21,861 research outputs found

    Scaling Success: Lessons from Adaptation Pilots in the Rainfed Regions of India

    Get PDF
    "Scaling Success" examines how agricultural communities are adapting to the challenges posed by climate change through the lens of India's rainfed agriculture regions. Rainfed agriculture currently occupies 58 percent of India's cultivated land and accounts for up to 40 percent of its total food production. However, these regions face potential production losses of more than $200 billion USD in rice, wheat, and maize by 2050 due to the effects of climate change. Unless action is taken soon at a large scale, farmers will see sharp decreases in revenue and yields.Rainfed regions across the globe have been an important focus for the first generation of adaptation projects, but to date, few have achieved a scale that can be truly transformational. Drawing on lessons learnt from 21 case studies of rainfed agriculture interventions, the report provides guidance on how to design, fund and support adaptation projects that can achieve scale

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
    • …
    corecore