, policy, security, economic). The second section discusses some of the trends in threats to aviation. Motives for malicious threats include terrorism, crime, asylum-seeking, and insider attacks by aggrieved or mentally ill airline staff. Hijacking has been the most common form of threat, although bombing or suicide attacks have killed more people. Threats may also take the form of accidental attacks on civilian planes misidentified as threats in conflict zones. Experts suggest that growing threats are cyberattacks and the use of unmanned aerial vehicles, although neither has yet caused a major incident.
APA, Harvard, Vancouver, ISO, and other styles
2

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report analyzes photographic, video, and written documentation from the incident to evaluate the timeline of the incident and to assess the fire conditions present. Computer modeling using the Fire Dynamics Simulator (FDS) was performed to provide further insight into the fire conditions and the impact of decisions and actions on the fire ground. Additionally, data from a full scale fire test of a similar fire in a similar structure was used to provide additional insight. Four FDS simulations were performed in support of the analysis. These included a simulation of the event as it unfolded and three simulations looking at the impact of alternate tactics which included: initial exterior attack prior to entry, the use of a smoke curtain to protect the building exit path, and interior only attack. FDS simulations provided insight on the heat present in the apartment during the fire and the impact of the interior and exterior suppression on conditions inside the apartment. Full scale test data of a similar fire showed similar behavior to the FDS predictions and gives credence to the FDS results. Results of the analysis suggest that injuries resulted from the length of time the interior attack team was present inside the apartment before actions were taken to reduce the severity of the fire. Six contributing factors were identified including size-up, communication and accountability, delayed exterior attack, lack of entry hall protection, the apartment layout and construction, thermal imager use, and mayday procedures and training. The last contributing factor was a positive contribution that helped avoid more serious injuries. Based on the contributing factors, five recommendations were made that include improved size-up, exterior fire control to prevent exterior spread, protection of exit pathways, basing fire ground tactics on known information, and recognizing when a change in tactics is needed.
APA, Harvard, Vancouver, ISO, and other styles
3

Chu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek, and Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1329799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kerber, Steve, and Robin Zevotek. Fire Service Summary Report: Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety. UL Firefighter Safety Research Institute, 2014. http://dx.doi.org/10.54206/102376/pxtq2256.

Full text
Abstract:
Attic fires pose many hazards for the fire service. When a fire occurs in an attic, it is common it goes unnoticed/reported until smoke or flames are visible from the outside of the structure. Because they take longer to detect, attic fires are more dangerous for firefighters and residents. In a fire situation, the attic ventilation system, which is designed to reduce moisture accumulation by drawing fresh air low from the eaves and exhausting moisture laden warm air near the peak, create an optimal fire growth and spread situation by supplying oxygen to the fire and exhausting hot gases. An estimated 10,000 residential attic fires are reported to U.S. fire departments each year and cause an estimated 30 civilian deaths, 125 civilian injuries and $477 million in property loss. The location of the attic creates several difficulties for the fire service. Firefighters must decide whether to fight the fire from inside the structure, from the outside or a combination of the two. This the decision is complicated by the constant hazard of ceiling collapse, which has the potential to rapidly deteriorate conditions in the living spaces. A piece of gypsum board may fall or be pulled from the ceiling making the relatively clear and cool conditions in the living space change very quickly endangering firefighters executing a search and rescue operation as part of their life safety mission. Further complicating the decision are the hazards associated with roof structure collapse, creating deadly conditions for firefighters operating on and under the roof. Structural collapse accounted for 180 firefighter deaths between 1979 and 2002 of which one-third occurred in residential structures . Many of these incidents involved a roof falling on firefighters or firefighters falling through the roof during firefighting operations on attic fires. The purpose of this study is to increase firefighter safety by providing the fire service with scientific knowledge on the dynamics of attic and exterior fires and the influence of coordinated fire mitigation tactics from full-scale fire testing in realistic residential structures.
APA, Harvard, Vancouver, ISO, and other styles
5

Kerber, Steve, and Robin Zevotek. Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety Released. UL Firefighter Safety Research Institute, 2014. http://dx.doi.org/10.54206/102376/lihb1439.

Full text
Abstract:
Attic fires pose many hazards for the fire service. When a fire occurs in an attic, it is common it goes unnoticed/reported until smoke or flames are visible from the outside of the structure. Because they take longer to detect, attic fires are more dangerous for firefighters and residents. In a fire situation, the attic ventilation system, which is designed to reduce moisture accumulation by drawing fresh air low from the eaves and exhausting moisture laden warm air near the peak, create an optimal fire growth and spread situation by supplying oxygen to the fire and exhausting hot gases. An estimated 10,000 residential attic fires are reported to U.S. fire departments each year and cause an estimated 30 civilian deaths, 125 civilian injuries and $477 million in property loss. The location of the attic creates several difficulties for the fire service. Firefighters must decide whether to fight the fire from inside the structure, from the outside or a combination of the two. This the decision is complicated by the constant hazard of ceiling collapse, which has the potential to rapidly deteriorate conditions in the living spaces. A piece of gypsum board may fall or be pulled from the ceiling making the relatively clear and cool conditions in the living space change very quickly endangering firefighters executing a search and rescue operation as part of their life safety mission. Further complicating the decision are the hazards associated with roof structure collapse, creating deadly conditions for firefighters operating on and under the roof. Structural collapse accounted for 180 firefighter deaths between 1979 and 2002 of which one-third occurred in residential structures . Many of these incidents involved a roof falling on firefighters or firefighters falling through the roof during firefighting operations on attic fires. The purpose of this study is to increase firefighter safety by providing the fire service with scientific knowledge on the dynamics of attic and exterior fires and the influence of coordinated fire mitigation tactics from full-scale fire testing in realistic residential structures.
APA, Harvard, Vancouver, ISO, and other styles
6

Hillestad, Torgeir Martin. The Metapsychology of Evil: Main Theoretical Perspectives Causes, Consequences and Critique. University of Stavanger, 2014. http://dx.doi.org/10.31265/usps.224.

Full text
Abstract:
The purpose of this text or dissertation is to throw some basic light on a fundamental problem concerning manhood, namely the question of evil, its main sources, dynamics and importance for human attitudes and behaviour. The perspective behind the analysis itself is that of psychology. Somebody, or many, may feel at bit nervous by the word “evil” itself. It may very well be seen as too connected to religion, myth and even superstition. Yet those who are motivated to lose oneself in the subject retain a deep interest in human destructiveness, malevolence and hate, significant themes pointing at threatening prospects for mankind. The text is organized or divided into four main ordinary chapters, the three first of them organized or divided into continuous and numbered sections. A crucial point or question is of cause how to define evil itself. It can of cause be done both intentional, instrumental and by consequence. Other theorists however have stated that the concept of evil exclusively rests on a myth originated in the Judean-Christian conception of Satan and ultimate evil. This last argument presupposes evil itself as non-existent in the real rational world. It seems however a fact that most people attach certain basic meaning to the concept, mainly that it represents ultimately bad and terrible actions and behaviour directed toward common people for the purpose of bringing upon them ultimate pain and suffer. However, there is no room for essentialism here, meaning that we simply can look “inside” some original matter to get to know what it “really” is. Rather, a phenomenon gets its identity from the constituted meaning operating within a certain human communities and contexts loaded with intentionality and inter-subjective meaning. As mentioned above, the concept of evil can be interpreted both instrumental and intentional, the first being the broadest of them. Here evil stands for behaviour and human deeds having terrifying or fatal consequences for subjects and people or in general, regardless of the intentions behind. The intentional interpretation however, links the concept to certain predispositions, characteristics and even strong motives in subjects, groups and sometimes political systems and nations. I will keep in mind and clear the way for both these perspectives for the discussion in prospect. This essay represents a psychological perspective on evil, but makes it clear that a more or less complete account of such a psychological view also should include a thorough understanding or integration of some basic social and even biological assumptions. However, I consider a social psychological position of significant importance, especially because in my opinion it represents some sort of coordination of knowledge and theoretical perspectives inherent in the subject or problem itself, the main task here being to integrate perspectives of a psychological as well as social and biological kind. Since humans are essential social creatures, the way itself to present knowledge concerning the human condition, must be social of some sort and kind, however not referring to some kind of reductionism where social models of explanation possess or holds monopoly. Social and social psychological perspectives itself represents parts of the whole matter regarding understanding and explanation of human evil. The fact that humans present, or has to represent themselves as humans among other humans, means that basically a social language is required both to explain and describe human manners and ways of being. This then truly represents its own way or, more correctly, level or standard of explanation, which makes social psychology some sort of significant, though not sufficient. More substantial, the vision itself of integrating different ontological and theoretical levels and objects of science for the purpose of manifesting or make real a full-fledged psychological perspective on evil, should be considered or characterized a meta-psychological perspective. The text is partially constructed as a review of existing theories and theorists concerning the matter of evil and logically associated themes such as violence, mass murder, genocide, antisocial behaviour in general, aggression, hate and cruelty. However, the demands of making a theoretical distinction between these themes, although connected, is stressed. Above all, an integral perspective combining different scientific disciplines is aimed at.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography