- PDFView PDF
Under a Creative Commons license
Open access
Highlights
•
Internal displacement due to conflict or violence can have profound health impacts.
•IDPs tend to experience worse health outcomes than other conflict-affected populations.
•That reflects the particular vulnerabilities of IDPs relative to these other populations.
•Health interventions need to take account of the specific vulnerabilities of IDPs.
Abstract
We seek to strengthen understanding of the health needs of internally displaced persons (IDPs) in contexts of conflict or violence. Based upon a scoping review, our paper identified limited evidence on IDP health, but nevertheless indicates that IDPs tend to experience worse health outcomes than other conflict-affected populations across a range of health issues; and this is due to the particularly vulnerable situation of IDPs relative to these other populations, including reduced access to health services. Further research is required to better understand these needs and the interventions that can most effectively address these needs.
Keywords
Health
Internal displacement
Internally displaced persons
IDPs
Conflict
Cited by (0)
© 2021 The Author(s). Published by Elsevier Ltd.
Chapter 7 test network security
Chapter 7 test network security
A wireless security
toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy
or confidentiality afforded on the wireless network. T or F?
An alert or
intrusion is an indication that a system has just been attacked or is under attack. T or F?
____ is the process of classifying IDPS alerts so that they can be more effectively managed.
Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as ____.
____ is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.
A(n)
portis a network channel or connection point in a data communications system.
Minutiae
are unique points of reference that are digitized and stored in an encrypted format when the user’s system access credentials are created.
For Linux or BSD systems, there is a tool called “
scanner” that allows a remote individual to “mirror” entire Web sites.
____ applications use a combination of techniques to detect an intrusion and then trace it back to its source.
Which of the following ports is commonly used for the HTTP protocol?
A(n)
listenervulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software.
Fingerprinting
is the organized research of the Internet addresses owned or controlled by a target organization.
Fingerprinting
is the organized research of the Internet addresses owned or controlled by a target organization.
A passive response is a definitive action automatically initiated when certain types of alerts are triggered.
A(n) ____ IDPS is focused on protecting network information assets.
An IDPS can be configured to dial a phone number and produce an alphanumeric page or a modem noise.
____ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.
____ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Enticement
is the action of luring an individual into committing a crime to get a conviction.
Alarm
filteringis alarm clustering that may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators.
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known ____ in their knowledge base.
____ sensors are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
A(n)
logfile monitor is similar to a NIDPS.
Intrusion ____ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
A(n) ____ is a proposed systems user.
____ are decoy systems designed to lure potential attackers away from critical systems.
____ is the action of luring an individual into committing a crime to get a conviction.
A sniffer cannot be used to eavesdrop on network traffic.
A fully distributed IDPS control strategy is the opposite of the centralized strategy.
____ is based on the use of some measurable human characteristic or trait to authenticate the identity of a proposed systems user.
A padded cell is a hardened
honeynet.
A(n)
NIDPSfunctions on the host system, where encrypted traffic will have been decrypted and is available for processing.
A HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
A(n)
server-basedIDPS protects the server or host’s information assets.
Most NBA sensors can be deployed in ____ mode only, using the same connection methods as network-based IDPSs.
Using ____, the system reviews the log files generated by servers, network devices, and even other IDPSs.
A starting scanner is one that initiates traffic on the network in order to determine security holes.
A false positive is the failure of an IDPS system to react to an actual attack event.
All IDPS vendors target users with the same levels of technical and security expertise.
____ is an event that triggers an alarm when no actual attack is in progress.
A(n) ____ is a network tool that collects copies of packets from the network and analyzes them.
____ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.
IDPS researchers have used padded cell and honeypot systems since the late ____.
In TCP/IP networking, port ____ is not used.
A(n) ____ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.
An HIDPS can detect local events on host systems and also detect attacks that may elude a network-based IDPS.
A(n)
partiallydistributed IDPS control strategy combines the best of the other two strategies.
A HIDPS can monitor systems logs for predefined events.
--> All of the above
a. retina of the eye b. fingerprints c. iris of the eye
Among all possible biometrics, ____ is(are) considered truly unique.
HIDPSs are also known as system integrity verifiers.