1. Trang chủ
  2. » Thể loại khác

Threats to Biodiversity

12 39 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 12
Dung lượng 2,27 MB

Nội dung

Contents Overview 1 Lesson: Introduction to Security Threats 2 Lesson: Predicting Threats to Security 8 Lab A: Identifying Threats to Network Security 15 Module 3: Identifying Threats to Network Security Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.  2002 Microsoft Corporation. All rights reserved. Microsoft, MS-DOS, Windows, Windows NT, Active Directory, ActiveX, BizTalk, PowerPoint, Visio, and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Module 3: Identifying Threats to Network Security iii Instructor Notes This module teaches students how to identify possible threats to a network and understand common motivations of attackers. The module introduces threat modeling as an effective way to predict where threats may occur in an organization. After completing this module, students will be able to:  Explain common network vulnerabilities and how attackers can exploit them.  Predict threats to security by using the STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) threat model. To teach this module, you need Microsoft ® PowerPoint ® file 2830A_03.ppt. It is recommended that you use PowerPoint version 2002 or later to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides may not be displayed correctly. To prepare for this module:  Read all of the materials for this module.  Complete the practices.  Complete the lab and practice discussing the answers.  Read the additional reading for this module, located under Additional Reading on the Web page on the Student Materials CD.  Visit the Web links that are referenced in the module. Presentation: 45 minutes Lab: 45 minutes Required materials Important Preparation tasks iv Module 3: Identifying Threats to Network Security How to Teach This Module This section contains information that will help you to teach this module. Lesson: Introduction to Security Threats Mention that these are simply a few of the more common types of attacks, but there are many types of attacks that can threaten a network. If students ask about security patches, tell them that these topics are covered in Module 6, “Creating a Threats to Biodiversity Threats to Biodiversity Bởi: OpenStaxCollege The core threat to biodiversity on the planet, and therefore a threat to human welfare, is the combination of human population growth and resource exploitation The human population requires resources to survive and grow, and those resources are being removed unsustainably from the environment The three greatest proximate threats to biodiversity are habitat loss, overharvesting, and introduction of exotic species The first two of these are a direct result of human population growth and resource use The third results from increased mobility and trade A fourth major cause of extinction, anthropogenic climate change, has not yet had a large impact, but it is predicted to become significant during this century Global climate change is also a consequence of human population needs for energy and the use of fossil fuels to meet those needs ([link]) Environmental issues, such as toxic pollution, have specific targeted effects on species, but they are not generally seen as threats at the magnitude of the others Atmospheric carbon dioxide levels fluctuate in a cyclical manner However, the burning of fossil fuels in recent history has caused a dramatic increase in the levels of carbon dioxide in the Earth’s atmosphere, which have now reached levels never before seen in human history Scientists predict that the addition of this “greenhouse gas” to the atmosphere is resulting in climate change that will significantly impact biodiversity in the coming century 1/12 Threats to Biodiversity Habitat Loss Humans rely on technology to modify their environment and replace certain functions that were once performed by the natural ecosystem Other species cannot this Elimination of their ecosystem—whether it is a forest, a desert, a grassland, a freshwater estuarine, or a marine environment—will kill the individuals in the species Remove the entire habitat within the range of a species and, unless they are one of the few species that well in human-built environments, the species will become extinct Human destruction of habitats accelerated in the latter half of the twentieth century Consider the exceptional biodiversity of Sumatra: it is home to one species of orangutan, a species of critically endangered elephant, and the Sumatran tiger, but half of Sumatra’s forest is now gone The neighboring island of Borneo, home to the other species of orangutan, has lost a similar area of forest Forest loss continues in protected areas of Borneo The orangutan in Borneo is listed as endangered by the International Union for Conservation of Nature (IUCN), but it is simply the most visible of thousands of species that will not survive the disappearance of the forests of Borneo The forests are removed for timber and to plant palm oil plantations ([link]) Palm oil is used in many products including food products, cosmetics, and biodiesel in Europe A five-year estimate of global forest cover loss for the years 2000–2005 was 3.1 percent In the humid tropics where forest loss is primarily from timber extraction, 272,000 km2 was lost out of a global total of 11,564,000 km2 (or 2.4 percent) In the tropics, these losses certainly also represent the extinction of species because of high levels of endemism 2/12 Threats to Biodiversity (a) One species of orangutan, Pongo pygmaeus, is found only in the rainforests of Borneo, and the other species of orangutan (Pongo abelii) is found only in the rainforests of Sumatra These animals are examples of the exceptional biodiversity of (c) the islands of Sumatra and Borneo Other species include the (b) Sumatran tiger (Panthera tigris sumatrae) and the (d) Sumatran elephant (Elephas maximus sumatranus), both critically endangered species Rainforest habitat is being removed to make way for (e) oil palm plantations such as this one in Borneo’s Sabah Province (credit a: modification of work by Thorsten Bachner; credit b: modification of work by Dick Mudde; credit c: modification of work by U.S CIA World Factbook; credit d: modification of work by “Nonprofit Organizations”/Flickr; credit e: modification of work by Dr Lian Pin Koh) Everyday Connection Preventing Habitat Destruction with Wise Wood ChoicesMost consumers not imagine that the home improvement products they buy might be contributing to habitat loss and species extinctions Yet the market for illegally harvested tropical timber is 3/12 Threats to Biodiversity huge, and the wood products often find themselves in building supply stores in the United States One estimate is that 10 percent of the imported timber stream in the United States, which is the world’s largest consumer of wood products, is potentially illegally logged In 2006, this amounted to $3.6 billion in wood products Most of the illegal products are imported from countries that act as intermediaries and are not the originators of the wood How is it possible to determine if a wood product, such as flooring, was harvested sustainably ...Security Threats to Business, the Digital Lifestyle, and the Cloud Trend Micro Predictions for 2013 and Beyond In 2013, managing the security of devices, small business systems, and large enterprise networks will be more complex than ever before. Users are breaking down the PC monoculture by embracing a wider variety of platforms, each with its own user interface, OS, and security model. Businesses, meanwhile, are grappling with protecting intellectual property and business information as they tackle consumerization, virtualization, and cloud platforms head-on. This divergence in computing experience will further expand opportunities for cybercriminals and other threat actors to gain profit, steal information, and sabotage their targets’ operations. Our 2013 forecasts: 1 The volume of malicious and high-risk Android apps will hit 1 million in 2013. 2 Windows 8 offers improved security—but only to consumers. 3 Cybercriminals will heavily abuse legitimate cloud services. 4 As digital technology plays a larger role in our lives, security threats will appear in unexpected places. 5 Consumers will use multiple computing platforms and devices. Securing these will be complex and difficult. 6 Politically motivated electronic-based attacks will become more destructive. 7 Cloud storage or not, data breaches will remain a threat in 2013. 8 Efforts to address global cybercrime will take two or more years to reach full implementation. 9 Conventional malware threats will only gradually evolve, with few, if any, new threats. Attacks will become more sophisticated in terms of deployment. 10 Africa will become a new safe harbor for cybercriminals. 1 The volume of malicious and high-risk Android apps will hit 1 million in 2013. The number of malicious and high-risk Android apps, expected to reach at least 350,000 by the end of 2012, will increase threefold in 2013, broadly in line with predicted growth of the OS itself. In terms of market share, Android may be on its way to dominating the mobile space the same way that Windows dominated the desktop/laptop arena. Malicious and high-risk Android apps are becoming more sophisticated. An “arms race” between Android attackers and security providers is likely to occur in the coming year, much as one occurred a decade or more ago over Microsoft Windows. Google has made improvements to the Android platform’s security. App scanning in the form of Bouncer was first introduced in February and integrated into devices with the use of the latest Android version—Jelly Bean (Android 4.2)—later in the year. The improved permissions dialog box for newly installed apps made the permissions being requested more explicit. However, these steps will not lessen the appeal of the platform to cybercriminals and thieves. 2 Windows 8 offers improved security—but only to consumers. Windows 8 offers several key security improvements over previous versions of the OS. The most significant of these are invisible to users yet provide tangible benefits. Secure Boot and Early Launch Anti-Malware (ELAM) do not need user input to improve security. The new OS also includes Windows® Defender, which provides a certain degree of baseline antivirus protection right out of the box. Windows 8 includes support for Windows Store apps, which are different from traditional desktop applications. Windows Store apps are designed to act more like mobile apps, which are sandboxed by default and need Microsoft approval prior to TRAFFICKING AND LABOUR REPORTS HIGHLIGHT THREATS TO CHILDREN’S FUTURES By J ill Moss Last week the American State Department released its 2004 Trafficking in Persons Report. This rates efforts by 140 countries to fight slavery. Information comes from American Embassies, human right groups and non-governmental organizations. The report divides the countries into three groups. The first two are countries believed to be working hard against trafficking or trying to improve. But the third group is nations believed to be making little or no effort. They could lose some American assistance or face other restrictions. Ten nations are in this group. Burma, North Korea, Cuba and Sudan were also listed last year. This year the State Department added Bangladesh, Equatorial Guinea and Sierra Leone. It also added Venezuela, Guyana and Ecuador. Forty-two nations are on a special “watch list” of countries at risk of being given the lowest rating. One of them is Japan. The report says Japan could do much more to protect thousands of victims of sexual slavery linked to organized crime groups. Japan says it will do more. Children taken from traffickers intercepted by police are housed at the Terre Des Hommes shelter in Cotonou, Benin. Worldwide, the report estimates that each year as many as eight hundred thousand people are taken across national borders for trafficking. It also notes that some groups place the number far higher. Most victims are women and girls forced into sexual slavery. Men are often forced into labour. Boys generally become child soldiers. Secretary of State Colin Powell says some countries have improved over the past year, including Turkey. It moved up from the lowest group to the watch list. Mister Powell said president Bush has promised fifty-million dollars more to fight international trafficking. This is above the seventy-million dollars budgeted for the past year. On June twelfth the International Labour Organization released a report for World Day Against Child Labour. The United Nations agency says at least ten-million children are being forced to work as house cleaners. In most cases, they earn little or no money. They are trapped. The report says that often the children are beaten or forced to have sex. Most of the victims are girls, some as young as ten. EFFORTS TO FIGHT POVERTY By Jill Moss The World Bank estimates that more than one thousand million people live in less than one dollar a day. These are the poorest of the poor, about one-sixth of the world population. Martin Ravallion works for the Development Research group at the World Bank. He says about fifty percent of the people in several African nations are among the world’s poorest. These nations include Ethiopia, Sierra Leon, Tanzania and Zambia. But even though these areas remain extremely poor, Mr. Ravallion says world poverty has been cut in half over the last twenty years. He says the number of poor people dropped by almost four hundred million between 1981 and 2001. To reduce poverty, the World Bank says developing nations should expand the possibilities for business and investment. The bank’s newest World Development report notes that private industry creates more than 90% of jobs in developing countries. The report for 2005 is based on questions asked of more than thirty thousand businesses in 53 developing countries. World Bank researchers found that companies are most concerned about how governments decide to enforce laws. About 90% of those in Guatemala reported policy conflicts with their government. This was true of more than 70% of businesses in Belarus and Zambia. Many companies also express concerns about problems like dishonesty and undependable electricity supplies. Last week , about fifty heads of state discussed ways to reduce poverty This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. Limited Electronic Distribution Rights This PDF document was made available from www.rand.org as a public service of the RAND Corporation. 6 Jump down to document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. Visit RAND at www.rand.org Explore RAND Homeland Security View document details For More Information Purchase this document Browse Books & Publications Make a charitable contribution Support RAND This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity. A RAND INFRASTRUCTURE, SAFETY, AND ENVIRONMENT PROGRAM Homeland Security Emerging Threats and Security Planning How Should We Decide What Hypothetical Threats to Worry About? Brian A. Jackson, David R. Frelinger The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R ® is a registered trademark. © Copyright 2009 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND Web site is prohibited. R AND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/ permissions.html). Published 2009 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: order@rand.org This Occasional Paper results from the RAND Corporation's continuing program of self-initiated research. Support for such research is provided, in part, by the generosity of RAND's donors and by the fees earned on client-funded research. Library of Congress Cataloging-in-Publication Data Jackson, Brian A., 1972- Emerging threats and security planning : how should we decide what hypothetical threats This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. Limited Electronic Distribution Rights Visit RAND at www.rand.org Explore RAND National Defense Research Institute View document details For More Information This PDF document was made available from www.rand.org as a public service of the RAND Corporation. 6 Jump down to document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. Purchase this document Browse Books & Publications Make a charitable contribution Support RAND This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Prepared for the Defense Threat Reduction Agency Approved for public release; distribution unlimited NATIONAL DEFENSE RESEARCH INSTITUTE EVALUATING NOVEL THREATS TO THE HOMELAND UNMANNED AERIAL VEHICLES AND CRUISE MISSILES Brian A. Jackson, David R. Frelinger Michael J. Lostumbo, Robert W. Button The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R ® is a registered trademark. © Copyright 2008 RAND Corporation All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from RAND. Published 2008 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: order@rand.org Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN 978-0-8330-4169-2 Cover Design by Stephen Bloodsworth The research described in this report was prepared for the Defense Threat Reduction Agency. The research was conducted in the RAND National Defense Research Institute, a federally funded research and development center sponsored by the Office of the Secretary of Defense, the Joint Staff, the Unified Combatant Commands, the Department of the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community under Contract W74V8H-06-C-0002. iii Preface Deciding how to invest homeland security resources wisely in the United States can often appear to be an intractable problem ... productive fishery for 400 years, the 4/12 Threats to Biodiversity introduction of modern factory trawlers in the 1980s and the pressure on the fishery led to it becoming unsustainable The causes... adaptations to seasonal food resources and breeding times Many contemporary mismatches to shifts in resource availability and timing have already been documented 9/12 Threats to Biodiversity. .. products they buy might be contributing to habitat loss and species extinctions Yet the market for illegally harvested tropical timber is 3/12 Threats to Biodiversity huge, and the wood products

Ngày đăng: 30/10/2017, 22:43

w