D a a y y --Z Z e e r r o o A A tttta a c c k
|
|
- Samson Dorsey
- 8 years ago
- Views:
Transcription
1 Cisco Systems Secu r ity 1
2 Self Defending Network Stra tegie I NT EG R AT ED S ECU R I T Y Secure C onnectiv ity T h rea t D ef ens e T rus t & I dentity II nn ii tan t ii aa tt iiiivvnn e e ii tt iziz aa uu tt r ir i vv Ve e e tt rro o bb eded ssrr aass mmee rr aauu tt nnii cc g g aa ll ldld y y ee r r Ne tt zzii mmww pepe rrrr koko ffvv äh e e titi ghgh ke ke ee nn ii ttee ee tt n n ww,, oo BB rr k ek e s d d rr ooaa hbhb uiui ll inin tt y gy g ee n n zz u u ee rrtt kko o ee iinndd nnee eenn n n tt ii,, ff y y zz, u, u pp vv rr eeee rrvv hh ee ii nnnn t t dd,, ee aa rr nn n n d d uu nn d d ss ii cc h h ddaa eedd r r aa npnp et et uutt o o ee n n tt hh rrss ee ii aatt uutt ssaa tt ii oo n n aa nn zz uu pp aa ss ss ee nn ADVANCED S ECU R I T Y T ECH NO LO G I ES Endpoint Security A ppl ica tion F irew a l l SSL V P N N etw ork A nom a l y D etection S Y S T EM LEVEL S O LU T I O NS Endpoints + N etw + P ol icies Serv ices P a rtners h ips ork s 2
3 O O Ständig kleiner werdende R ea ktions fens ter Vu l n e Vr a b iel i t Iy D i s c o v e r e d P EPa PI t c h Is s u e d Pa Et c h ExI p l o i t Is s u epu d b l i s h e d In c i d e n Ex t p l o i t c c u Pu r s b l i s h e d In c i d e n t c c u r s Operation Slot (#vulnerability & resources) B l a s t e r : 2 5 Nachi: Wenn S l a m m e r : d 1 er 8 0 E x p l o i t v o w r i deem w o lp l en a t c S h i e d a en u f tv r io t t r f a l l v er h i nd er n, Nis m el d b a s: t3 3 1 T a g e b ei m a x i m a l er A ns t r eng u ng? Day-Zero Attack 3
4 M E v olu tion der Sic h erh eits a nforderu ngen Vergangenheit NN oo tw end ige M aßnahma en R e a k t i v Au t o m a t i s c h, P r o a k t i v, Ei n z e l p r o d u k t e P r o d u k t - p o s i t i o n i e r u n g I n t e g r i e r t üb e r a l l e S c h i c h t e n Lös u n g s d e s i g n / M n g. S e c. S e r v i c e Üb b ee rr gg rr ee ii ff ee nn dd ee rr Lös s uu nn gg ss aa nn ss aa tt zz 4
5 M Q C is c o Sec u rity V is ion: Üb ergreifender Lös u ngs a ns a tz INTEGRATED S EC U RITY ( P h a s e I) ADAP TIV E TH REAT DEF ENS E ( P h a s e III) C O L L AB O RATIV E S EC U RITY ( P h a s e II) S S L VPN IPS e c VPN D D o S i t i g a t i o n C i s c o S e c u r i t y A g e n t F i r e w a l l s a n d In t r u s i o n D e t e c t i o n En c r y p t e d L A N / W A N C o m m u n i c a t i o n s A V A g e n t Id e n t i t y -B a s e d N e t w o r k i n g u a r a n t i n e VL A N ( R e m e d i a t i o n ) N e t w o r k In f e c t i o n C o n t a i n m e n t C i s c o T r u s t A g e n t N e t w o r k A d m i s s i o n C o n t r o l 5
6 C is c o S ec u rity A gent 6
7 F u nktion Signa tu r-b a s ierter V erfa h ren Tägl ic h neu e, s tänd ig w ec hs el nd e B ed ro hu ngen S ic herheits l üc k en in A nw end u ngen -> P atc h v o m H ers tel l er N eu e Viren -> S ignatu ren v o m A nti-viru s H ers tel l er H o s t I D S -> S ignatu ren v o m H o s t I D S H ers tel l er S t u n d e n T im e l in e Erstes A u f treten Erster Patch Erste S i g n atu r K ri ti scher B erei ch! 7
8 C i s c o S e c u r i t y A g e n t R e g e l b a s i e r t e s V e r f a h r e n Z e r o U p d a t e Regelbasierend ( w h it elist ) K E I N E S ignat u r-u p dat es no t w endig Z ent rale I nst allat io n u nd L iz ensieru ng Erstes A u f treten T im e l in e C C S S A A g g eschütz eschütz tt D D ay ay -Z -Z ero ero Pro Pro tecti tecti o o n n 8
9 C S A i n A c t i o n : S c h u t z g e g e n S l a m m e r S e n d U DP / p a c k e t l o o k i n g fo r M S S Q L O v e o w b u i n M S S Q L S e e rfl ffe r DE/ rv r D ef en se i n D ep th = 3 R eg el n g eg en S l am m er No p e rs i s t re b o o ti n g s y s te m k i l l s w o rm PP ii cc k k ra nn dd oo m m IP aa dd dd re ss ss ee s s aa nn d d ss pp re aa d d to nn ee w w ta rg ee ts Ne tw o rk i s c ri p p l e d b y tra ffi c o v e rl o a d 9
10 G C SA - V erteilu ng der P olic ies üb er P U LL - A ns a tz e n e r i e r u n g d e r A g e n t K i t s V M S 2. 3 CA Agent Kits In s t a l l a t i o n d e r K i t s ( m i t Z e r t i f i k a t ) üb e r VM S 2. 3 R e g i s t r i e r u n g u n d PU L L d e r Po l i c y v i a S S L S S L A g e n t CA S S L CA CA CA CA A g e n t A g e n t A g e n t A g e n t 10
11 N etw o rk A d m is s io n C o ntro l 11
12 W H a u p tu rs a c h e für V irenb efa ll Wo w a r d e r R e m ot e -U s e r m i t s e i n e m L a p t op? H Q WAN F l u g h a fe n, H o te l, L AN H o ts p o ts Etc Au s s e n s te l l e n Te l e w o rk e r B ei sp i el S l am m er Netzwerkausfall d urc h D D o s A ttac ken Für A usb rei tun g war led i g li c h ei n e K o n fi g uri erte I P -A d resse erfo rd erli c h S o g ar d i e b este Fi rewall i st g eg en I n fekti o n i m i n n eren m ac h tlo s 12
13 C is c o Network A dm V orteile is s ion C ontrol: Ein int e g r ie r t e s S y s t e m : E nd geräte S ic herheits l ös u ngen k ennen S ic herheits s tatu s R b m K o o u Z u ic htl iniens erv er es tim en nf rm ität nd gangs regel n N etz w erk z u gangs geräte s etz en Z u gangs ric htl inien d u rc h 13
14 QQ Network A dm is s ion C ontrol in A c tion C l i en t b au t V erb i n d u n g De s k to p au f A u then ti f i z i eru n g u n d Üb erp rüf u n g d er Po l i cy ( C i sco S ecu re A C S ) C i s c o Tru s t Ag e n t Si Re m e d i a ti o n C o rp o rate N et Z u g a n g e r l a u b t Z u g a n g v e r w e i g e r t Q u a r a n tän e R e m e d i a ti o n uu aa ra nn ti nn e e VV LL AN 14
15 O O NA C Logic a l C om Shipping and NAC2 p onents N E W N A C 2 H o s t Ne t w o r k Ac c e s s De v i c e No n-r e s p o ns i v e Au d i t S e r v e r GAME V e nd o r S e r v e r S e c ur i t y A p p C T A Many V e nd o r s p e n L i c e ns e P r o g r am S h i p p i n g Plug-i n s C T A C T A NT, X P, , E AP o U DP E AP o x E AP o U DP R o u t e r s ( 8 x x -7 5 x x ) V P N R ADI U S AAA S e r v e r C i s c o S e c u r e AC S H C AP Many V e nd o r s p e n L i c e ns e P r o g r am NAC2 R e d H at L i nu x E AP o x S w i t c he s ( , , , , ) W i r e l e s s AP & W L S M NR Au d i t S e r v e r AP I I ni t i al v e nd o r s i nt e g r at e d 15
16 m C O L L A B O R A T I V E S E C U R I T Y P a rtnerp rogra m Üb e r 6 0 P a rtn e r m i t d u tz e n d e n b e re i ts V e rfüg b a re n An w e n d u n g e n ANTI V IRU S REM EDIATIO N AU DIT C L IENT S EC U RITY 16
17 F irew al l L ös u ngen: C is c o A S A F W S M 17
18 Vorstellung d er C i sc o A d a p ti v e S ec uri ty A p p li a nc e Ad a p t i v e T h re a t D e fe n s e u n d V P N Lös u n g e n Ad a p ti v e T h r e a t D e f e n s e u n d F l e x i b l e V P N Lös u n g i n e i n e m G e r ät Ap p l i k a ti o n s s i c h e rh e i t, W u rm / V i ru s Ab w e h r, M a l w a re -S c h u tz, Th re a t-p ro te c te d V P N u n d u m fa n g re i c h e Ne tz w e rk fu n k ti o n e n M i n i m i e r t I n b e tr i e b n a h m e - u n d B e tr i e b s k o s te n P l a ttfo rm S ta n d a rd i s i e ru n g, z e n tra l e s M a n a g e m e n t E r w e i te r b a r e T e c h n o l o g i e g e g e n z u k ün f ti g e B e d r o h u n g e n S p e z i a l h a rd w a re, Ad a p ti v e Erk e n n u n g u n d En ts c h ärfu n g s a rc h i te k tu r e rm ög l i c h t n o c h n i e d a g e w e s e n e Erw e i te rb a rk e i t u n d Ri c h tl i n i e n k o n tro l l e Die C is c o A SA Series 18
19 M Cisco ASA 5500 Se r ie Konvergenz von rob u s t en, m a rk t erp rob t en T ec h nol ogi en a rk e t-p ro v e n Te c h n o l o g i e s Ad a p ti v e Th re a t De fe n s e, S e c u re C o n n e c ti v i ty Firewall Technology C is co P I X A p p I ns p ect ion, U s e E nf orcem ent, W eb C ont rol A p p licat ion S ecu rit y N W I P S Technology C is co I P S -A V Technology C is co I P S, A V V P N Technology C is co V P N M alware/ C ont ent D ef ens e, A nom aly D et ect ion A nt i-x D ef ens es Traf f ic/ A d m is s ion C ont rol, P roact iv e R es p ons e N et work C ont ainm ent & C ont rol N et work I nt elligence C is co N et work S erv ices S ecu re C onnect iv it y I P S ec & S S L V P N 19
20 m C is c o A SA P rodu ktline Lös u n g e n für S M B b i s h i n z u m G ro ßu n t e rn e h m e n C i s c o AS A C i s c o AS A C i s c o AS A Z iel m ar k t S M B u n d S M E U n te rn e h m e n Gro ßu n te rn e h m e n Listenp r eis a b $ 3, a b $ 7, a b $ 1 6, Leistungsdaten Max F i r e w al l d u r c hs at z Max C o n. T hr e at Mi t i g at i o n Max I P S e c V P N Du r c hs at z Mb p s Mb p s Mb p s 45 0 Mb p s Mb p s Mb p s Mb p s 45 0 Mb p s Mb p s D ienste der B asisp l attf o r m Ap p F W, I P S e c u nd S S L V P N, A/ S H A ( U p g. ), 3 F E t o 5 F E W i e , z u s ät z l i c h A/ A F ai l o v e r, V P N C l u s t e r i ng, 4 G E + 1 F E W i e j e d o c h i t höhe r e r L e i s t u ng u nd S k al i e r b ar k e i t 20
21 C i sc o A S A O S 7. 0 A p p li c a ti on I nsp ec ti on I ns p ec tio n E ngine C ap ab il ities Ap p l i c a ti o n P o l i c y E n f o r c e m e n t P r o to c o l C o n f o r m a n c e C h e c k i n g P r o to c o l S ta te T r a c k i n g S e c u r i ty C h e c k s NAT / P AT S u p p o r t D y n a m i c P o r t Al l o c a ti o n M u l ti m e d i a / V o i c e o v e r IP H v 1-4 S I P S C C P ( S k i nny) G T P ( 3 G W i r e l e s s ) MG C P R T S P T AP I / J T AP I S p e c i fi c Ap p l i c a ti o n s Enhanced NN ew Enhanced Mi c r o s o f t W i nd o w s Me s s e ng e r Mi c r o s o f t Ne t Me e t i ng R e al P l aye r C i s c o I P P ho ne s C i s c o S o f t p ho ne s C o re In te rn e t P ro to c o l s H T T P F T P T F T P S MT P / E S MT P DNS / E DNS I C MP T C P U DP Da ta b a s e / O I L S / L DAP O r ac l e / S Q L * Ne t ( V 1 / V 2 ) Mi c r o s o f t Ne t w o r k i ng NF S R S H S u nr P C / NI S + X W i nd o w s ( X DMC P ) S e c u ri ty S e rv i c e s S S e rv i c e s I K E I P S e c P P T P C i s c o S y s t e m s, I n c. A l l r i g h t s r e Cisco s e r v e d. Con f id e n t ia l N D A U se O n l y 21 NN ew NN ew NN ew NN ew NN ew 21
22 s C i sc o A S A O S 7. 0 Active-Active F a il o ver Active-Active F a il o ver Ad d s M u l tigro u p H S R P s ty l e a ctive-a ctive fa il o ver a s a l tern a tive to ex is tin g a ctive/ p a s s ive fa il o ver E ffectivel y d o u b l es th ro u gh p u t o f fa il o ver p a ir S u p p o rt fo r a s y m m etric ro u tin g l evera ges H A p a ir b id irectio n a l s ta te s h a rin g fo r res il ien cy in m u l ti-h o m ed n etw o rk s L evera ges s ecu rity co n tex ts a rch itectu re to p ro vid e a s ca l a b l e H A Ne ww ii n !! L i c e n s e d F e a tu re a i l a b l e o n e 5 1 5, a n d p l a w i U F O l i c e n s e s Av th E, tfo rm th R/ -AA C o nt e x t 1 Ac t i v e P I X CC oo nt ee xx t t 22 SS tt and bb y IS P P 11 Ne tw oo rk CC oo nt ee xx t t 11 SS tt and bb y P I X C o nt e x t 2 Ac t i v e 22 Cisco Con f id e n t ia l N D A U se O n l y IS P P 22 22
23 C i sc o A S A O S 7. 0 M u l ti-c o n tex t S ecu r ity S er vices Security Contexts (Virtual Firewalls) lower operational costs Reduce overall management and support costs b y h osti ng multi ple vi rtual f i rew alls i n a si ngle appli ance E nab les th e logi cal parti ti oni ng of a si ngle C i sco P I X S ecuri ty A ppli ance i nto multi ple logi cal f i rew alls, each w i th th ei r ow n uni q ue poli ci es and admi ni strati on E ach contex t provi des th e same pri mary f i rew all f eatures provi ded b y a standalone C i sco P I X S ecuri ty A ppli ance S upports up to contex ts, dependi ng on platf orm I deal soluti on f or enterpri ses consoli dati ng multi ple f i rew alls i nto a si ngle larger appli ance, or servi ce provi ders w h o of f er managed f i rew all or h osti ng servi ces Ne ww ii n !! L i c e n s e d F e a tu re Av ai l ab l e o n t he 5 1 5, E, and p l at f o r m s w i t h U R / F O l i c e ns e s. T i e r s : 5, 1 0, 2 0, 5 0, and c o nt e x t s. Dept/C u s t 1 Dept/C u s t 2 Dept/C u s t 3 Dept/C u s t N Dept/C u s t 1 Dept/C u s t 2 Dept/C u s t 3 Dept/C u s t N PIX PIX PIX PIX P IX C i s c o S y s t e m s, I n c. A l l r i g h t s r e Cisco s e r v e d. Con f id e n t ia l N D A U se O n l y 23 23
24 C i sc o A S A O S 7. 0 Layer2 Firewall Ne ww ii n !! T ra n s p a ren t F irew a l l p ro vid es ra p id d ep l o y m en t s ecu rity s ervices S im p l ifies a n d s p eed s d ep l o y m en t o f s ecu rity s ervices in to S M B a n d E n terp ris e n etw o rk en viro n m en ts P rov id es ab ility to rapid ly d rop in Cisco P I X Security A ppliances into existing network s with out req uiring any ad d ressing ch ang es D eliv ers h ig h -perf orm ance stealth L 2 -L 7 security serv ices and prov id es protection ag ainst network layer attack s Seam less security appliance integ ration in com plex routing, h ig h av ailab ility, and m ulticast env ironm ents I d ea l fo r en viro n m en ts w ith l im ited I T res o u rces / b u d get T r ans p ar e nt F i r e w al l R o u t e r / 2 4 P IX / 2 4 R o u t e r S AME S u b ne t C i s c o S y s t e m s, I n c. A l l r i g h t s r e Cisco s e r v e d. Con f id e n t ia l N D A U se O n l y 24 24
25 m C i sc o A d a p ti v e S ec uri ty D ev i c e M a na ger v 5. 0 C i s c o AS DM v 5.0 d e l i v e rs e x te n s i v e IP S m a n a g e m e n t a n d o n i to ri n g o f a s i n g l e C i s c o AS A a p p l i a n c e S u p p o rts fu l l c o n fi g u ra ti o n o f: - En g i n e s - S i g n a tu re s - Th re a t Ri s k Ra ti n g - IP S Ac ti o n s - An d m o re! S u p p o rts m o n i to ri n g o f: - Ev e n ts - Di a g n o s ti c re p o rts - S e n s o r s ta ti s ti c s A S A I n t r o CC ii ss cc o o SS yy ss tt ee mm s s,, II nn c c.. AA ll l l rr ii gg hh tt s s rr ee ss ee rr vv ee d d.. 25
26 Firewall Service M o d u l High Performance Firewall I ntegriert in C ataly s t S witch V ergleichb ar Pix 6. 3 / 7. 0 L ay er 2 od er L ay er 3 Firewall V irtu elle Firewall Fu nk tionen U nters tütz t V L A N s Performance K ein I D S u nd k ein V PN 5, 5 G b it D u rchs atz K neu e V erb ind u ngen / s ec 1 M illion gleichz eitige V erb ind u ngen 3 M p p s FWSM 26
27 W Remote Access VPN eb VPN 27
28 V P N D ien s t e für j ed en Robuste I P S ec - un d S S L -V P N D i en ste A n wen d u n g s fall B ranch O f f i ce S i te-to-s i te S up p l y P artner E x tranet ZZ uu ga nn gs ss zz en aa rien : S i te -to -S i te, M a n a g e d D e s k to p, E m p l o y e e D e s k to p, K i o s k A c c e s s V o l l e r o d e r e i n g e s c h r än k te r N e tz w e r k z u g a n g P a r tn e r Z u g a n g P u b l i c In te rn e t Account Manager Mob i l e U s er E m p l oy ee at H om e U nm anaged D es k top AS A KK oo nn vv ee rr gg ee nn zz vv oo n n II PP SS ee c c,, WW ee bb VV PP N N,, FF ii rr ee ww aa ll l l : Üb e r w a c h u n g v o n V P N V e r b i n d u n g e n R e m o te A c c e s s V P N I n f r a s tr u k tu r i n e i n e m G e r ät Z e n tr a l e, e i n h e i tl i c h e B e n u tz e r v e r w a l tu n g O p ti m a l e V e r f üg b a r k e i t I n te g r i e r te L a s tv e r te i l u n g B ietet s icheren Z u gang für j ed en B enu tz er v on j ed em O rt in einem G erät mit u mfas s end em M anagement 28
29 W eb V P N : SSL -B as iert er R em o t e A cces s E r m ög l i c h t si c h er en Rem otez ug r i f f oh n e C l i en t W eb P a ge Z u griff ( H T T P / H T T P S ) R em o te E -M a il Z u griff O u tl o o k ( M AP I ), O W A, P O P, I M AP, S M T P, N o tes, in o tes F il e Z u griff a u f U n tern eh m en s s erver W in d o w s C I F S F il e S h a res via W eb I n terfa ce F l ex ib l e L o gin O p tio n en, in d ivid u el l a n p a s s b a r für u n ters ch ied l ich e B en u tz ergru p p en G ru p p en -b a s ierte Z u ga n gs k o n tro l l e P o rt F o rw U n ters tütz u n g a l l er gän gigen U n tern eh m en s w eiten Au th en tis ieru n gs m ech a n is m en a rd in g Z u ga n g z u T C P -b a s ierten T h ick C l ien t An w en d u n gen W eb -B a s iertes M a n a gem en t U m fa s s en d e K o n figu ra tio n u n d Üb erw a ch u n g KK oo ss te nn ll oo ss ee r SS SS L L VV PP N Tri aa l l ii mm BB aa ss ii ss pp re ii ss ee nn th aa ll te n n KK ee ii nn ee PP ee r-fr F ee aa tu re LL ii cc ee nn ss e e! 29
30 C ustom i z a b le A p p li c a ti on A c c ess Al l l SS SS L L VV PP N N FF eatures II ncl ud ed ii n BB as e PP ri ci ng NN o SS pp eci al LL ii cens es!! Deployment Examples: Extend i ng A ppr opr i ate C onnec ti v i ty CC CComp is co any SS SS -M L L anaged VV PN TT uu nneling DD es kk top CC: lient CC Pers ontrolled is tent, ss oftware L AA NN -lik env e ironment network ed connectiv ity KK AAnown cces s ss s ecu to vv rity irtu ppally os tu any re && ap ss pp yy lication ss tem pp riv ileges DD UUiv tiliz ers es ap ss mall, pp lication dd yy namically req uu irements load ed client Pos BB es t-s t es op sstion for clean-u bb road p p op ap tional pp lication acces ss L AA NN -lik e remote connectiv ity dd es ired Home/ CC lientles KK ios s s k k,, WWAA cces eb -B s s as : ed AA cces ss UU RRncontrolled ev ers e pp rox env y y firewalled ironment - ss connection uu pp pp ort is ss uu es UU AAnk cces nown s s to ss ecu web rity -b as pp os ed tu ap re pp && lications ss yy ss tem and pp riv CCileges itrix LL imited NN o ss oftware ap pp lication dd ownload acces ed s s allowed Pos BB es tu t re op as tion ss es for ss ment, limited pp os web t-s es ap ss pion p lication clean-u acces p p req s s uu and ired CC uuuu nmanaged s s tomiz acces dd kk s s top pp ortal ss often dd es irab le Partner TT hin CC AAlient cces Port s s : Forward ing UU ncontrolled RR ev ers e pp rox env y y firewalled ironment - ss uconnection u pp pp ort is ss uu es UU nk AA cces nown s s to ss ecu web rity,, , pp os tu calend re && ss yy ar, ss tem II M M and p p riv ileges many other VV ery TT CC P granu ap pp lications lar acces s s controls Pos SS mall tu re JJ as av ss a es ap ss ment, pp let dd yypp namically os t-s es ss ion load clean-u ed p p req uu ired CC uubb ss es tomiz t op ed tion acces for limited s s pp ortal web often and dd es client/ irab le s s erv er ap pp lications and uu nmanaged dd es kk top ss 30
31 C SD in A ct io n 31
32 C i sco VPN L ösu n g en I n teg r a ted S er v i ce Rou ter 32
33 M C is co I n t eg rat ed Services R o u t er I n teg r a ted S er v i ces Rou ter u l ti s e rv i c e Ac c e s s Ro u te r S w i tch i ng, rou ti ng W i rel es s E ncry p ti on, F i rew al l, I D S / I PS S p ra c h - u n d S i c h e rh e i ts - P ro z e s s o re n C ontent D el i v ery V oi ce & I PT A O N L i efert S i ch erh ei t, p aral l el e D aten-, S p rach - u nd V i d eod i ens te i n L ei tu ng s g es ch w i nd i g k ei t B es ch l eu ni g t A nw end u ng s b erei ts tel l u ng u nd red u z i ert K os ten u nd K omp l ex i tät B ei s p i el l os e D i ens te, L ei s tu ng s fäh i g k ei t u nd I nv es ti ti ons s ch u tz s ch affen neu e Mög l i ch k ei ten für K u nd en 33
34 MM Cisco Integrated Services Router The Right Ro u ter f o r E v er y O f f ic e Office Size Performance and Services Density M ark ets SS eries H i gh es t D ens i ty and P erf orm ance f or C oncurrent S erv i ces SS eries E m b ed d ed, Ad v anced V oi ce, V i d eo, D ata & S ecuri ty S erv i ces H i gh P erf orm S ecure B road b and and W Enterprise ance I ntegrated S ecuri ty & D ata Enterprise Branch Office i rel es s C onnecti v i ty M ed iu m B u siness S m al l Branch S m a l l B u siness oo dd uu ll aa r SS eries FF ix ed New Models f or S m a ll O f f i c es SS ee ri ee ss S m al l R em o te Offices T el ew o rk er S ing l e S ite S m al l Bu siness 34
35 G E G E MM VV Cisco Integrated Security Architecture Integrated Hardware Security Serv ices B u i l t-i n V P N Ac c e l e ra ti o n H ig h P erf o rm a nc e C ry pto o f f l o a d 3 D ES / A ES Enc ry ptio n U p to 4 x f a ster th a n prev io u s ro u ters S e c u re V o i c e P V D M M o d u l es S u ppo rt S R T P A ES Enc ry ptio n H i g h P e rfo rm a n c e AIM O ptio na l A I M -V P N P L U S 3 D ES, A ES & C o m pressio n U p to 1 0 x f a ster th a n prev io u s ro u ters U S B P o rt R em o v a b l e S ec u re C red entia l s FF II PP SS Po ww G E G E ee r r aa ff HH WW II CC HH WW II CC HH WW HH WW II CC II CC VPN EE VV M AIM AIM UU SS BB UU SS BB II KK E E CC rr ac kk HH II PP AA AA Man in the Middle NN ME BB AA K K DD EE S S CC rr ac kk oo II P P SS ec uu rr ity CC ommon Hard ware AA rchitectu re od uu lar DD es ign II nv es tment Protection 35
36 Cisco Router and Security Device Manager (( SDM) ff or Sim pp ll if ied Managem ent O ne tou ch rou ter lock -d own, au to s ecu re K nowled geb as e of T A C recommend ed configu rations B u ilt-in G U I av ailab le for all , , s eries I nd u s try lead ing rou ter and s ecu rity management tool for: V P N F i re w a l l, IP S S ta ti c / Dy n a m i c Ro u ti n g Q o S, NB AR L AN/ W AN/ V L AN In te rfa c e s One Touch R R out er er L L ock - d d ow ow n, n, A A ut uto S S ecur e 36
37 GG Adv anced Secure Connectiv ity Faster Deployment, Reduced Configuration VV 33 PN BB ee ss t ii n n cc ll aa ss s s QQ oo S S ww ii th IP SS ee c c VV PP Ns fo r mm uu ll ti ss ee rv ii cc ee hh ii gg hh - qq uu aa ll ii ty,, jj ii tte r-frer e e vv oo ii cc e e,, vv ii dd ee o o aa nn d d hh ii gg hh -p p ri oo ri ty dd aa ta II PS ec EE as yy VV PN Re mm oo te Ac cc ee ss s s hh uu b b aa nn d d ss pp oo kk e e VV PP Ns uu ss ii nn g g cc ee nn tra ll ii zz ee d d pp oo ll ii cc y y pp uu ss hh VV irtu aliz ed SS erv ices SS uu pp pp oo rt mm uu ll ti pp ll e e oo rg aa nn ii zz aa ti oo nn s s ww ii th oo vv ee rl aa pp pp ii nn g g IP aa dd dd re ss ss ee s s ww hh ii ll e e mm aa ii nn ta ii nn ii nn g g ss ee pp aa ra ti oo n n oo f dd aa ta,, ro uu ti nn g g,, aa nn d d pp hh yy ss ii cc aa l l ii nn te rfa cc ee ss Cost Effectively Ensuring Information Integrity and P rivacy II PS ec DD yy namic MM uu ltip oint VV PN (( DD MM VV PN )) ZZ ee ro to uu cc h h pp ro vv ii ss ii oo nn ii nn g g,, dd yy nn aa mm ii c c mm ee ss h h VV PP N tu nn nn ee ll ss RR E E // II PS ec with DD yy namic RR ou ting LL ee vv ee ra gg e e th e e bb ee ss t ro uu ti nn g g ii n n th e e bb uu ss ii nn ee ss s s fo r mm aa xx ii mm uu m m cc oo nn tro l l aa nn d d fl ee xx ii bb ii ll ii ty Internet = D M V P N T u nnel P E C u sto m er A C u sto m er B C u sto m er C w w w.c i s c o.c o m / g o / i p s e c 37
38 DMV P N - E ncryp ts V oice T raf f ic D y n a m i c & P e r m a n e n t S p o k e A -t o -H u b a n d S p o k e B -t o -H u b I P s e c t u n n e l s f o r e n c r y p t i o n o f s i g n a l i n g t r a f f i c b e t w e e n s a n d C a l l M a n a g e r H u b D y n a m i c & T e m p o r a r y S p o k e A -t o -S p o k e B I P s e c t u n n e l f o r e n c r y p t i n g m e d i a t r a f f i c b e t w e e n t w o c o n f e r e n c i n g s t a t i o n s S p o k e B S p o k e A S i g n a l i n g t r a f f i c Me d i a t r a f f i c N O T E b l a c k = u n e n c r y p t e d, c o l o r = e n c r y p t e d 38
39 O M O s V oice/ V ideo V P N s ( V 3 P N ) C i s c o IO S V P N Ro u te rs o r V P N Ap p l i a n c e s V o i c e, V i d e o i n te g ra ti o n w i th IP S e c C i s c o IP P h o n e 7 9 x x P h o n e h a n d s e t w i th i n te g ra te d Q o S V P N a i n ffi c e VV PP NN PP II XX L AN I P I P Re m o te ffi c e C i s c o C a l l M a n a g e r C a l l s e tu p a n d s i g n a l i n g ; H o s t IDS p ro te c ti o n C i s c o IO S V P N Ro u te rs / Ap p l i a n c e s In te g ra te d W AN, V P N, a n d v o i c e g a te w a y fo r re m o te o ffi c e s P IX o r IO S F i re w a l l S ta te fu l l y i n s p e c ts C i s c o IP Te l e p h o n y a n d V i d e o s tre a m 39
40 Cisco E asy V P N Z entra l e B ro w ser-b a siertes G U I a u f C isc o 8 0 0, 9 0 0, C isc o P I X F W & C V P N I nternet C isc o I O S R o u ter, V P N C o nc entra to r, P I X F irew a l l C isc o 8 0 0, S eries R o u ter, C isc o P I X F W, C V P N C isc o , , S eries, C isc o P I X F irew a l l, C V P N U nters tütz u ng v on d y namis chen V PN V erb ind u ngen E rlau b t k leine b is s ehr große E inführu ngen ohne A nwend erinterv ention Ei n fa c h e K o n fi g u ra ti o n Au to m a ti s c h e r V e rb i n d u n g s a u fb a u P o n g u o n s c h n e l l e s l l a o n E k V R D I C V D G B re -K fi ra ti für In ta ti rz wingt ons is tente PN Policy au f allen emote ev ices nterop erab ility üb er alle is co PN ev ices hinweg arantierte as is fu nk tionalität mit and eren Hers tellern 40
41 S ecurity M anagement 41
42 Security Managem ent P roduk tüb ersich t S ec u ri ty A u d i to r C S -M A R S D ev i c e M g rs S ec u ri ty M a na g er S D M V M S 2.3 C V D M A S D M C W -S IM S C o nf ig u ra tio n A u d iting C isc o S ec u rity M a na g em ent S u ite M itig a tio n S e s s io n N u m b e r P r e s e n ta tio n _ ID M o nito ring S ec u ri ty M a na g er A na l y sis 42
43 Cisco Mitigation and Response System (MARS) Next Generation SIM/STM Nutzung d e r v o r h a nd e ne n Ne tzw e r k i nf r a s tr uk tur zur S i c h e r h e i ts a na l y s e D a te nk o r r e l l i e r ung i m k o m p l e tte n Ne tz N I D S, Firewall, R ou ter, S witches, C S A S y s log, S N M ev ent logs P, R D E P, S D E E, N etflow, E nd p oint S c h ne l l e L o k a l i s i e r ung v o n A ngr i f f e n und E i nl e i tung v o n G e ge nm a ßna h m e n K e y F e a tur e s M e l d e t S e c u ri ty incidents b a s i e re n d a u f D ev ice m essa g es, ev ents, u n d sessio ns I w e e n g p h i s c h i n d e p o l o g i e d a e s l l ncidents rd ra r to rg te t g e n m a a h m e n a u L 2 p o u n d L 3 n Ge ßn f rts Ge räte S k a l i e rb a rk e i t a u c h i n k o m p l e x e re n U m g e b u n g e n 43
44 CS-MA RS Üb ersich t und K ontrol l e 44
45 P N -MA RS Datenk orrel ierung Genaue Darstellung des Angriffsweges H o A P o S c a T a X, f o l l o w b y H o A B u f f O v l o w A c k T a X W h X v u l b l A c k, f o l l o w b y T a X u o a c k o T a Y st rt ns rg et ed st er erf tta to rg et ere is nera e to tta ed rg et ex ec tes pa ssw rd tta n rg et 45
46 CS-MARS E inl eitu ng v on G egenmaßnah men Nutzung d e r A b w e h r m ögl i c h e i te n i nne r h a l b d e s Ne tzw e r k s p h i s c h e l l u n g d e s L a y e 2 a c k p a Gra Da rs te r 3 tta th. Ge g e n m a ßn a h m e n w e rd e n a u f d e m Ne tz w e rk g e rät d u rc h g e füh rt. S w i tc h C i s c o M ARS k o n fi g u ri e rt Ge g e n m a ßn a h m e n R o ute r F i r e w a l l ] 46
47 47
1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).
PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a
More informationH ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct
H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili
More informationApplication Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m
More informationFirst A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a
More informationACE-1/onearm #show service-policy client-vips
M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere
More informationG ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1
More informationEM EA. D is trib u te d D e n ia l O f S e rv ic e
EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es
More informationW Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e
More informationi n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner
í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo
More informationm Future of learning Zehn J a hr e N et A c a d ei n E r f o l g s p r o g r a m Cisco E x p o 2 0 0 7 2 6. J u n i 2 0 0 7, M e sse W ie n C. D or n in g e r, b m u k k 1/ 12 P r e n t t z d e r p u t
More informationSIV for VoiceXM 3.0: a n g u a g e a n d A p p l ica t ion D es ig n C on s id era t ion s Ken Rehor C i s c o S y s t em s, I nc. krehor@cisco.com March 05, 2009 G VoiceXM Application Architecture PSTN
More informationCampus Sustainability Assessment and Related Literature
Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626
More informationM P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h
More informationDevice I n s t r u m en t a t io n E x a m p l es : I P S L A s & N et F l o w Presented by Emmanuel Tychon Techni cal M ark eti ng Eng i neer TU D resden, J anuary 1 7 th 2 0 0 7 1. C is co I O S I P
More informationData Center end users for 40G/100G and market dy nami c s for 40G/100G on S M F Adam Carter Ci s c o 1 W Now that 40GbE is part of the IEEE 802.3ba there will be a wid er array of applic ation s that will
More informationB a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8
U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te
More informationEnterprise Data Center A c h itec tu re Consorzio Operativo Gruppo MPS Case S t u d y : P r o g et t o D i sast er R ec o v er y Milano, 7 Febbraio 2006 1 Il G r u p p o M P S L a B a n c a M o n t e d
More informationSCO TT G LEA SO N D EM O Z G EB R E-
SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e
More informationW h a t is m e tro e th e rn e t
110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv
More informationCollaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9
More informationIronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t
More informationSCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel
More informationVideo og IP TV - h v or da n p هv ir k es n et t v er k en e? t t a d A c c o u n t M a n a g S P / T o m S m t Ole-P et er R s er elec eg en 1 Hva gjorde vi u t en T V.... 2 2 0 0 m il l s am t idige
More informationC o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t
More informationCisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1 N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n
More informationPSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB
M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah
More informationI n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y
I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr
More informationM Fast forward into th e fu tu re Accelerating b u s ines s o p p o rtu nity and natio nal p ro s p erity Viktor Kovacs anaging D irecto r H u ngary & Ad riatic R egio n C h a n g e t h e w o r l d» O
More informationHow To Know If You Are A Good Or Bad Person
QuesCom I P -T E L E F O N I E & G S M -G A T E W A Y S Robert Urban D i rec tor I nternati onal S al es Agenda Üb e r Q u e s C o m K u n d e n M a r k t üb e r s i c h t Q u e s c o m Lös u n g Q u e
More informationCIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e
More informatione Videobewaking ov er I P Marty K n o p e rt 1 A l l m z u l l b t g r u m a k h w k h w k z a l z r E p r m a r k t t c m a r k t Video vision: e vor en va n video en in de na ij e oek om st eb ik en
More informationAN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.
AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip
More informationDer Bologna- P roz es s u nd d i e S t aat s ex am Stefan Bienefeld i na Service-St el l e B o l o g n a d er H R K Sem in a r D er B o l o g n a P ro z es s U m s et z u n g u n d M it g es t a l t u
More informationErfa rin g fra b y g g in g a v
Erfa rin g fra b y g g in g a v m u ltim e d ia s y s te m e r Eirik M a u s e irik.m a u s @ n r.n o N R o g Im e d ia N o rs k R e g n e s e n tra l fo rs k n in g s in s titu tt in n e n a n v e n d
More informationFORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o
More information/* ------------------------------------------------------------------------------------
Pr o g r a m v a r e fo r tr a fik k b e r e g n in g e r b a s e r t p å b a s is k u r v e m e to d e n n M a tr ix * x M a tr ix E s ta lp h a B e ta ; n M a tr ix * z M a tr ix ; g e n M a tr ix X
More information1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1.
1. O b l a s t r o z v o j s p o l k a S U U K 1. 1. Z v y š o v á n í k v a l i f i k a c e Š k o l e n í o S t u d e n t s k á u n i e U n i v e r z i t y K a r l o v y ( d á l e j e n S U U K ) z í
More informationUNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application
More informationw ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -
E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D
More informationJ a re k G a w o r, J o e B e s te r, M a th e m a tic s & C o m p u te r. C o m p u ta tio n In s titu te,
1 4 th IE E E In te r n a tio n a l S y m p o s iu m o n H ig h P e r fo r m a n c e D is tr ib u te d C o m p u tin g (H P D C -1 4 ), R e s e a rc h T ria n g le P a rk, N C, 2 4-2 7 J u ly 2 0 0 5.
More informationW Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9
More information3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.
C i s c o P r o f i l e C o n t a c t s & F e e d b a c k H e l p Cisc o SM B Sup p ort Assist ant Configure ASA/PIX as Easy VPN Server or Client H om e > W ork W it h M y Sec urit y D ev ic es > Cisc
More informationM Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@
More informationA n d r e w S P o m e r a n tz, M D
T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f
More informationVictims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years
Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957
More informationPositioning 40 and 100 GbE in data center inter-sw itch l ink ap p l ications and 40GbE PM D recom m endations Adam Carter, Cisco Al essan dro B arb ieri, Cisco 1 m Data Center inter-s w itc h l ink ap
More informationproxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->
Overview of the New S ec u rity M od el WP6 Meeting V I D t G R I D C o nf er enc e B r c el o ne, 1 2-1 5 M y 2 0 0 3 Overview focus is on VOMS C A d e t il s r e in D 7. 6 Se cur it y D e sig n proxy
More informationB rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g...
V e lf rd s s e k re ta ria te t S a g s n r. 1 4 3 4 1 5 B re v id. 9 9 3 9 7 4 R e f. S O T H D ir. tlf. 4 6 3 1 4 0 0 9 s o fie t@ ro s k ild e.d k G o d k e n d e ls e s k rite rie r fo r p riv a tin
More informationPractice Writing the Letter A
Aa Practice Writing the Letter A A a A a Write a in the blank to finish each word. c t re h d Write A in the blank to finish each word. nn US ndy Bb Practice Writing the Letter B B b B l P b Write b in
More informationIT-S i c h e r h e i t Stephan Meier s m eier@ c is c o. c o m 1 The Evolution d er Z iele Vom H ob b y i s t e n z u m P r of e s s i on a l T hreats b ec o m ing inc reas ing l y d if f ic u l t to d
More informationOntwikkelingen van R o u ter N etwer ken Fred Rabouw 1 3-t i e r R o u t e r N e t w e r k e n. Core: forwarden van grote h oeveel h eden data. D i s tri b u ti e: Cl as s i fi c eren en fi l teren A c
More informationG S e r v i c i o C i s c o S m a r t C a r e u ي a d e l L a b o r a t o r i o d e D e m o s t r a c i n R ل p i d a V e r s i n d e l S e r v i c i o C i s c o S m a r t C a r e : 1 4 ع l t i m a A c
More informationThe Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys
More informationPut the human back in Human Resources.
Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect
More informationT ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility
T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility V. Ravi Ans human Indian Ins titute of Manag ement B ang alore Rajes h Chakrabarti Indian S chool of Bus ines
More informationUnit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.
More informationO s OAM Requirements for 40/100 GE Eth ernet AI S? Gary Nicholl C is co S ys t e m I E E E 8 0 2. 3 b a T as k F orce M arch 1 8, 2 0 0 8 rlan d o, F L 1 O O O O Background E t h e r n e t i s r a p i
More informationInternationalization strategy of the SEPT Program Design of market-oriented training and ed u c ation p rod u c ts Utz D o r n b e r g e r ( Un i v e r s i ty o f L e i p zi g ) & N g u y e n T h i T h
More informationMPLS VPN (RFC2547bis) Seminar P c h i u p c h i. i u p c h i @ c i s c c Umberto os mberto@ os t os o. om Umberto P os c h i 1 MPLS What i t I s N o t an d What I t I s MPLS IS NOT a mechanism that allows
More informationIntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at
More informationG d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0
More informationWorkload Management Services. Data Management Services. Networking. Information Service. Fabric Management
The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e
More informationUsing Predictive Modeling to Reduce Claims Losses in Auto Physical Damage
Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today
More informationCOMTECH 2005 Dresden Ci sc o I P - Tel efo ni e i n der P ra x i s Dirk E b e rh a rd t I n t e rn e t w o rkin g C o n s u l t a n t 1 Aktuelle M a r ktz a h len Kundenzahl s t ei g t w ei t er an 28,000+
More informationBewährte Six Sigma Tools in der Praxis
Frankfurt School of Finance & Management 2. ProcessLab-Workshop 03.2.2008, 8h Bewährte Six Sigma Tools in der Praxis A. Raab BB Certified GE Commercial Finance Agenda Intro Teaser Vortrag Break Out Sessions
More information<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
Applicazioni Java W S con Ax is sistema di tr ac c iab il ità ag r o al imen tar e Ing. Mario G.C.A. Cimino M.G.C.A.Cimino, Applicazioni Java-W S con Ax is, D ipar t ime nt o d i I ng e g ne r ia d e ll
More informationCisco Connected Real Estate Lead the Experience Can Habib Vertical Sales Manager C entral & E astern E u ro p e 1 yy Trends Shaping the Future of Buildings PP oo pp uu ll at io n GG rr oo ww tt hh Doubled
More informationUnderstanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1
Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes
More informationEmerging Security T h rea ts Maurizio Taffone m t affone@ c is c o. c om P rod uc t Manag er S ec urit y E urop ean Mark et s 1 Agenda Trends in Motivation E x ist ing t h rea t s a nd L e s s ons f r
More informationT c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r.
D a t a b a n k m r in g R a p p o r t M Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r I d e n t if ic a t ie v a n d e m S e c t o r BJB V o lg n r. 06 013-0009 0 V o o r z ie n in g N ie u w la
More informationOverview of Spellings on www.spellzoo.co.uk
Overview of Spellings on www.spellzoo.co.uk Year 1 Set 1: CVC words Set 2: CVC and CCVC words Set 3: CVC, CCVC and CCVCC words Set 4: Words containing 'ch', 'sh', 'th' and 'wh' Set 5: Words ending in 'll',
More informationCREATE SHAPE VISUALIZE
SHAPE VISUALIZE B I M E q u i t y BIM Workflow Guide SHAPE VISUALIZE Introduction We o e to t e r t ook i t e BIM Workflow erie I t e o owi ter we wi o er e eryt i eeded or you to ter t e i o re ti i d
More informationCisco Security Agent (CSA) CSA je v í c eúčelo v ý s o f t w a r o v ý ná s t r o j, k t er ý lze p o už í t k v ynuc ení r ů zný c h b ezp ečno s t ní c h p o li t i k. CSA a na lyzuje c h o v á ní a
More informationCORSO AVANZATO DI NEGOZIAZIONE Un laboratorio intensivo per lo sviluppo e la pratic a d elle c apac ità neg oz iali Scotwork Italia S.r.l. C op y rig h t 2 0 0 6 1 O I m p l t l t z o l N o z n n l h l
More informationSoftware Quality Requirements and Evaluation, the ISO 25000 Series
Pittsburgh, PA 15213-3890 Software Quality Requirements and Evaluation, the ISO 25000 Series PSM Technical Working Group February 2004 Dave Zubrow Sponsored by the U.S. Department of Defense Background
More informationHow to Subnet a Network How to use this paper Absolute Beginner: Read all Sections 1-4 N eed a q uick rev iew : Read Sections 2-4 J ust need a little h elp : Read Section 4 P a r t I : F o r t h e I P
More informationB I N G O B I N G O. Hf Cd Na Nb Lr. I Fl Fr Mo Si. Ho Bi Ce Eu Ac. Md Co P Pa Tc. Uut Rh K N. Sb At Md H. Bh Cm H Bi Es. Mo Uus Lu P F.
Hf Cd Na Nb Lr Ho Bi Ce u Ac I Fl Fr Mo i Md Co P Pa Tc Uut Rh K N Dy Cl N Am b At Md H Y Bh Cm H Bi s Mo Uus Lu P F Cu Ar Ag Mg K Thomas Jefferson National Accelerator Facility - Office of cience ducation
More informationB R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m
Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g
More informationOnline Department Stores. What are we searching for?
Online Department Stores What are we searching for? 2 3 CONTENTS Table of contents 02 Table of contents 03 Search 06 Fashion vs. footwear 04 A few key pieces 08 About SimilarWeb Stepping up the Competition
More informationCisco Unified Com m u nica t ions M a na g er 6. 0 I S A M, E d u c N o N o b 2 7, 2 0 0 7 Christian Greve atio n rthw est vem er 2 0 0 7 C i s c o S y s t e m s, I n c. A l l r i g h t s r e s e r v e
More informationThe SmartView Tracker
CHAPTER 5 S m a r tv ie w T r a c k e r In This Chapter The Need for Tracking p ag e 8 9 The C heck P oint S olu tion for Tracking p ag e 9 0 Tracking C onsiderations p ag e 9 6 Tracking C onfigu ration
More informationd e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o
P o s t a w y s p o і e c z e t s t w a w o b e c o s у b n i e p e і n o s p r a w n y c h z e s z c z e g у l n y m u w z g lb d n i e n i e m o s у b z z e s p o і e m D o w n a T h e a t t i t uodf
More informationBonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance
More informationCisco D a t a Ce n t e r N e t w or k A r ch it e ct u r e 1 What is Cisco Data Center? Cisco Systems Core Technologies A d v a nced Technologies Switching R o u ting D a ta C e nte r W ir e l e s s U
More informationCUSTOMER INFORMATION SECURITY AWARENESS TRAINING
CUSTOMER INFORMATION SECURITY AWARENESS TRAINING IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l
More informationR e t r o f i t o f t C i r u n i s g e C o n t r o l
R e t r o f i t o f t C i r u n i s g e C o n t r o l VB Sprinter D e s c r i p t i o n T h i s r e t r o f i t c o n s i s t s o f i n s t a l l i n g a c r u i s e c o n t r o l s wi t c h k i t i n
More informationOpis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu
O p i s p r z e d m i o t u z a m ó w i e n i a - z a k r e s c z y n n o c i f U s ł u i s p r z» t a n i a o b i e k t ó w G d y s k i e C eo n t r u m S p o r t us I S t a d i o n p i ł k a r s k i
More informationHow To Be A Successful Thai
D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i
More informationMS IN EARLY CHILDHOOD STUDIES
MS IN EARLY CHILDHOOD STUDIES Child Development (CD) C D001 - T h eo r ies of C h i ld D eve l opm e nt Demo ns t rate a n understand i ng of theories and concepts o f ch ild deve lo pme nt. C D002 - K
More informationHeliophysics Integrated Observatory Coordinated Data Analysis Workshop
Heliophysics Integrated Observatory Coordinated Data Analysis Workshop 24 th of October 2011 Trieste Architecture and Demonstrations http://www.helio-vo.eu Mapping the General Science Use Case to an Architecture
More informationOPENBARE ZITTING 1. U ni f o r m e a l g e m e ne p o l i t i e v e r o r d e ni ng e n p u nc t u e l e i m p l e m e nt a t i e GAS ( g e m e e nt e l i j k e a d m i ni s t r a t i e v e s a nc t i
More informationUFPA Brazil. d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t
A v a n ç o s n o P la n o d e C o n tr o le d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t A n to n io A b e lé m a b e le m @ u fp a.b r Agenda In tr o d u ç ã o C
More informationU S B Pay m e n t P r o c e s s i n g TM
U S B Pay m e n t P r o c e s s i n g T h a t s S m a r t P r o c e s s i n g TM USB was simple to enroll in. They had competitive rates and all the fees were listed clearly with no surprises. Everyone
More informationTsukuba Recent Trends in Higher Education in Japan I. In t e r n a t i o n a l i z a t i o n o f J a p a n e s e U n i v e r s i t i e s II. C h a n g i n g U n i v e r s i t i e s i n J a p a n Hiroshi
More informationThuraya XT-LITE Simple. Reliable. Affordable.
Thuraya XT-LITE Simple. Reliable. Affordable. www.thuraya.com Follow us on /thurayatelecom Stayi n g c on n ec ted has n ever b een thi s eas y. In trodu c i n g T hu raya X T -LIT E, the wo r l d s be
More informationMiddagserie Eschatologie Oosterparkkerk, Amsterdam, December 2007
Amserdam m Middagserie Eschalgie Oserparkkerk, Amserdam, December 2007 Onderweg na a r rgen Serie kerkdiensen ver chriselijke ekm sverw a ching f escha lg ie A m s e r d a m D e c e m b e r 2 0 0 7 V r
More informationM Official Bologna S e m inar Joint d e gr e e s- A H allm ar k of t h e E u r op e an H igh e r E d u cat ion A r e a? R e s u l t s o f q u e s t i o n n a i r e s e n t t o B o l o g n a F o l l o w
More informationASCENT TM Integrated Shipment Management
ASCENT TM Integrated Shipment Management Software Solutions Production mail Shipping systems Copier systems Facsimile systems Mailing systems Management services Financial services Consulting Supplies
More informationCreating a best fit between Business Strategy and Web Services Capabilities using Problem Frames Modeling approach
Creating a best fit between Business Strategy and Web Services Capabilities using Problem Frames Modeling approach Anju Jha 1, Karl Cox 2 & Keith T. Phalp 3 1 School of Computer Science and Engineering
More informationGlasCraft Air Motor Repair Kits
Parts GlasCraft ir Motor Repair Kits 30393B ENG For replacing wear items used on GlasCraft air motors. For professional use only. Not for use in explosive atmospheres. Models M-325, M-500-02, GC2267, GC2273
More information