Profiling Model. Chapter Introduction

Size: px
Start display at page:

Download "Profiling Model. Chapter 4. 4.1 Introduction"

Transcription

1 Chapter 4 Profiling Model This chapter discusses various aspects of profiling that include personality indicators, profile types and its generation methodology etc. The psychological and social sciences views about profiling have also been presented. An agent based profiling model has been developed on.net and recognized agent platform of JADE. Many problems have been identified and resolved during study and development. The major components of the profiling model suggested are Honeypot, software agents and profile attributes. The major focus in the model was on the problems of profile compatibility, profile publishing, profile matching and internet resource rating. The purpose of the model was to create a social community of the peoples having common interests and guard and guide the internet users. The model was tested and results have also been presented. 4.1 Introduction Profiling is the process of collecting information about a specific individual or category of individuals (Martin et al, 2003). The increasing usage of cyber resources like forums, chat groups, browsing, demands the modeling of a framework that may use an individual s personality profile for simulating actual personality in the cyberspace and acting as a guard and guide for the respective user by determining internet resource suitability. This also aims to monitor and analyze users social interactions with other users on the web. The purpose is not to develop a complete model but just a milestone towards profiling for network security. There are many other indicators that are used to know the actual personality or interests of the internet user that have been mentioned in Honeypot section. On the basis of interests in games, music, and other indicators the age, sex, ethnicity, country have been tried to detect. Though the more focus is on interests but parallel to that work has also been proposed for other attributes as well that are discussed in the proposed model. 43

2 The objective is to exploit some concepts of psychology and cognitive theories to present a model of an agent framework where agents, having social capability, will monitor the activities of internet users to build and update profiles to build socioculture community of the similar interests in the cyberspace. Framework also guides the users what is good and what is bad for them on the internet according to their profile. This model is the milestone towards a big task of the development of an agent framework to build profiles of the users to monitor activities against insider threat, discussed in the earlier chapter. 4.2 Justification and Background study In the cyberspace people hide their personality attributes such as age, ethnicity, culture, religion, interests, etc. Therefore a clear difference always remains there between interactions that occur in cyberspace and in real life. There is need to monitor internet user activities through various indicators. For example recording browsing history of an internet user will help to identify the interests of the user, to know the age and the gender some random questions may be asked and keep their track to know the actual personality (John Suler, 2005; Michael Pazzani and Daniel Billsus, 2004). The major steps to achieve the target are: Create, maintain and update the profile of Internet users to use it as control and guide the user s internet experience. Closely monitor and observe the internet usage pattern of users that will help to update users generated profiles. Provide decision support for profile compatibility with certain internet resources and other profiles. 4.3 Honeypot and personality indicators Honeypot is a tool that is used to collect information about a user passing through monitored area. Honeypot can log the activities of the monitored user or a hacker. Hacker could be fooled with the feeling about the access of a corporate network. Unlike firewalls or intrusion detection system, Honeypot does not solve a specific problem. The importance of Honeypot is in its ability to follow the movements (Lance 44

3 Spitzner, 2002). Using the concept of Honeypot, a website will be designed that will attract the users. It will track internet usage patterns of the users. The number and type of Honeypot website resources are not fixed. Five basic components, to be discussed later, have been selected that are commonly accessed by internet users. Honeypot administrator can change components at any time. Various researchers have identified many indicators to know actual personality of the internet users (J. Goecks and J. Shavlik, 2000). Few of them are discussed and implemented in the proposed model. Website access total time is a good predictor that signs that if a user stays more time on a webpage it shows level of interest of that user. It is usually known as the moment length from user s visit to leaving the website that is calculated in unit of time. The Honeypot website records all activities including webpage reading time etc. Many issues are identified that are to be addressed in the targeted framework. The second indicator is movement of the mouse that is calculated through x and y coordinates on the active Honeypot website. Mostly users take interest in movement of the mouse during window text reading or take interest to look at attractive objects on the webpage. Some users are interested in movement of the mouse only to click on appealing links. Here it is assumed that mouse movement has directly proportion to the interest of the user with webpage. The third indicator is the scrollbar movement, where it is assumed that distance of scrollbar movement has directly proportion to the interest of the users. Users do not access the contents regularly and they search the page for interesting links. Sometimes scrolling by just clicking on the scroll bar is used and sometimes clicking and dragging the scrollbar is opted. The distance is summated on Honeypot website when user scrolls horizontal and vertical scrollbars. The fourth indicator is the mouse clicks, where it is assumed that if number of clicks on mouse on the webpage is greater that reflects that a user is more interested in it. A variable that counts mouse clicks will be incremented by 1 whenever mouse button is pressed. Text highlighting is assumed when button of mouse is pressed at some position and released at different position on the webpage. The fifth indicator is highlighting the text, where it is assumed that the user highlights the text in the interesting webpage. 45

4 The sixth indicator is the number of visits on a webpage, where it is assumed that user visits interesting webpage again and again. The seventh indicator is the recently visited webpage, where it is assumed that the user is more interested in the recently visited webpage. The score will always be higher than the other pages if a user recently visited the website. The eighth indicator is the use of buttons/ctrl key button, where it is assumed that operations of bookmarking, copy/paste, etc will be performed in the interesting webpage. Buttons with the combination of Ctrl presents interests of the users. Likewise, many other indicators have been explored by researchers to identify the actual activity of the internet users. Few of the indicators have been implemented in the model according to the need. 4.4 Profile Generation A user will be represented in cyberspace with a profile. Therefore the existence of profile is pre-requisite in digital persona (Silvia Schiaffinol and Analía Amandi, 2000). Psychologists and cognitive scientists accord to the fact that behaviors are related to individual s personality patterns that include age group, gender, education, personal interests etc. Age group, country, ethnicity, gender, and interests are identified as basic personality profile elements. The specification is not restrictive in terms of these elements. More personality profile elements can be employed when identified (Angleman, S., 2001; Malle, B. F. and Knobe, S., 1998) Types of Profiles Two different types of personality profiles are being maintained, each of which comprises of psychological factors identified above. Manual Profile: The information that user provides while registering with Honeypot is added to the knowledge base. The user is trusted one and the profile is manual. 46

5 Generated Profile: The profile is built through Honeypot website when a user performs certain activities. These activities include browsing, visiting chat rooms, news groups and playing games Profile Generation Methodology Mapping of the Honeypot resources with psychological factors must be maintained to identify the actual personality. For example, a user visiting a link which includes political news is quite possibly relating to a mature age group. The detailed indicators have been discussed earlier. 4.5 Software agent Framework Software agents are computational systems that live in a dynamic environment; sense and act independently to achieve the objective for which they are designed (P. Maes, 2004). Agent platforms provide supporting execution environment to the agents. JADE has been selected to employ the proposed model (Zhao and Zhiming, 2007). Honeypot website is linked with an agent framework as agent may play their part behind the scene. While implementation, it was identified that web servers do not support agent frameworks for the reason of their synchronous communication nature (figure 18). After a detailed survey and investigation, Java applets were considered to be appropriate web application interface. Figure 18: A typical synchronous model 47

6 4.6 Proposed Model As formerly pointed out, agent-oriented approach has been employed to address the problem. The specification includes three basic components: Honeypot website, Agents, and Profiles (figure 19). Following steps are needed to develop the model. A honeypot website is used to monitor user activities and provide them controlled internet access. The monitoring capability of the honeypot will be used to generate persistent user personality profiles. The personality profiles are then used to take decisions which include internet resource suitability and profile compatibility. A web monitor needed to track and record the internet usage pattern of the users. The complete browsing history of the users will be maintained. A rating system will offer evaluation for a web resource on certain parameters. Figure 19: Components of the proposed model JADE was chosen to incorporate the appropriate agent framework. Proxy agent at the web server will be generated for each request or session. The actual agent (social agent) resides in the JADE container. Whenever an http request of the user arrives to 48

7 the web server, the proxy agent sends a message to the social agent. Since each user is identified with the social agent. To ease the absolute routing of the message to the correct social agent the intermediate agent, Bridge agent, is developed that receives message from the proxy agent forwards to the concerned social agent. Because of this bridge agent resides in the main container and acts as a bridge between the social agent and the proxy agent (figure 20). When a new user registers and logs in the system, a social agent will be created. There will be a separate social agent for every registered user. Two proxy agents, ProxyCreatorAgent and ProxyMessageAgent, are used where ProxyCreatorAgent will send message to bridge agent to create a social agent for newly registered user, while ProxyMessageAgent will just pass message request to bridge agent for particular social agent. 49

8 Figure 20: Communication model 4.7 Identified problems and their solution These are the problems that were faced during implementation and their proposed solutions Profile Compatibility The issue of profile compatibility requires attention to determine the parameters of benevolence. Principle of maximum expected utility concept (Katia Sycara and Seth Widoff, 2002) is applied to address this issue. It works in the following way. Social agent A s utility maximizes upon interaction with social agent B, when the quantum of profile compatibility is high. By high means that utility of A must reach a utility-minimum when it interacts with B. 50

9 4.7.2 Publishing Profiles It is not feasible to continue the process of matching profiles at user request time. As result it would fall in unbearable response time. The proposed strategy is to maintain a list of matching profiles in the knowledge base. On the next stage, whenever compatibility is to be determined, the list can be consulted. Nevertheless, to put away the list from producing obsolete results, the matching list must be updated periodically. The list is needed to be continuously updated because the generated profiles are dynamic in nature. Since agent A is the only one having access to its profile, or for that matter, profile of the user with whom agent A has been associated, agent A periodically publishes a summary of its profile. That summary is received by each agent in the agent population and hence is used for updating the matching list Matching Profiles After obtaining one more agent s profile by a certain agent, the question at hand is that of making the decision of profile compatibility. As previously mentioned, the proposed methodology is maximum expected utility (Eric Jacquier, 2005). The concept of Decision Networks has been employed to answer this question. If personality profile of an agent is considered as a decision node and psychological factors as chance nodes, then all that required is an appropriate utility function to calculate the maximum expected utility. Figure 21 illustrates the concept. 51

10 Figure 21: Maximum Expected Utility Since probabilistic data is dealt with, therefore the most appropriate utility function, additive value function is implemented. The additive value function is as follows. The calculated utility will always remain between 0 and Internet Resource Ratings The existing rating systems have many limitations, such as limited attributes, hidden database of keywords, restricted to the culture of specific community, etc. To overcome all these limitations a rating system has been developed that is according to the culture, regional ethics, and the own defined attributes (MIR, 2006; ICRA, 2006). Detailed architecture and the tables are given as appendix. The rating system uses the growing database technique that follows the dynamic algorithm which is given as under. First time execution: Find all keywords Find respective category of keywords Rate the document on the basis of found category 52

11 Add remaining words in same category, with minimum weight Next time execution: Rate the document and get %age Increase the weight of all words according to that %age Weight should be in the range of Discussion An agent framework has been proposed that observes the activities especially browsing experience of a user in cyberspace. User signs up with basic information, manual profile, and signs-in to the Honeypot website to use the internet resources. The social agents working at backend will be generated or triggered to record user s activities. On the completion of the maturity period, users manual and generated profile will be matched and evaluated critically to identify actual profile of the user. The framework helps to create virtual social community in the cyberspace where users are guarded and guided to use internet resources according to their actual profiles and the interests. There are many limitations to the proposed model because the proposed model is just a milestone to the final objective. The first limitation of the model is that there are many psychological issues that have not been addressed. The other main problem of the model is that the proposed rating system does not provide ratings for all types of internet resources like forums, languages other than English, multimedia content sites etc. The social agents in the proposed model cannot immediately start producing results which can be said to reflect the preferences or personality profile attributes of the corresponding user. Initially the agent will be guided by only the manual profile of the user. The learning curve of the agent is dynamic and dependent upon the user s amount of interaction with it. 4.9 Summary The summary of the proposed models is shown in table 3 whereas results screenshots are given in appendices. Vulnerability Assessment (VA) model and profiling model have been implemented in two different ways. VA model and profiling model are implemented in agent framework (Jade and Aglets) and.net 53

12 framework. As this is qualitative research therefore their results cannot be compared quantitatively whereas qualitatively it can be concluded that standardized agent platform is appropriate approach to design agent based model. Table 3: Development of Models through different technology Hence it is concluded that.net framework supports many advanced tools and technologies therefore and agent platform on the top of the.net framework is proposed to develop agent based projects. 54

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1 Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example

More information

Digifort Mobile Manual Version 1.0 Rev. A

Digifort Mobile Manual Version 1.0 Rev. A Digifort Mobile Manual Version 1.0 Rev. A 2 Digifort Mobile - Versão 1.0 Índice Parte I Welcome to the Manual of Digifort Mobile 1.0 5 1 Screen... Shots 5 2 To whom... this manual is intended 5 3 How to...

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

PrognoCIS Improved Support Ticket Guide

PrognoCIS Improved Support Ticket Guide PrognoCIS Improved Support Ticket Guide Do you have a question about PrognoCIS? Our support team is always ready to help. Submitting a support ticket through the Resource Center is the fastest way to have

More information

ecollege AU Release Notes - ClassLive ClassLive

ecollege AU Release Notes - ClassLive ClassLive Release Notes - 10200 A. East Girard Ave. Denver, CO 80213 Phone 303.873.7400 Fax 303.873.7449 Table of Contents INTRODUCTION...3 Entry... 4 Feature Overview... 5 Graphing Calculator... 7 TECHNICAL REQUIREMENTS...8

More information

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony Web Tap: Detecting Covert Web Traffic Presented By: Adam Anthony Outline Problem Description Web Tap's Goals Web Tap's Significance Threat Model Implementation Evaluation Future Work Conclusion Typical

More information

Development of a personal agenda and a distributed meeting scheduler based on JADE agents

Development of a personal agenda and a distributed meeting scheduler based on JADE agents Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR User Guide for the RightFax Fax Service Web Utility August 2011 CONTENTS 1. Accessing the Web Utility 2. Change Password 3. Web Utility:

More information

2. More Use of the Mouse in Windows 7

2. More Use of the Mouse in Windows 7 65 2. More Use of the Mouse in Windows 7 The mouse has become an essential part of the computer. But it is actually a relatively new addition. The mouse did not become a standard part of the PC until Windows

More information

NSFOCUS Web Vulnerability Scanning System

NSFOCUS Web Vulnerability Scanning System NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan

More information

Windows 7 for beginners

Windows 7 for beginners Windows 7 for beginners Hardware Hardware: the physical parts of a computer. What s in the computer? CPU: the central processing unit processes information (the brain) Hard drive: where all of your software

More information

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application

More information

You must have at least Editor access to your own mail database to run archiving.

You must have at least Editor access to your own mail database to run archiving. Archiving An archive is a copy of a database you can create to store information no longer in use. Like a replica, an archive contains all documents and design elements in the original database, but unlike

More information

Welcome to EMP Monitor (Employee monitoring system):

Welcome to EMP Monitor (Employee monitoring system): Welcome to EMP Monitor (Employee monitoring system): Overview: Admin End. User End. 1.0 Admin End: Introduction to Admin panel. Admin panel log in. Introduction to UI. Adding an Employee. Getting and editing

More information

OANDA FXTrade Platform: User Interface Reference Manual

OANDA FXTrade Platform: User Interface Reference Manual User Manual Home OANDA FXTrade Platform: User Interface Reference Manual Login/Logout Procedure FX Platform (Main Window) Action Buttons Pull-down Menus Transaction History Account Summary Tables Trades

More information

Accessing the Technology Help Desk Self-Service site:

Accessing the Technology Help Desk Self-Service site: Technology Help Desk Self-Service Site Find Technology Solutions and Manage Work Ordersfor all current faculty, staff and students of Philadelphia University Requirements a personal computer connected

More information

An Instructional Aid System for Driving Schools Based on Visual Simulation

An Instructional Aid System for Driving Schools Based on Visual Simulation An Instructional Aid System for Driving Schools Based on Visual Simulation Salvador Bayarri, Rafael Garcia, Pedro Valero, Ignacio Pareja, Institute of Traffic and Road Safety (INTRAS), Marcos Fernandez

More information

Step-by-Step Help Guide for Freegal Movies and Television

Step-by-Step Help Guide for Freegal Movies and Television Step-by-Step Help Guide for Freegal Movies and Television 0 Table of Contents Welcome 2 What is Freegal Movies and Television 2 Freegal Music Offerings to Patrons 2 Freegal Movies and Television Homepage

More information

Enhancing Mobile Browsing and Reading

Enhancing Mobile Browsing and Reading Enhancing Mobile Browsing and Reading Chen-Hsiang Yu MIT CSAIL 32 Vassar St Cambridge, MA 02139 chyu@mit.edu Robert C. Miller MIT CSAIL 32 Vassar St Cambridge, MA 02139 rcm@mit.edu Abstract Although the

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Note: Make sure the.pst file is stored in your U: drive, this drive is protected by backups.

Note: Make sure the.pst file is stored in your U: drive, this drive is protected by backups. Email Management Best Practices I. Introduction: The School Board Network Infrastructure that we use daily is a huge investment involving workstations, servers, storage, software and backup equipment.

More information

Checking Browser Settings, and Basic System Requirements for QuestionPoint

Checking Browser Settings, and Basic System Requirements for QuestionPoint Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply

More information

Next Generation Clickjacking

Next Generation Clickjacking Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone paul.stone@contextis.co.uk Coming Up Quick Introduction to Clickjacking Four New Cross-Browser

More information

Building and Using Web Services With JDeveloper 11g

Building and Using Web Services With JDeveloper 11g Building and Using Web Services With JDeveloper 11g Purpose In this tutorial, you create a series of simple web service scenarios in JDeveloper. This is intended as a light introduction to some of the

More information

Self Service - Personal Information Guide for Users Updated on 5 May 2015

Self Service - Personal Information Guide for Users Updated on 5 May 2015 Updated on 5 May 2015 Contents Getting Help... iii Supported Browsers... iii Self Service - Personal Information... Error! Bookmark not defined. Personal Information... 1 Update Your Emergency Contact...

More information

Form Builder in Agile CRM

Form Builder in Agile CRM Form Builder in Agile CRM Agile CRM pulls in visitor information entered, through the web forms on your website & creates a contact with all the given attributes, in the CRM. It integrates with various

More information

SyncLockStatus Evaluator s Guide

SyncLockStatus Evaluator s Guide SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus

More information

Client Side Filter Enhancement using Web Proxy

Client Side Filter Enhancement using Web Proxy Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET

More information

Checking IE Settings, and Basic System Requirements for QuestionPoint

Checking IE Settings, and Basic System Requirements for QuestionPoint Checking IE Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply to

More information

User Guide. Chapter 6. Teacher Pages

User Guide. Chapter 6. Teacher Pages User Guide Chapter 6 s Table of Contents 1. Introduction... 4 I. Enhancements... 5 II. Tips... 6 2. Key Information... 7 3. How to Add a... 8 4. How to Edit... 10 I. SharpSchool s WYSIWYG Editor... 11

More information

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.

More information

Cyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu

Cyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu Cyber Security Education: My Personal Thoughts Bharat Doshi bharat.doshi@jhuapl.edu Topics Personal Background Other situations: Similarities and Differences Cyber Vulnerabilities Student Types and Education/Training

More information

TeamViewer 8 Manual Remote Control

TeamViewer 8 Manual Remote Control TeamViewer 8 Manual Remote Control Rev 8.1-12/2012 TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About

More information

DYNAMIC PROJECT MANAGEMENT WITH COST AND SCHEDULE RISK

DYNAMIC PROJECT MANAGEMENT WITH COST AND SCHEDULE RISK DYNAMIC PROJECT MANAGEMENT WITH COST AND SCHEDULE RISK In the world of project management, there are essentially two major sources of risks: schedule risk and cost risk. In other words, will the project

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

QUIT MACSCHOOL AND DRAG YOUR SERVER ICONS TO THE TRASH OR HIT THE DISCONNECT BUTTON BESIDE THE SERVER ICON IN THE TOP SIDEBAR

QUIT MACSCHOOL AND DRAG YOUR SERVER ICONS TO THE TRASH OR HIT THE DISCONNECT BUTTON BESIDE THE SERVER ICON IN THE TOP SIDEBAR Macintosh Operating System OSX 10.3.x STARTING YOUR COMPUTER Logging in Whenever you start your computer, you will need to enter your computer password at the log in screen. When the log in screen appears,

More information

Modules... 4 Plugins... 30

Modules... 4 Plugins... 30 ;] CHAT USER MANUAL Modules... 4 Home... 4 Chatroom... 4 Lobby:... 5 Create Chatroom... 6 Invite User... 12 Leave room... 13 Popout... 14 Kick... 15 Ban... 16 Unban... 17 Chat History for Chatroom... 19

More information

Internet-based remote support for help desks

Internet-based remote support for help desks Internet-based remote support for help desks White Paper Published: October 2005 Contents Introduction...1 Advantages of Internet-based Remote Support...1 Reduced Support Costs through Increased Productivity...2

More information

Introduction to Microsoft Outlook Web Access Faculty/Staff e-mail Tutorial

Introduction to Microsoft Outlook Web Access Faculty/Staff e-mail Tutorial Introduction to Microsoft Outlook Web Access Faculty/Staff e-mail Tutorial Accessing Outlook Web Mail First, you ll need to be in a browser such as Microsoft Internet Explorer or Netscape Communicator.

More information

Choose a topic from the left to get help for CmapTools.

Choose a topic from the left to get help for CmapTools. Using CmapTools Create a Cmap Add a Concept Create a Proposition from One Concept Create a Proposition from Existing Concepts Save a Cmap Open a Cmap Create a Folder Drag in Resources Import Resources

More information

Visualisation in the Google Cloud

Visualisation in the Google Cloud Visualisation in the Google Cloud by Kieran Barker, 1 School of Computing, Faculty of Engineering ABSTRACT Providing software as a service is an emerging trend in the computing world. This paper explores

More information

User Interface Design

User Interface Design User Interface Design Winter term 2005/2006 Thursdays, 14-16 c.t., Raum 228 Prof. Dr. Antonio Krüger Institut für Geoinformatik Universität Münster 20. Februar 06 IfGi Universität Münster User Interface

More information

Business Banking Co-Browse Live Help

Business Banking Co-Browse Live Help Business Banking Co-Browse Live Help User Guide Effective Date: September 2007 Version 1.0 Digital Insight Confidential The information contained in this publication is the property of Digital Insight.

More information

SUREedge Software Appliance (vmware) Installation Guide

SUREedge Software Appliance (vmware) Installation Guide SUREedge Software Appliance (vmware) Installation Guide Thank you for choosing SUREedge This guide describes the procedure to obtain and install SUREedge software appliance on a vmware server. The steps

More information

TeamViewer & DynGate Manual V 2.0

TeamViewer & DynGate Manual V 2.0 TeamViewer & DynGate Manual V 2.0 i Table Of Contents 1. OVERVIEW... 1 1.1. INTRODUCTION... 1 1.2. TEAMVIEWER RELATED DOWNLOADS... 2 1.3. ABOUT THIS MANUAL... 4 2. INSTALLATION... 5 2.1. CLIENT- AND HOST

More information

USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2

USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2 USER GUIDE TABLE OF CONTENTS General Information... 2 The BeAnywhere Service... 2 BeAnywhere Server... 2 BeAnywhere DRIVE... 2 Security... 2 Level 1 User Security... 3 Level 2 Communications Security...

More information

SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here:

SSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here: SSL VPN Service Note: This guide was written using Windows 7 with Internet Explorer 8. The same principles and techniques are applicable to new versions of Internet Explorer as well as Firefox. Any significant

More information

Action settings and interactivity

Action settings and interactivity Interactivity in Powerpoint Powerpoint includes a small set of actions that can be set to occur when the user clicks, or simply moves the cursor over an object. These actions consist of links to other

More information

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects

More information

Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website

Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website Office of Disability Adjudication and Review October 2011 Representative Guide for Electronic Records

More information

How To Run A Factory I/O On A Microsoft Gpu 2.5 (Sdk) On A Computer Or Microsoft Powerbook 2.3 (Powerpoint) On An Android Computer Or Macbook 2 (Powerstation) On

How To Run A Factory I/O On A Microsoft Gpu 2.5 (Sdk) On A Computer Or Microsoft Powerbook 2.3 (Powerpoint) On An Android Computer Or Macbook 2 (Powerstation) On User Guide November 19, 2014 Contents 3 Welcome 3 What Is FACTORY I/O 3 How Does It Work 4 I/O Drivers: Connecting To External Technologies 5 System Requirements 6 Run Mode And Edit Mode 7 Controls 8 Cameras

More information

How To Block Unauthorized Internet Access through Proxies

How To Block Unauthorized Internet Access through Proxies How To - Block Unauthorized Internet Access through Proxies How To Block Unauthorized Internet Access through Proxies Applicable Version: 10.00 onwards Overview A Proxy is a tool that attempts to make

More information

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases

More information

Section 8.1: Sundry Invoice Approval

Section 8.1: Sundry Invoice Approval Section 8.1: Sundry Invoice Approval The purpose of this section is to introduce the user how to approve a Sundry Invoice. If the Invoice Approval task is approved it will proceed to be paid by the. If

More information

ConnectIT. How to Connect and End a Remote Support Session. (for Windows & IE / Firefox)

ConnectIT. How to Connect and End a Remote Support Session. (for Windows & IE / Firefox) Information Technology Services Page 1 of 7 ConnectIT How to Connect and End a Remote Support Session (for Windows & IE / Firefox) This document shows how to respond to a remote support request from ITS

More information

Windows File Management A Hands-on Class Presented by Edith Einhorn

Windows File Management A Hands-on Class Presented by Edith Einhorn Windows File Management A Hands-on Class Presented by Edith Einhorn Author s Notes: 1. The information in this document is written for the Windows XP operating system. However, even though some of the

More information

ArchiCAD Tutorial Getting started. Dr. Benny Raphael Dept. of Building National University of Singapore (NUS)

ArchiCAD Tutorial Getting started. Dr. Benny Raphael Dept. of Building National University of Singapore (NUS) ArchiCAD Tutorial Getting started Dr. Benny Raphael Dept. of Building National University of Singapore (NUS) Launch ArchiCAD You can either create a new project or open an existing (previously saved) project.

More information

GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS

GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS Chris kankford Dept. of Systems Engineering Olsson Hall, University of Virginia Charlottesville, VA 22903 804-296-3846 cpl2b@virginia.edu

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Website Communication

Website Communication Communication Handbook - Factsheet 6 Version 2 June 2013 Website Communication What design to use for your website How to structure your website to make people stay longer Differences in how people read

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

c360 SharePoint Integration User Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. Products@c360.com www.c360.com

c360 SharePoint Integration User Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. Products@c360.com www.c360.com c360 SharePoint Integration User Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. Products@c360.com www.c360.com c360 Solutions All Rights Reserved Contents c360 SharePoint Integration...

More information

InstantAtlas TM Server Data Transfer Tools User Guide

InstantAtlas TM Server Data Transfer Tools User Guide InstantAtlas TM Server Data Transfer Tools User Guide Author: GeoWise User Support Released: 06/11/2012 Version: 6.5.1 InstantAtlas Server Data Transfer Tools Table of Contents 1. Introduction... 1 2.

More information

CONFERENCE NOW. with WebConnect

CONFERENCE NOW. with WebConnect CONFERENCE NOW with WebConnect I. WebConnect Overview 2 A. Conference Center 2 B. Conference Controls II. Log in (Chairperson) 3 III. Join a Meeting (Participant) 5 IV. Conference Controls 6 A. Participants

More information

ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs

ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and

More information

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

University of Central Florida Class Specification Administrative and Professional. Information Security Officer Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team

More information

MyMathLab / MyStatLab Beginning Interactive Training Guide

MyMathLab / MyStatLab Beginning Interactive Training Guide MyMathLab / MyStatLab Beginning Interactive Training Guide MYMATHLAB/MYSTATLAB BEGINNING Lesson 1 Set Up Your First Course... 5 Lesson 2 Explore Your Course... 13 Lesson 3 Customize the Home Page... 24

More information

IIS Web Server Configuration Guide

IIS Web Server Configuration Guide EventTracker v8x Publication Date: Feb. 26, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About the document The purpose of this document is to help users install or customize

More information

Northern Arizona University

Northern Arizona University Enterprise Reporting Supported Operating Systems and Internet Browsers BusinessObjects Enterprise XI 3.1.7.1 Documentation Version 1.4 Supported Operating Systems and Internet Browsers Multiple choices

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

Infinity Web Viewer Reference Guide

Infinity Web Viewer Reference Guide Infinity Web Viewer Reference Guide Table of Contents Overview... 1 Security Considerations... 1 System Setup... 1 Infinity Configuration... 1 Workstation Prerequisites... 2 Configuring Internet Security...

More information

Cricut Design Space Reference Guide & Glossary

Cricut Design Space Reference Guide & Glossary Cricut Design Space Reference Guide & Glossary Top Menu Bar Grid On/Off button Panel Menu Side Menu Bar 1 Cricut logo click the Cricut logo at any time to return to the Cricut Design Space landing page.

More information

WISE Sampling Distribution of the Mean Tutorial

WISE Sampling Distribution of the Mean Tutorial Name Date Class WISE Sampling Distribution of the Mean Tutorial Exercise 1: How accurate is a sample mean? Overview A friend of yours developed a scale to measure Life Satisfaction. For the population

More information

E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6

E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6 E-Mail Campaign Manager 2.0 Marketer's Guide Rev: 2014-06-11 E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6 Marketer's Guide User guide for marketing analysts and business users Table of Contents Chapter

More information

Project Orwell: Distributed Document Integrity Verification

Project Orwell: Distributed Document Integrity Verification 1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam tmacwilliam@cs.harvard.edu Abstract Project Orwell is a client and server application designed to facilitate the preservation

More information

www.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008

www.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 With Forefront Threat Management Gateway 2010 now discontinued, we sought a suitable reverse proxy solution that works with Lync

More information

GOOGLE DOCS APPLICATION WORK WITH GOOGLE DOCUMENTS

GOOGLE DOCS APPLICATION WORK WITH GOOGLE DOCUMENTS GOOGLE DOCS APPLICATION WORK WITH GOOGLE DOCUMENTS Last Edited: 2012-07-09 1 Navigate the document interface... 4 Create and Name a new document... 5 Create a new Google document... 5 Name Google documents...

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services

More information

PopupProtect User Guide

PopupProtect User Guide Having the power to block or allow popup and popunder advertising www.contentwatch.com 2004 All rights reserved. 2369 West Orton Circle, Salt Lake City, UT 84119 Table of Contents Welcome and Installation

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

NTT R&D s anti-malware technologies

NTT R&D s anti-malware technologies NTT R&D s anti-malware technologies Jan. 21, 2015 NTT Secure Platform Laboratories Takeo HARIU Threats causes most of cyber attacks Major infection routes are web browsing, URL links in email messages,

More information

System Configuration Guide For Desktop Originator /Desktop Underwriter July 2013

System Configuration Guide For Desktop Originator /Desktop Underwriter July 2013 System Configuration Guide For Desktop Originator /Desktop Underwriter July 2013 2013 Fannie Mae. Trademarks of Fannie Mae. DO/DU System Configuration Guide 1 2003-2013 Fannie Mae. All Rights Reserved.

More information

Internet Explorer 7 and Internet Explorer 8 Browser Security Settings

Internet Explorer 7 and Internet Explorer 8 Browser Security Settings Internet Explorer 7 and Internet Explorer 8 Browser Security Settings From either the Menu Bar or the Tool Bar in your browser click on Tools. Select Internet Options which is the last item on the drop

More information

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by

More information

ecfshome-ts Terminal Server How to Use

ecfshome-ts Terminal Server How to Use ecfshome-ts Terminal Server How to Use Connect to VPN Connect to Terminal Server, Set Options to Use Personal Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network Folders to

More information

Alerts. Some Alerts give you unique options for customizing the messages you receive. Calendar events, for instance, allow you to set how far in

Alerts. Some Alerts give you unique options for customizing the messages you receive. Calendar events, for instance, allow you to set how far in Alerts, RSS and ical feeds Alerts and feeds are both methods of keeping current on site content that changes or updates frequently. The primary difference between them is that Alerts are active: whenever

More information

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It

More information

RDM+ Desktop for Windows Getting Started Guide

RDM+ Desktop for Windows Getting Started Guide RDM+ Remote Desktop for Mobiles RDM+ Desktop for Windows Getting Started Guide Introduction... 3 1. Installing RDM+ Desktop on a computer... 3 2. Preparing for remote connection... 4 3. RDM+ Desktop window...

More information

McAfee Family Protection

McAfee Family Protection User Guide The Easiest, Most Complete Way to Keep Your Children Safe Online Quick Start Easy CD Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed

More information

A Web Tour also can be opened up in an external browser: this is called a Web Push. (See Web Push below.)

A Web Tour also can be opened up in an external browser: this is called a Web Push. (See Web Push below.) WEB TOUR The Web Tour feature enables session participants to share web pages with others in the session. Web Tour is a type of content that, like the Whiteboard and Application Sharing, appears in the

More information

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP

More information

Replication. Training Division New Delhi

Replication. Training Division New Delhi Replication Training Division New Delhi Replication Allows you to make duplicate copies of your data Move the copies to different locations, and synchronize the data automatically so that all the copies

More information

1.0-Scratch Interface 1.1. Valuable Information

1.0-Scratch Interface 1.1. Valuable Information 1.0-Scratch Interface 1.1 Valuable Information The Scratch Interface is divided to three: 1. Stage 2. Sprite/background properties 3. Scratch Action Blocks Building the game by designing the sprites and

More information

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1 PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a

More information

Stock Trader System. Architecture Description

Stock Trader System. Architecture Description Stock Trader System Architecture Description Michael Stevens mike@mestevens.com http://www.mestevens.com Table of Contents 1. Purpose of Document 2 2. System Synopsis 2 3. Current Situation and Environment

More information

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation. eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as

More information