74 research outputs found

    Advanced security aspects on Industrial Control Network.

    Get PDF
    Security threats are one of the main problems of this computer-based era. All systems making use of information and communication technologies (ICT) are prone to failures and vulnerabilities that can be exploited by malicious software and agents. In the latest years, Industrial Critical Installations started to use massively network interconnections as well, and what it is worst they came in contact with the public network, i.e. with Internet. Industrial networks are responsible for process and manufacturing operations of almost every scale, and as a result the successful penetration of a control system network can be used to directly impact those processes. Consequences could potentially range from relatively benign disruptions, such as the disruption of the operation (taking a facility offline), the alteration of an operational process (changing the formula of a chemical process), all the way to deliberate acts of sabotage that are intended to cause harm. The interconnectivity of Industrial Control Systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This presents presents an innovative approach to Intrusion Detection in SCADA systems based on the concept of Critical State Analysis and State Proximity. The theoretical framework is supported by tests conducted with an Intrusion Detection System prototype implementing the proposed detection approach

    On the Relationship between International Humanitarian Law and Human Rights Law in Times of Belligerent Occupation: Not Yet a Coherent Framework

    Get PDF
    This contribution analyses the relationship between the law of belligerent occupation and its relationship with IHRL. After first illustrating the legal basis on which one can argue that a state is required to comply with IHRL in the territory it happens to occupy, the chapter explores the extent to which IHRL has impacted on the authorities, responsibilities, and duties of an occupying power as framed by the law of occupation. It further examines the implications of the law of occupation as lex specialis for the applicability of IHRL during occupation, as well as whether adherence to IHRL standards could augment the normative powers of the occupying power

    Advanced security aspects on Industrial Control Network.

    Get PDF
    Security threats are one of the main problems of this computer-based era. All systems making use of information and communication technologies (ICT) are prone to failures and vulnerabilities that can be exploited by malicious software and agents. In the latest years, Industrial Critical Installations started to use massively network interconnections as well, and what it is worst they came in contact with the public network, i.e. with Internet. Industrial networks are responsible for process and manufacturing operations of almost every scale, and as a result the successful penetration of a control system network can be used to directly impact those processes. Consequences could potentially range from relatively benign disruptions, such as the disruption of the operation (taking a facility offline), the alteration of an operational process (changing the formula of a chemical process), all the way to deliberate acts of sabotage that are intended to cause harm. The interconnectivity of Industrial Control Systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This presents presents an innovative approach to Intrusion Detection in SCADA systems based on the concept of Critical State Analysis and State Proximity. The theoretical framework is supported by tests conducted with an Intrusion Detection System prototype implementing the proposed detection approach

    Of efficiency and fairness in the administration of international justice: Can the Residual Mechanism provide adequately reasoned judgments?

    Get PDF
    This paper discusses some of the structural and procedural innovations that the Security Council introduced in the Statute of the International Residual Mechanism for Criminal Tribunals (Mechanism)[1] and reflects on how some of these developments impact on the exercise of the Mechanism\u2019s judicial function. These innovations constitute a unicum in the field of international criminal justice. At a micro-level, they bring about a shift in the modalities through which the judges of the Mechanism shall exercise the judicial function in respect of their colleagues at the ad hoc Tribunals. At a macro-level, they provide an opportunity to reflect on the kind of judicial institutions that should be devised in future in order to combat impunity in a fair and efficient manne

    Of Fragmentation and Precedents in International Criminal Law: Possible Lessons from Recent Jurisprudence on Aiding and Abetting Liability

    Get PDF
    After discussing the notion of ‘fragmentation’ and the value of using the metaphor in the context of ICL, the author turns to substantive criminal law to try and determine the correct actus reus of aiding and abetting liability in contemporary ICL, and to ask whether ‘specific direction’ has any role to play therein. He then addresses the more general problem of determining the role of coherence and consistency in the development of ICL, the function of precedents within and across international courts and tribunals, and the evolving role and function of customary international law in contemporary ICL to draw lessons for the International Criminal Court

    Uses and possible misuses of a Comparative International Law approach

    Get PDF
    Should international lawyers embrace the Comparative International Law project (CIL)? One can readily with the noble aspiration to renew international law and to deal more effectively with the challenges of our times and on the need to engagein a more constructive and effective communication among international lawyers of different origins and backgrounds. Still, the complexity and the breadth of the CIL project as both a legal and a political tool commands a more nuanced response. To this end, this paper is divided in three parts. First, it illustrates the theoretical and factual basis underlying the CIL project. Second, it provides an overview of the function(s) that comparative law currently plays in different branches of public international law and asks in what way a more robust turn to comparative law than is currently in place may enrich international law. Third, it reflects on the relationship between the CIL approach and the existing system of international law as a set of primary and secondary rules

    Advanced security aspects on Industrial Control Network.

    Get PDF
    Security threats are one of the main problems of this computer-based era. All systems making use of information and communication technologies (ICT) are prone to failures and vulnerabilities that can be exploited by malicious software and agents. In the latest years, Industrial Critical Installations started to use massively network interconnections as well, and what it is worst they came in contact with the public network, i.e. with Internet. Industrial networks are responsible for process and manufacturing operations of almost every scale, and as a result the successful penetration of a control system network can be used to directly impact those processes. Consequences could potentially range from relatively benign disruptions, such as the disruption of the operation (taking a facility offline), the alteration of an operational process (changing the formula of a chemical process), all the way to deliberate acts of sabotage that are intended to cause harm. The interconnectivity of Industrial Control Systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This presents presents an innovative approach to Intrusion Detection in SCADA systems based on the concept of Critical State Analysis and State Proximity. The theoretical framework is supported by tests conducted with an Intrusion Detection System prototype implementing the proposed detection approach

    Postoperative infections after oesophageal resections: the role of blood transfusions

    Get PDF
    BACKGROUND: Perioperative blood transfusion carries numerous potential risks concerning the transmission of infective diseases and immunodepression that can facilitate the occurrence of postoperative infectious complications. Explanation of connections between perioperative blood transfusion and postoperative septic complication worldwide is not well documented. Many studies have described a correlation between perioperative blood transfusions and postoperative infections. On the contrary, other studies indicate that factors influencing the need for blood transfusions during surgery have a greater bearing than blood transfusion per se on the occurrence of postoperative complications. PATIENTS AND METHODS: A prospective study was conducted in our Department on 110 consecutive patients undergoing oesophageal resection for primary cancer, in order to evaluate the incidence of postoperative infections related to perioperative allogenic blood transfusions. For each patient we preoperatively recorded in a computerized data-base several known risk-factors for postoperative infections; in detail we registered the administration of allogenic perioperative blood transfusions (period of administration, number of packages administered). RESULTS: Among the enrolled 110 patients, 53 (48%) received perioperative blood transfusions: in this group postoperative infections (overall infective complications) occurred in 27 patients. After a multivariate analysis we observed that perioperative blood transfusions significantly affected as an independent variable the development of wound infections (p = 0.02). CONCLUSION: Blood transfusions independently affected the incidence of wound infections in patients who underwent oesophageal resection for primary cancer

    Transcatheter Aortic Valve Implantation (TAVI) Planning with Dual-Layer Spectral CT Using Virtual Monoenergetic Image (VMI) Reconstructions and 20 mL of Contrast Media

    Get PDF
    Transcatheter aortic valve implantation (TAVI) is a less invasive alternative to surgical implantation and its implementation is progressively increasing worldwide. We routinely perform pre-procedural aortic angiography CT to assess aortic dimensions and vascular anatomy. This study aims to evaluate the image quality of CTA for TAVI planning using dual-layer spectral CT, with virtual monoenergetic image reconstructions at 40 keV. Thirty-one patients underwent a CTA protocol with the injection of 20 mL of contrast media. Image quality was assessed by measuring the mean density in Hounsfield Units (HU), the signal-to-noise ratio, and the contrast-to-noise ratio in VMI reconstructions. Additionally, a blinded subjective analysis was conducted by two observers. The results showed significant enhancement at all sampled vascular levels with a gradual decrease in HU from proximal to distal regions. Favourable subjective ratings were given for all parameters, with greater variability in the evaluation of iliac axes. A significant negative correlation (p < 0.05) was observed between BMI and CA at all vascular levels, indicating reduced contrast enhancement with increasing BMI. Spectral CT, along with reducing iodine load, allows for obtaining high-quality images without a significant increase in noise. The reduction in iodine load can have positive implications in clinical practice, improving patient safety and resource efficiency
    • …
    corecore