1 ZRÍNYI MIKLÓS NATIONAL UNIVERSITY Doctoral Council VALÉRIA PÓSERNÉ OLÁH Information security aspects of information systems for public administration PhD thesis booklet and her official reviews Budapest 2011.
2 2 ZRÍNYI MIKLÓS NATIONAL DEFENCE UNIVERSITY VALÉRIA PÓSERNÉ OLÁH Information security aspects of information systems for public administration PhD thesis booklet and her official reviews Supervisor: Prof. dr. Zsolt Haig, eng. colonel, PhD Budapest 2011.
3 3 The scientific problem Because of the information systems are commonly used in every aspects of human life, that is why in the era of public administration they take part in growing scale. Due to the personal computers and the lesser or bigger networks forming of them, the creation of the first viruses, the speeding up development of information technology the matter of information security became more complicated. Our NATO and EU memberships make great demands of newer information security in the used information systems of Hungary, amid the information systems of the public administration. It is obvious, that the information security is effective, if it is ensured commonly for every element (servers, clients, operation systems, software, network, etc.) of the information system. However, the information systems of the public administration are far from the equal high level defense. There are areas where the usages of the modern defense methods are the same in quality, quantity and forms, but there are several information systems, where you cannot find the basic security settings. The significance of the shortcomings of the security of the information systems of the era of the public administration is quite big enough, because an incident can cause harmful effects for mass of people or for the whole society. For example, nobody would be happy if anybody would be able to acquire his / her birth certificate due to the security problems of the system which can be used to steal a whole identity and to take advantage in various ways. By the very start of my research I could identify that the information systems of our public administration contain more and more vulnerabilities as other systems, and the attackers, their tools and methods develop in an immense pace. The explorations, analysis of the threat on the information systems of the public administration, the inspection of the adaptability of modern defense methods need scientific research. Objectives I set the under mentioned aims in the course of my research: 1. Observing the information systems of the organizations of public administration, by modeling the system presenting and analyzing their functioning processes, the used
4 4 information security rules and the aspects of the staff operating them; exploring their lacks and defining the possible directions and results of their development. 2. Analyzing the possible attackers, the types of attacks against the information systems of public administration, and by this systematizing and grouping the threats. 3. From the viewpoint of information security analyzing, valuing and comparing the most used open source and close operation systems in the information systems of public administration and suggesting more possible application areas. 4. Based on the risk analyzing model observing the modern defense solutions used in information systems of public administration, their processing principles and suggesting adaptability enlarging the information security of information systems for public administration. Applied research methods I started my research by gathering, systematizing, analyzing information based on wide scale literary research of vulnerability of information system, later on I complement them whit the exploration of these vulnerabilities, and the accomplishment of simulation based on modeling and demonstrating of effective defense from the threats. I followed with attention the already done and ongoing dissertations based on the theme, the statements of scientific student essays, technological publications, scientific exhibitions and programs. I utilized the pieces of information and experience I gathered from the interviews of top managers of the social service sector. While I made this essay I lean on the national and EU laws, rules, standards and regulations of the information defense. I consulted, gathered experience, and I used the experience from teaching the subjects in creating, operation and auditing and reviewing safe information systems, for the creation of this document. I strived to reach and achieve my goals of this research by using methods such as analyzing, synthesizing, inducting and deducting several outcomes of researches and essays. Structure of the thesis I summarized my research for reaching the goals in an essay in the following structure: 1 st chapter: I defined, specified the notions used in the essay, I observed the information systems of public administration and their working processes, I created the functional and
5 5 structured model of information systems of public administration and I defined the necessary aspects and tasks needed to form information security strategy strengthening information security of organizations in the civil service sector, I presented a possible option of strategy build-up and I explored the shortcomings of regulations of the information systems of public administration. I suggested solutions for eliminating the shortcomings. 2 nd chapter: I analyzed and grouped the threats and attack methods against information security of information systems of public administration, I observed the attackers, targets, effects of attacks and by testing I analyzed and compared the most commonly used open source and closed operation systems utilized in information systems of public administration, then I drew the inference for their further adaptability. 3 rd chapter: I observed the modern defense solutions usable in information systems, their working methods, than by the purposed, particular risk and effect analysis concentrated on the threats and defense lacks I suggested solutions for their adaptability to develop security of information systems for public administration. At the end I summarized my conclusions, my main statements, I formulated the new scientific results reached by me and made suggestions for further usage. Conclusions After identifying and clarifying the basic expressions I created the functional and structural model of information systems of the public administration. I presented the Electronic Government Backbone which is the basic infrastructure of e- governance and I analyze the Ügyfélkapu. After observing the basic processes of the information systems I stated that the most critical points in the information systems of the public administration are the processes of putting in the data to and getting out the data from the systems. The proper regulating of these processes could enlarge the level of the information security significantly. By studying the requirement system of the information security of the framework for e- governance I analyzed the basic conditions of setting up and maintaining the organizational information security and I formulate the goals and requirements of the information security strategy, I presented a possible build-up, the most important tasks to do according to the goals and the questions of the regular review of these tasks.
6 6 I examined the current and normative orders of government and the matters of their ancestors in the aspect of information security of the information systems for public administration and I stated that there are still some shortcomings, and the proper implementations on the lower level do not come or come partially into existence, and I see the reason of this mainly in the lack of suitable specialists and the lack of financing. According to the previous issue I suggested working out a law of information security which is based on international standards and good case practices and regulates widely the information security of the organizations of the civil service sector, furthermore I suggested setting up an information security organization of experts doing inner auditions and consulting. I examined the state of development of security consciousness of humane side which takes part in creating, regulating, processing and utilizing the information systems of public administration and I stated that problems of approach impede the creation and maintenance of proper information security, that is why I suggested introducing methods aiming to change it. After clarifying the main steps of attacks against information systems I analyzed, systemized and grouped the threats, the scale of attackers, the targets and the methods and effects of attacks of the security of information systems of public administration. I observed and analyzed the opportunity of outer attacks in the aspect of exploiting the vulnerability of the network, operation system and installed applications, as well as I observed the diverse opportunities of inner threats and the accomplishable forms of attacks of combination of the previous two mentioned issues. After that I wanted to reply an actual question, which refers to the expedience of the usage of open-source or closed operation systems on the computers of information systems of public administration. That is why I tested, observed and compared several services of operation systems of servers mainly used in information systems of public administration in the aspect of secure usage and I stated that the utilization of open-source operation systems may cause cost-cutting in purchasing software, its skills are not worse than the security services of closed operation systems. However the expertise is missing for the secure operation and it would be a problem to retool the self-developed, Microsoft based applications of the civil service sector and with this a big amount of vulnerability could come into the system, also thence these are more likely targets of attacks. I stated that there are no essential digressions in the used methods, instruments and motivation of attackers considering the attacks of information systems of public administration or company. I see basic differences in one hand in the effects of differences
7 7 between the stored-processed information, on the other hand in the negative effects caused on the governance by the threats of availability, and finally in the negative effect of operability of public administration by the threats of cyber warfare. I observed and valued the modern information security solutions, with statistical data I stated that these are not or partially used in the information systems of public administration. I made a purposed, particular risk and effect analysis concentrated on the threats and defense lacks revealed in the previous parts of the essay, with its outcomes I suggested implementing, enforcing the upcoming security solutions in the security systems of every organizations of the civil service sector: Implementing central controlled, integrated end-point protected solutions and creating central controlled software refreshing architecture for reducing on a bearable level the threats caused by malfunctioned or manipulated applicator vulnerabilities, vulnerabilities created by system programs or by the vulnerabilities getting into system from remote computer; Creating screened subnet firewall architecture processing with application level firewall for lowering the risk of unauthorized admission into the network; Utilizing admission detecting and preventing tools to detect and parry unauthorized admission tryouts and attacks on the inner network; Implementing integrated central applicator and access management systems for lowering risks by unauthorized data access; Implementing encryption and automated saving system for reducing on a bearable level the risks caused by loss, injury or stealth of communication, mailing or data travelers on open channels; Using calendar or event processing systems, moreover creating a scope of activity of supervising for exploring system problems or unauthorized admissions or admission tries. I stated that there are no essential differences in the usable security solutions of information systems of public administration or for profit sector, but their usage in the information systems of public administration is less prevalent. That is why the implementation of the above mentioned solutions is necessary, with their usage the security of the information systems of public administration can be developed significantly.
8 8 Thesis 1. By creating the functional and structural model of the information systems of public administration and by analyzing their working processes, security regulators I explored their lacks, I presented the directions of development and I stated the requirements of the creatable information security strategy in these organizations, the possible build-up of the strategy and the tasks of the information security politics connecting to the previous issues. 2. Based on the structured model of the information systems of public administration I analyzed the attackers against them and the types of attacks, and as a result I created a new categorization of the threats (attackers) against these systems. 3. By observing the attackers and the types of attacks and by analyzing statistically the rate of targets moreover by my own testing results I compared the most used operation systems in the information systems of public administration in the aspect of secure utilizing and I certified that using close operation system is not more disadvantageous than change to open-source operation systems which are more commonly showed as targets. 4. Based on the purposed, particular risk and effect analysis concentrated on the threats and defense lacks I observed and valued the modern information security solutions and as a result I suggested their adaptability in the information systems of public administration, with these the information security of organizations in the civil service sector could be developed effective. Recommendations 1. I recommend the chapter of my PhD essay about regulating the safety of the information systems for the public administration for making new law intent to develop the defense of the information systems of the public administration for a higher level, and to implement the recommendations to the information security strategy of the organizations. 2. I recommend the utilization of my essay in the bachelor, masters and PhD curriculum of the higher education teaching students on the field of information technology of the public administration.
9 9 3. I also recommend the chapter dealing with the forms of attacks of the information systems and the applicable defense solutions for the bachelor, masters and PhD curriculum of the higher education teaching students on the field of information security.
10 10 List of publications Articles in vetted periodical 1. V. Póserné Oláh: Security and performance of the webservers in the open source and the closed source operation systems, Scientific Bulletin of "Politechnika" University of Timisoara, Romania, Vol. 55(69), No. 1 / March 2010, pp , ISSN X 2. V. O. Póserné - Zs. Haig: The Forms and Defence Possibilities of the Threats Against Computer Networks, Hadmérnök, I. évf. 1. sz., Budapest, 2006, p. 13, ISSN V. O. Póserné: The security of Web Applications, AARMS Vol. 8, No. 1, 2009, pp , ISSN (Online), ISSN (Print) 4. Póserné O. V.: Az információs társadalom és a terrorizmus kapcsolata, Bolyai Szemle, sz., Budapest, 2006, pp , ISSN Póserné O. V.: IT kockázatok elemzésük, kezelésük, Hadmérnök, I. évf. 3. sz., Budapest, 2007, p. 9, ISSN Póserné O. V.: A szervezeti informatikai biztonság megteremtésének, fenntartásának alapvető feltételei, Hadmérnök, I. évf. 4. sz., Budapest, 2007, p. 10, ISSN Póserné O. V.: Rejtjelző módszerek vizsgálata, Hadtudományi Szemle, I. évf. 1. sz., Budapest, 2008, p. 14, HU ISSN Póserné O. V.: Nyílt és zárt forráskódú operációs rendszerek leggyakoribb szolgáltatásainak vizsgálata biztonság és teljesítmény szempontjából, Bolyai Szemle, XVIII. évf. 4. sz., Budapest, 2009, pp , ISSN Discourses appeared in conference issues 1. V. O. Póserné: Comparing the webservers of the opensource and the closed source operation systems, Proc of the 5th International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, IEEE Catalog Number CFP0945C- CDR, ISBN , Library of Congress , 2009, pp Póserné O. V.: Az Internet adta hadászati lehetőségek és veszélyek, Robothadviselés 4.
11 11 nemzetközi tudományos konferencia kiadványa, Budapest, 2005, pp , ISBN Póserné O. V.: Informatikai biztonság gyakorlatban, Matematika-, fizika, számítástechnika főiskolai oktatók XXX. konferencia publikációs kiadvány-cd, Pécs, 2006, p. 5, ISBN-13: Póserné O. V. - Katona K. - Szénási S.: A Delphi haladó eszközeinek alkalmazása, Matematika-, fizika, számítástechnika főiskolai oktatók XXX. konferencia publikációs kiadvány-cd, Pécs, 2006, p. 6, ISBN-13: Póserné O. V.: Számítógép-hálózati támadások, Hadmérnök, Robothadviselés 6. tudományos szakmai konferencia Különszám, Budapest, 2006, p. 9, ISSN Póserné O. V.: A távoli munkavégzés biztonsági kérdései, Hadmérnök, Robothadviselés 7. tudományos szakmai konferencia Különszám, Budapest, 2007, p. 9, ISSN Póserné O. V.: A kapcsolók hatása a hálózati biztonságra, Informatika Korszerű Technikái Konferencia 2008, Dunaújváros, 2008, pp , ISBN Póserné O. V. Schubert T.: Informatikai biztonság szakirányú képzés a Budapesti Műszaki Főiskolán, Informatika a felsőoktatásban 2008 konferencia publikációs kiadvány- CD, Debrecen, 2008, p. 8, ISBN Póserné O. V.: A magyar közigazgatás az informatikai biztonság szemszögéből, Bolyai Szemle, XVII. évf. 4. sz., A Robothadviselés 8. Tudományos konferencia előadásainak szerkesztett változata, Budapest, 2008, pp , ISSN
12 12 Curriculum vitae Private dates: Name: Valéria Póserné Oláh Date of birth: Address: 2030 Érd, Takács str. 5. Phone: Education: Zrínyi Miklós National Defense University, correspondence (part time) PhD Training : Kossuth Lajos University, Information technology teacher : Kossuth Lajos University, Programmer Language knowledge: English: intermediate, professional complex C Russian: basic, equivalent with basic C Information technologies knowledge: Assembly languages: C#, Delphi, Pascal, HTML, Basic, PL1 Operation Systems: Windows Server 2003/2008, Novell, Linux, Windows 9x/2000/XP/Vista/ Windows 7, Windows NT Workstation, MS DOS Other: IBM Tivoli Identity Manager, IBM Tivoli Directory Integrator, HP WebInspect, IBM Rational AppScan, PGP, OpenSSH, Access, Word, Excel, PowerPoint Employments: Óbuda University, Budapest, assistant professor College of Dunaújváros, Dunaújváros, assistant professor
13 Szent István University VTI, Budapest, assistant lecturer, head of computer laboratories Csiha Győző Secondary School, Hajdúnánás, teacher of mathematics and Information Technology Üvegipari Művek, Orosháza, programmer Scientific, social organization membership: NJSZT membership Budapest, 22. June Valéria Póserné Oláh
NATIONAL UNIVERSITY OF PUBLIC SERVICE Doctoral Council BRIGADIER GENERAL ZOLTÁN KOVÁCS Author s summary and official reviews of PhD dissertation titled - The National Security Challenges of the Infocommunication
ZRÍNYI MIKLÓS NEMZETVÉDELMI EGYETEM GYÁNYI SÁNDOR Official and author s review of PhD thesis titled Methods of Denial of Service attacks and applicable ways of defense Scientific advisor: Prof. Dr. Kovács
NATIONAL UNIVERSITY OF PUBLIC SERVICES PÉTER VARGA Official and author s review of PhD thesis titled Protecting Wireless Networks of the Critical Information Infrastructures Scientific advisor: Prof. Dr.
MIKLÓS ZRÍNYI NATIONAL DEFENSE UNIVERSITY Doctoral Council MAJOR ENGINEER KÁLMÁN DÉNES PLANNING OF PUBLIC UTILITIES OF TEMPORARY MILITARY CAMPS, WITH ESPECIAL REGARD TO CRISIS MANAGEMENT OPERATIONS AND
MIKLÓS ZRÍNYI NATIONAL DEFENSE UNIVERSITY Doctoral Committee MAJOR GÁBOR HANGYA Using Expert System in the Military Technology Research and Development author s review and official critiques of the entitled
ZRÍNYI MIKLÓS NATIONAL DEFENSE UNIVERSITY Review of the following PhD thesis: Evolution of economic-financial auditing system at defense sector, future trends in its evolution. Comparison of economic-financial
Miklós Zrínyi National Defense University Doctoral Council Major László Kovács ADVANCED ELECTRONIC INTELLIGENCE ASSETS AND PROCESSES AND THEIR USE IN THE HUNGARIAN DEFENSE FORCES PhD dissertation author
Acta Polytechnica Hungarica Vol. 5, No. 4, 2008 The Concept to Measure and Compare Students Knowledge Level in Computer Science in Germany and in Hungary Gábor Kiss Department of Machine and System Engineering,
Teaching Information Technology Service Management for International Groups PH.D. THESIS SUMMARY Krisztina ERDÉLYI 2011 Supervisor: László Zsakó, Ph.D. Informatics Ph.D. School at Eötvös Loránd University,
The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues
MIKLÓS ZRÍNYI NATIONAL DEFENCE UNIVERSITY Doctorate Council Doctoral (PhD) thesis Analysis of the Challenges Faced by the Management of Enforcement Bodies and the Elaboration of the Proposals concerning
Europass Curriculum Vitae Personal information First name(s) / Surname(s) Address(es) Telephone(s) Fax(es) E-mail Nationality Dr. Tibor Szarvák PhD. 28 Mikszáth út, 5000 Szolnok Szarvak.Tibor@abk.szie.hu
Lecturer in the School of Computer Applications Job Description The School of Computer Applications is responsible for the disciplines of computing and quantitative methods within the University and has
Nyugat-Magyarországi Egyetem Sopron Thesis of PhD dissertation Improvement possibilities of the Hungarian Marketing Information Systems according to the analysis of the wood and furniture industries Némethné
The English version of the curriculum for the Doctor of Philosophy programme Psychology is not legally binding and is for informational purposes only. The legal basis is regulated in the curriculum published
Zrínyi Miklós National Defence University Faculty of Kossuth Lajos Military Science Military Science PhD School A résumé of PhD thesis THE EVALUATION OF THE IMPLEMENTATION AND APPLICATION OF MULTIMEDIA-BASED
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
AARMS Vol. 8, No. 1 (2009) 173 178 INFORMATION SECURITY The security of Web applications VALÉRIA PÓSERNÉ OLÁH Budapest Tech, John Von Neumann Faculty of Informatics, Budapest, Hungary The network (LAN)
Postbank P.O.S. Transact GmbH (now EVO Kartenakzeptanz GmbH) has recently been purchased by EVO Payments International Group Program implementation details for merchants Payment Card Industry Data Security
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Curriculum vitae (Dr. Zoltán Tóth) Family name: First name: Sex: Tóth Zoltán male Date of birth: March 19, 1952 Place of birth: Nationality: Marital status: Education: Language: Debrecen, Hungary Hungarian
UNIVERSITY OF PATRAS DEPARTMENT OF MATHEMATICS PROGRAM OF POSTGRADUATE STUDIES (For general information about the Department see the PROGRAM OF UNDERGRADUATE STUDIES) ACADEMIC YEAR 2005-2006 1. GENERAL
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 276 Windows Security Management I. Basic Course Information A. Course Number & Title: CISY-276 Windows Security Management B. Date of Revision: Spring
RULES ON DOCTORAL STUDIES AT THE REYKJAVÍK UNIVERSITY SCHOOL OF LAW Article 1 Doctoral studies (Ph.D.) The Reykjavik University School of Law offers doctoral studies in law. The name of the degree is Ph.D.
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
THESES Lt. Colonel Henrik HEGEDŐS Talent management, development of human resources in the Hungarian Defence Forces Summary of PhD thesis Director of studies: Colonel (Ret.) Dr. habil. János KRIZBAI Zrínyi
, pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business
C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering Education & Training, pp. 16-25, New Orleans, Lousiana, USA,
The English version of the curriculum for the Doctoral programme Catholic Theology is not legally binding and is for informational purposes only. The legal basis is regulated in the curriculum published
Mayur S. Desai Assistant Professor, School of Business, Indiana University Kokomo, Kokomo, Indiana, USA Thomas C. Richards Professor, Business Computer Information Systems Department, The University of
Advanced Curriculum on Intelligent Transport System (ITS) by Means of ICT (TransITS) Aim The aim of this project is to solve or overcome the following main inherent problems the ITS higher education and
Ph.D. in International Business Application Complete and Send Application to: Today s : Please type or print CLEARLY Name (last) (middle) (first) Permanent Address (Post Office Box, Apartment, Street Number
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
MASTER S TRANSATLANTIC FULL-TIME DUAL DEGREE PROGRAM Transportation and Logistic Systems Logistics fuels business This dual Master s degree is supported by the EU-US cooperation in higher education and
CURRICULUM VITAE Personal Information Education Name: Feda M. M. Salah Date of Birth: 18/07/1969 Marital Status: Married Current Address: Amman-Jordan Contact Coordinates Tel No.: 00962 6 Fax No.: 00962
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group firstname.lastname@example.org 1 (604) 961-0701 If you know the enemy and know yourself, you
Eötvös Loránd University Faculty of Humanities Doctoral School of Literary Studies Library Science Subprogram THESES OF THE PhD DISSERTATION Andrea Patkós Hanesz The activity of Máté Kovács in cultural
SCIENCE AND TECHNOLOGY SCHOOL 3 RD CYCLE STUDY PROGRAMMES Study programme Computer Sciences Qualification Awarded: PhD Level of Qualification: 3 rd Cycle Specific Admission Specific arrangements for recognition
1 New Agri-informatics MSc Curricula in the Hungarian Higher Education Herdon, Miklós 1(*) ; Szilágyi, Róbert 1 ; Várallyai, László 1 1 University of Debrecen (*) Hungary Herdon, Miklós Hungary H4032 Debrecen
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
IBM Global Services ISS X-Force Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems Internet Security Systems, an IBM Company Security Market Overview Companies face sophisticated
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Road mapping of curriculum developments and training experiences in agricultural informatics education M. Herdon Department of Business and Agricultural Informatics, Centre of Agricultural Sciences and
Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY 275 UNIX and Linux Security Management I. Basic Course Information A. Course Number & Title: CISY-275 - UNIX and Linux Security Management B. Date of
FY2016 Graduate Program for Social ICT Global Creative Leaders (GCL) Course Student Recruitment 1. Abstract of the GCL program A series of new problems and possibilities are emerging as information and
Degree regulations of the School of Electrical Engineering Approved by the Academic Committee for Electrical Engineering on 7 June 2011. I General provisions Section 1 Mission As a unit defined in Section
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
ZRÍNYI MIKLÓS NATIONAL DEFENSE UNIVERSITY DEPARTMENT OF MILITARY SCIENCE PHD INSTITUTE IN MILITARY TECHNOLOGY KRASZNAY CSABA INFORMATION SECURITY SOLUTIONS OF HUNGARIAN ELECTRONIC GOVERNMENT APPLICATIONS
COMPUTER-AIDED PROCESS MODELLING Theses of Ph.D. dissertation written by ROZÁLIA PIGLER LAKNER Supervisor: Professor Katalin Hangos Information Science Ph.D. School Department of Computer Science University
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 Twest@timwestconsulting.com OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
CIS 156 Firewalls and Intrusion Detection Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Dave White, Steve Sorden Date of proposal
THE MINISTRY OF EDUCATION AND SCIENCE OF THE RUSSIAN FEDERATION Federal state budgetary educational institution of higher professional education Tambov State Technical University FSBEI HPE TSTU BRIEF DESCRIPTION
Diagram of Security Marek Vysoký Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Letná 9, 042 00 Košice, Slovakia email@example.com
APPROVED by Vytautas Magnus University Senate, Decision No. 5-29 of 28 June 2011 REGULATIONS OF DOCTORAL STUDIES IN PSYCHOLGOY SCIENCE FIELD AT VYTAUTAS MAGNUS UNIVERSITY, MYKOLAS ROMERIS UNIVERSITY, CORDOBA
Pál Michelberger * SOME PROBLEMS OF INTRODUCING INTEGRATED BUSINESS MANAGEMENT INFORMATION SYSTEMS 1. INTRODUCING THE INTEGRATED INFORMATION SYSTEM AS A PROJECT Introduction of the information system can
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
ZRÍNYI MIKLÓS NATIONAL DEFENCE UNIVERSITY Doctoral Board CONVERSION, AS ONE OF THE STRATEGIC QUESTIONS OF HUMAN RESOURCE MANAGEMENT OF THE PROFESSIONAL MILITARY a summary of the Ph.D.-thesis of Lieutenant
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
This is an English translation of the original and signed «Promotionsreglement der Graduate School for Health Sciences der Universität Bern» issued in German. The German version is legally valid. Rules
AARMS Vol. 3, No. 4 (2004) 625 631 EDUCATION Process approach to quality management in education SLAVKO POKORNI Military Academy, Belgrade, State Union of Serbia and Montenegro In the past, ISO 9001:1994,
Essay for graduate school social work. 1213 The extended essay component of the International Baccalaureate Diploma Programme, relevant to the point, but typical numbers of pages are around 6080 for MSc
Curriculum vitae Europass Name /First name PURCĂREA, Anca Alexandra Mobil phone 0040.744-523.369 E-mail Nationality firstname.lastname@example.org Romanian Professional experience 2012 to present Dean, Faculty of
Master of Science (MS) in Computer Science Overview of Degree The Master of Science degree in Computer Science at The University of Georgia is a comprehensive program of study intended to give qualified
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business By Masashi SUGIURA* This paper is intended to summarize the security solutions of NEC together with the present
INFORMATION BOOKLET OF THE DEGREE PROGRAM LL.M. IN EUROPEAN AND INTERNATIONAL BUSINESS LAW English version Objectives of the program The program LL.M. in European and International Business Law is a master-level
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
The English version of the curriculum for the PhD Program Management is not legally binding and is for informational purposes only. The legal basis is regulated in the curriculum published in the University
MSc in Computer and Information Security Programme Specification Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and employers.
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
triplec 9(2): 460-465, 2011 ISSN 1726-670X http://www.triple-c.at Social Informatics Today and Tomorrow: Status, Problems and Prospects of Development of Complex Lines in the Field of Science and Education
January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document
FACULTY OF MANAGEMENT THE LEON RECANATI GRADUATE SCHOOL OF BUSINESS ADMINISTRATION Graduate Programs http://recanati.tau.ac.il Graduate Programs Master of Business Administration (MBA) Master of Science
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Theses of the doctoral (PhD) dissertation Integration of Process Simulation and Data Mining Techniques for the Analysis and Optimization of Process Systems Balazs Balasko University of Pannonia PhD School