79 research outputs found

    a intervenção especializada de enfermagem nos cuidados pós-reanimação

    Get PDF
    A mortalidade por paragem cardiorrespiratória súbita é um problema de saúde pública que afeta a população à escala global. Segundo dados de 2017, a incidência de paragem cardiorrespiratória fora do hospital foi de 67 a 170 casos por 100 mil habitantes (Grasner, 2021). Em Portugal, em 2020, de todas as situações de paragem cardiorrespiratória fora do hospital, apenas foram reanimadas com recuperação de sinais de circulação 616 pessoas, o que equivale a 3% do número total de casos. Destes, apenas 8% irão sobreviver e ter alta hospitalar (INEM, 2021). A intervenção especializada de enfermagem no período pós- paragem cardiorrespiratória é fundamental para influenciar de forma positiva o outcome da pessoa, pelo que é de extrema importância compreender a intervenção do enfermeiro especialista na prestação de cuidados de monitorização, vigilância e terapêutica avançados. Com o objetivo de desenvolver competências especializadas de enfermagem nos cuidados de enfermagem à pessoa vítima de paragem cardiorrespiratória recuperada, foi planeado e executado um percurso com vista à construção e solidificação de competências especializadas, recorrendo aos referenciais teóricos do Nursing as Caring e Technological Nursing as Caring. O percurso foi dividido em dois contextos clínicos, primeiro em unidade de cuidados intensivos e posteriormente em serviço de urgência e visaram sobretudo o desenvolver e a aquisição de novas competências especializadas de enfermagem no cuidado da pessoa vítima de paragem cardiorrespiratória. Através da elaboração de documentos como estudo de caso ou jornais de aprendizagem foi possível uma análise reflexiva da atividade exercida. Também a elaboração de uma revisão integrativa da literatura permitiu uma abordagem sistemática e reflexiva do tema em estudo. Como resultado deste percurso, houve um aprofundar de conhecimentos, assim como um incremento de competências especializadas de enfermagem no campo em estudo, assim como inerentemente na gestão de cuidados. O cuidado especializado de enfermagem à pessoa vítima de paragem cardiorrespiratória recuperada assenta acima da tudo na vigilância, monitorização e neuroprotecção enquanto medidas que promovem a qualidade dos cuidados e um melhor outcome para a pessoa.Mortality from sudden cardiac arrest is a public health problem that affects the population on a global scale. According to 2017 data, the incidence of cardiorespiratory arrest outside the hospital ranged from 67 to 170 cases per 100,000 inhabitants. In Portugal, in 2020, of all situations of cardiorespiratory arrest outside the hospital, only 616 people were resuscitated with return of spontaneous circulation, which is equivalent to 3% of the total number of cases. Of these, only 8% will survive and be discharged from the hospital. Specialized nursing intervention in the post-cardiac arrest period is essential to positively influence the outcome of the person, so it is extremely important to understand the role of the nurse specialist in providing advanced monitoring, surveillance and therapeutic care. With the purpose of developing specialized nursing skills in nursing care for the victim of recovered cardiorespiratory arrest, a course was planned and executed in order to build and solidify specialized skills, using the theoretical frameworks of Nursing as Caring and Technological Nursing as Caring. The course was divided into two clinical contexts, first in an intensive care unit and later in an emergency department and aimed above all at developing and acquiring new specialized nursing skills in the care for the person suffering from cardiorespiratory arrest. Through the elaboration of documents such as a case study or learning journals, a reflective analysis of the activity performed was possible. The elaboration of an integrative literature review also allowed a systematic and reflective approach to the topic under study. As a result, there was a deepening in this field of knowledge, as well as an increase in specialized nursing skills in the field under study, as well as inherently in care management. Specialized nursing care for the person who has recovered from cardiac arrest is based above all on surveillance, monitoring and neuroprotection as measures that promote the quality of care and a better outcome for the person

    On-chip system call tracing: A feasibility study and open prototype

    Get PDF
    Several tools for program tracing and introspection exist. These tools can be used to analyze potentially malicious or untrusted programs. In this setting, it is important to prevent that the target program determines whether it is being traced or not. This is typically achieved by minimizing the code of the introspection routines and any artifact or side-effect that the program can leverage. Indeed, the most recent approaches consist of lightly instrumented operating systems or thin hypervisors running directly on bare metal. Following this research trend, we investigate the feasibility of transparently tracing a Linux/ARM program without modifying the software stack, while keeping the analysis cost and flexibility compatible with state of the art emulation- or baremetal- based approaches. As for the typical program tracing task, our goal is to reconstruct the stream of system call invocations along with the respective un-marshalled arguments. We propose to leverage the availability of on-chip debugging interfaces of modern ARM systems, which are accessible via JTAG. More precisely, we developed OpenST, an open-source prototype tracer that allowed us to analyze the performance overhead and to assess the transparency with respect to evasive, real-world malicious programs. OpenST has two tracing modes: In-kernel dynamic tracing and external tracing. The in-kernel dynamic tracing mode uses the JTAG interface to \u201chot-patch\u201d the system calls at runtime, injecting introspection code. This mode is more transparent than emulator based approaches, but assumes that the traced program does not have access to the kernel memory\u2014where the introspection code is loaded. The external tracing mode removes this assumption by using the JTAG interface to manage hardware breakpoints. Our tests show that OpenST\u2019s greater transparency comes at the price of a steep performance penalty. However, with a cost model, we show that OpenST scales better than the state of the art, bare-metal-based approach, while remaining equally stealthy to evasive malware

    Security and privacy issues of physical objects in the IoT: Challenges and opportunities

    Get PDF
    In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out

    Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection

    No full text
    It is well recognized that security will play a major role in enabling most of the applications envisioned for the Internet of Things (IoT). We must also note that most of such applications will employ sensing and actuating devices integrated with the Internet communications infrastructure and, from the minute such devices start to support end-to-end communications with external (Internet) hosts, they will be exposed to all kinds of threats and attacks. With this in mind, we propose an IDS framework for the detection and prevention of attacks in the context of Internet-integrated CoAP communication environments and, in the context of this framework, we implement and experimentally evaluate the effectiveness of anomaly-based intrusion detection, with the goal of detecting Denial of Service (DoS) attacks and attacks against the 6LoWPAN and CoAP communication protocols. From the results obtained in our experimental evaluation we observe that the proposed approach may viably protect devices against the considered attacks. We are able to achieve an accuracy of 93% considering the multi-class problem, thus when the pattern of specific intrusions is known. Considering the binary class problem, which allows us to recognize compromised devices, and though a lower accuracy of 92% is observed, a recall and an F_Measure of 98% were achieved. As far as our knowledge goes, ours is the first proposal targeting the usage of anomaly detection and prevention approaches to deal with application-layer and DoS attacks in 6LoWPAN and CoAP communication environments

    Energy-Aware Security Adaptation for Low-Power IoT Applications

    No full text
    The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power and Wide-Area Networks (LPWAN) communication technologies. This applies to many critical environments, such as industrial control and healthcare, where wireless communications are yet to be broadly adopted. Two fundamental requirements to effectively support upcoming critical IoT applications are those of energy management and security. We may note that those are, in fact, contradictory goals. On the one hand, many IoT devices depend on the usage of batteries while, on the other hand, adequate security mechanisms need to be in place to protect devices and communications from threats against their stability and security. With thismotivation in mind, we propose a solution to address the management, in tandem, of security and energy in LoRaWAN IoT communication environments. We propose and evaluate an architecture in the context of which adaptation logic is used to manage security and energy dynamically, with the goal of guaranteeing appropriate security, while promoting the lifetime of constrained sensing devices. The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy. Security and energy are managed in line with the requirements of the application at hand, the characteristics of the constrained sensing devices employed and the detection, as well as the threat, of particular types of attacks

    Energy-Aware Security Adaptation for Low-Power IoT Applications

    No full text
    The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power and Wide-Area Networks (LPWAN) communication technologies. This applies to many critical environments, such as industrial control and healthcare, where wireless communications are yet to be broadly adopted. Two fundamental requirements to effectively support upcoming critical IoT applications are those of energy management and security. We may note that those are, in fact, contradictory goals. On the one hand, many IoT devices depend on the usage of batteries while, on the other hand, adequate security mechanisms need to be in place to protect devices and communications from threats against their stability and security. With thismotivation in mind, we propose a solution to address the management, in tandem, of security and energy in LoRaWAN IoT communication environments. We propose and evaluate an architecture in the context of which adaptation logic is used to manage security and energy dynamically, with the goal of guaranteeing appropriate security, while promoting the lifetime of constrained sensing devices. The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy. Security and energy are managed in line with the requirements of the application at hand, the characteristics of the constrained sensing devices employed and the detection, as well as the threat, of particular types of attacks
    corecore