International Journal of Combinatorial Optimization Problems and Informatics. E-ISSN:

Size: px
Start display at page:

Download "International Journal of Combinatorial Optimization Problems and Informatics. E-ISSN: 2007-1558 editor@ijcopi.org"

Transcription

1 International Journal of Combinatorial Optimization Problems and Informatics E-ISSN: International Journal of Combinatorial Optimization Problems and Informatics México Ruiz-Vanoye, Jorge A.; Díaz-Parra, Ocotlán; Nolazco-Flores, Juan Arturo; Canepa Saenz, Ana; Hernández, Víctor H.; Mendoza Gongora, Heriberto Quality Function Deployment (QFD) House of Quality for Strategic Planning of Computer of SMEs International Journal of Combinatorial Optimization Problems and Informatics, vol. 4, núm. 1, eneroabril, 2013, pp International Journal of Combinatorial Optimization Problems and Informatics Morelos, México Available in: How to cite Complete issue More information about this article Journal's homepage in redalyc.org Scientific Information System Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Non-profit academic project, developed under the open access initiative

2 International Journal of Combinatorial Optimization Problems and Informatics, Vol. 4, No. 1, Jan-April 2013, pp ISSN: Quality Function Deployment (QFD) House of Quality for Strategic Planning of Computer of SMEs Jorge A. Ruiz-Vanoye 1, Ocotlán Díaz-Parra 1, Juan Arturo Nolazco-Flores 2, Ana Canepa Saenz 1, Víctor H. Hernández 1, Heriberto Mendoza Gongora 1 1 Universidad Autónoma del Carmen, México. 2 Tec de Monterrey Campus Monterrey, México. Abstract: This article proposes to implement the Quality Function Deployment (QFD) House of Quality for strategic planning of computer security for Small and Medium Enterprises (SME). The House of Quality (HoQ) applied to computer security of SME is a framework to convert the security needs of corporate computing in a set of specifications to improve computer security. Keywords: House of Quality, QFD, Computer, SMEs. 1. Introduction The Small and Medium Enterprises (SMEs), Small and Medium Businesses (SMBs) or Very Small Enterprises (VSEs) are companies with fewer than 10 employees (Micro enterprises), 50 employees (small) and those with fewer than 250 (medium). In most economies, smaller enterprises are much greater in number [1]. The use of the strategic planning in questions of computer security is an excellent mechanism to administer aspects of security in any SME. Ruiz-Vanoye et al. (2008) [2] are the first to propose to apply the strategic planning for the computer security. The methods of strategic planning for computer science security are: The of recommendations and threats (RT ), The of mechanism and vulnerabilities (MV ), The of vulnerabilities, recommendations, threats and mechanism (VRTM ), and the quantitative strategic planning for computer science security (QSPM-CSS). Ruiz-Vanoye et al. (2012) [3] apply the strategic planning for the computer science security of network and systems in SMEs with the following characteristics: easy to understand, easy to apply, and economical in its adoption. This paper proposes to implement the Quality Function Deployment (QFD) House of Quality for strategic planning of computer security for Small and Medium Enterprises Received Jul 30, 2012 / Accepted Dec 6, 2012 Editorial Académica Dragón Azteca (EDITADA.ORG)

3 (SME). The House of Quality (HoQ) applied to computer security of SME is a framework to convert the security needs of corporate computing in a set of specifications to improve computer security. The paper is organized as describing the House of Quality for Strategic Planning of Computer to the SMEs, the results, discussion and the conclusions. 2. Related Works Louis Cohen [4] proposed a four-phase Quality function deployment (QFD) model in a discussion of product development; these phases respectively consist of customer requirement planning (CRP), product characteristics deployment (PCD), process and quality control (PQC), and the operative instruction (OPI). The CRP phase of the QFD model consists of use of a, known as the House of Quality (HOQ), which uses matrices to show multiple relationships between customer requirements and technical specifications. Quality function deployment (QFD) is a widely-used methodology for developing a design quality aimed at satisfying the customer and translating the customer s demand into design targets [5]. Quality function deployment (QFD) is an effective tool that can aid in moving towards a more proactive product development [5]. The idea of introducing quality at the design stage was developed for manufacturing processes by Taguchi to ensure what he called "robust quality" (Taguchi and Clausing 1990[6]). This idea is also the foundation of the "house of quality" of Hauser and Clausing (1988) [7]. Quality Function Deployment (QFD) was developed in Japan by Shigeru Mizuno and Yoji Akao, first implemented in Mitsubishi in 1972, later adopted in US in 1983 [8]. Quality has been one of the competitive strategies in the global market. To ensure quality companies have adopted the Total Quality Management (TQM) as a part of success in business goals and have used TQM methods (such as function development of Quality or Quality Function Deployment-QFD) for the design of process control. 40

4 QFD was applied to many industrial problems such as product design, strategic planning, renewal of a telecommunications wiring closet, and improved customer service. The basic concept of QFD is to translate the desires of consumers in product design or characteristics and parts. Each translation uses a called House of Quality (HoQ) to identify customer requirements and prioritize Design Requirements (DRs) to meet customer requirements. HOQ displayed in a showing the customer requirements in rows and columns design requirements; their relationships within the, and their correlations or dependencies of the design requirements on top of the. HOQ also uses a weighting scale to indicate the degree of strength between customer requirements and design requirements. QFD was originally created by Mitsubishi in 1972 [8]. The House of Quality has been used for the determination of an optimal set of requirements for the design of the problem of improving indoor air quality [9]. The House of Quality has been used mainly in the production of related products manufacturing. For example for the manufacturing process of metal [10]. To prioritize knowledge management of data storage solutions and data mining systems for Taiwan's international airport [11]. Charuenporn [12] proposes a new way of developing Quality of Service QoS-SM using Qos ontology mapping with two information system standards, COBIT and ITIL, as a result of which new Qos-SM are developed, by represents the metrics in the form of a class diagram, thus facilitating its application in the organization. Kim Dohoon [13] proposes an integrated framework of House of Quality (HoQ) and analytical hierarchy process (AHP) for the improvement of network-based ASP services. The proposed integrated framework successfully finds key functional elements, such as business customization and security/failure management, to reengineer the service delivery process, thereby helping service providers develop better ASP services to improve QoE effectively and efficiently. 41

5 This paper propose to implement the Quality Function Deployment (QFD) House of Quality for strategic planning of computer security for Small and Medium Enterprises (SME). 3. House of Quality for Strategic Planning of Computer The House of Quality applied to computer security of SME is a framework to convert the security needs of corporate computing in a set of specifications to improve computer security. The House of Quality for the strategic planning of computer security includes:. It is one of inputs of the House of Quality and It is defined the analysis, interviews, assessing risks and vulnerabilities in computer security, among others. The relationship. This is the dimension where requirements correspond or match with characteristics or specifications the improvement of the computer security.. Product features or specifications to improve computer security focus on how to should implement the security aspects of the enterprise.. In this stage is classified as strongly positive, positive, negative, strongly negative and none.. The result of the relationship is compared with the security products available on the market. And is used to enhance weaknesses identified in the comparison.. In this section, the relationship begins to analyze and measure with computer security plan of the related with the times, costs and difficulties.. This is the assessment of the improvements to computer security and the specifications or characteristics of the computer security.. Herein determining the goals that must be obtained to improve the computer security of SMEs. 42

6 # Rows Ruiz-Vanoye et al. / Quality Function Deployment (QFD) House of Quality for Strategic Planning of Figure 1. Methodology of House of Quality applied to computer security. The process for making the House of Quality for information security of SME consists of the following steps: 1.-Make a list of 10 computer security needs of the (CSR) from interviews and vulnerability analysis. And the ranks assigned section for information security needs of the. It also determines the relative importance (RI) of each of the needs with values between 0 (unimportant) to 10 (very important). Table 1. Needs of Computer. requirements of the 1 RI1 CSR1 2 RI2 CSR2 n RIn CSRn 43

7 SC1 SC2 SC3 SC4 SC5 SC6 SC7 SC8 SC9 SC10 SC11 SC12 SC13 SC14 SC15 Ruiz-Vanoye et al. / Quality Function Deployment (QFD) House of Quality for Strategic Planning of Figure 2. Computer Requeriments of the Company. 2.- Determine 15 security (SC) that focus on how you should implement the security aspects in the. And assigns in the columns for the features section of the computer security. Tabla 2. characteristics. # Column

8 SC1 SC2 SC3 SC4 SC5 SC6 SC7 SC8 SC9 SC10 SC11 SC12 SC13 SC14 SC15 Ruiz-Vanoye et al. / Quality Function Deployment (QFD) House of Quality for Strategic Planning of Figure 3. characteristics in the HoQ. 3.- Develops the evaluation corresponding to the of relationship. Assigns to the strong relationship (9), Ο moderate relationship (3), or? weak relationship (1) where the needs corresponding or match the characteristics or specifications to improve computer security. Table 3. Matrix of relationship. CSR1 Ο?? CSR2? Ο?? Ο? CSRn Ο? Ο 45

9 Figure 4. Matirx of relationship in the HoQ. 4.- Assigns 5-10 to computer security products on the market at competitive benchmark section. products will serve to improve the weaknesses identified in the. Rate 0 to 5, where 0 is the worst rating of the product that solves the weaknesses of the and 5 the best. 46

10 P 1 P 2 P 10 Ruiz-Vanoye et al. / Quality Function Deployment (QFD) House of Quality for Strategic Planning of Table 4. Competitive Figure 5. Competitive in HoQ. 47

11 5.- Determines the time and computational costs of each solution, and the difficulty required to implement the business plan according to computer security in the technical details section. Assign between 0 to implementation that is easy to perform and 10 if it is extremely difficult. Table 5.. Time T1 T2 T3 T15 Cost C1 C2 C15 Difficulty D1 D2 D15 Figure 6. in HoQ. 48

12 6.- Calculate the importance of improve the information security and allocate in the section technical benchmark from 0 (unimportant) to 10 (very important). Table 6.. I1 I2 I3 I15 Figure 7. in HoQ. 7.- Determine the goals to be fulfilled at the time of improve the information security, and assign to the goals section. Table 7.. G1 G2 G3 G15 49

13 Figure 8. in the HoQ. 8.- Rate the correlation between each of the security features and assign to the strongly positive correlation, the positive correlation, the negative correlation, if the objective is to minimize, if the objective is to maximize, x if the goal is only the fulfillment of the activity. 50

14 Figure 9. Matrix. 51

15 Document Capacitation Document Software Software Software Configuration Software Document Configuration Configuration Configuration 1 month,$ HRS,$ week,$0 2 months,$ week+,$ weeks,$ weeks,$0 1 week,$0 1 week,$0 2 months,$ week,$0 1 week,$0 Weight Create the Recovery Plan Capacitation of the administrator of Computer Science Create a form and a security policy to access the servers Buy a intrusion detection system Instal a intrusion detection system Buy and install an antivirus Configure the filter to the download of files attached to the s Copy from the server the updates to a local server Create a form and a incident policy Implement a device of the router between the Interner Service Provider and the main switch of the Disable the access of the usb device Configure a password in the BIOS to the Computers Company CISCO SYMANTEC AVAYA TELMEX MICROSOTF Ruiz-Vanoye et al. / Quality Function Deployment (QFD) House of Quality for Strategic Planning of 4. Experimentation The general idea of this research is to determine if it is possible to use the concepts of House of Quality to determine the information security of small and medium enterprises. The experimentation was conducted by the methodology House of Quality for Strategic Planning of Computer of SMEs. It was necessary to create a solution based on information technology applied to of House of Quality for computer security of SMEs. The technological solution was applied to a SME of Campeche state. Symbols strong relationship 9 Ο moderate relationship 3 w eak relationship 1 x positive correlation (strong) positive correlation negative correlationa negative correlation (strong) to minimize to maximice fulfill the activity Direction of Improvement: Minimize ( ), Maximize (), or Target (x) Column # x x x x x Competitive (0=Worst, 5=Best) Company CISCO CHARACTERISTICS OF SECURITY SYMANTEC AVAYA TELMEX MICROSOTF Needs of Computer of the Company(1) Disaster Recovery Plan Log of incidents Physical Intrusion Detecion System Antivirus Filters of spams Update of Operating Systems Log of access Administrator of Computer Intrusers in the w ireless 5 3 Ο Ο Ο Ο (time, cost) Difficulty (0=Easy to Accomplish, 10=Extremely Difficult) () Figure 10. House of Quality of the PYME. 5. Conclusions The strategic planning of computer security can be seen as a military strategy, if the security strategies are not effective neither product on the world will protect the from aspects of computer security. As future work plans to conduct a research of the Total Quality Management (TQM) or Quality Function Depolyment (QFD) as applied to computer security for SMEs. 52

16 References [1] DaeSoo, K., Ow, T.T., Minjoon, J.: SME strategies: an Assessment of High vs. Low Performers. Communications of ACM, Vol. 51, No. 11 (2008) [2] Ruiz-Vanoye, J.A., Díaz-Parra, O., Ponce-Medellín, I.R., Olivares-Rojas, J.C.: Strategic Planning for the Computer Science. WSEAS Trans. Comput., Vol. 5, No. 7 (2008) [3] Ruiz-Vanoye, J.A., Díaz-Parra, O., Zavala-Díaz, J.C.: Strategic Planning for Computer Science of Networks and Systems in SMEs. African Journal of Business Management, Vol.6, No. 3 (2012) [4] Cohen, L.: Quality Function Deployment: How to Make QFD Work for You Addison-Wesley Publishing Company, New York, [5] Sullivan, L.P: Quality Function Deployment. Quality Progress, Vol. 19, No. 6 (1986) [6] Taguchi, G., Clausing, D.: Robust quality. Harvard Business Review (1990) [7] Hauser, J., Clausing, D.: The house of quality. Harvard Business Review Vol. 3 (1988) [8] Shigeru, M., Akao, Y.: Quality Function Deployment: A Wide Quality Approach (in Japanese), JUSE Press, [9] Taeho, P., Kwang-Jae, K.: Determination of an optimal set of design requirements using house of quality. Journal of Operations Management, Vol. 16, No. 5 (1998) , [10] Lowe, A., Ridgway, K., Atkinson, H.: QFD in new production technology evaluation. International Journal of Production Economics, Vol. 67, No. 2 (2000) [11] Gin-Shuh, L., Ji-Feng, D., Chun-Kai, W.: Applying fuzzy quality function deployment to prioritize solutions of knowledge management for an international port in Taiwan. Knowledge-Based Systems, Vol. 33 (2012) [12] Charuenporn, P., Intakosum, S.:Qos- Metrics Based on ITIL and COBIT Standard for Measurement Web Services. Journal of universal computer science, Vol. 18, No. 6 (2012) [13] Dohoon, K.: An integrated framework of HoQ and AHP for the QOE improvement of network-based ASP services. Annals of telecommunications, Vol. 65, No. 1-2 (2010) [14] Kogure, M., Akao, Y.: Quality Function Deployment and Company Wide Quality Control in Japan: a strategy for assuring that quality is built into products. Quality Progress (1983)

Strategic planning for computer science security of networks and systems in SMEs

Strategic planning for computer science security of networks and systems in SMEs African Journal of Business Management Vol. 6(3), pp. 762-779, 25 January, 2012 Available online at http://www.academicjournals.org/ajbm DOI: 10.5897/AJBM10.1615 ISSN 1993-8233 2012 Academic Journals Full

More information

Quality Function Deployment

Quality Function Deployment PRODUCT BRIEF DEVELOPMENT TOOLS Quality Function Deployment In a few words: The voice of the customer translated into the voice of the engineer. To design a product well, a design teams needs to know what

More information

QUALITY FUNCTION DEPLOYMENT (QFD) FOR SERVICES HANDBOOK MBA Luis Bernal Dr. Utz Dornberger MBA Alfredo Suvelza MBA Trevor Byrnes

QUALITY FUNCTION DEPLOYMENT (QFD) FOR SERVICES HANDBOOK MBA Luis Bernal Dr. Utz Dornberger MBA Alfredo Suvelza MBA Trevor Byrnes International SEPT Program QUALITY FUNCTION DEPLOYMENT (QFD) FOR SERVICES HANDBOOK MBA Luis Bernal Dr. Utz Dornberger MBA Alfredo Suvelza MBA Trevor Byrnes SEPT Program March 09 Contents DEFINITION...

More information

Integrating Kano's Model into Quality Function Deployment to Facilitate Decision Analysis for Service Quality

Integrating Kano's Model into Quality Function Deployment to Facilitate Decision Analysis for Service Quality Proceedings of the 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics, Vancouver, Canada, June 19-21, 2007 226 Integrating Kano's Model into Quality Function Deployment to

More information

QUALITY FUNCTION DEPLOYMENT AS A STRATEGIC PLANNING TOOL

QUALITY FUNCTION DEPLOYMENT AS A STRATEGIC PLANNING TOOL QUALITY FUNCTION DEPLOYMENT AS A STRATEGIC PLANNING TOOL Burcu DEVRİM İÇTENBAŞ Atılım University Department of Industrial Engineering E-mail: bdevrim@atilim.edu.tr Hande ERYILMAZ Atılım University Department

More information

IMPROVING MOBILE SERVICES DESIGN: A QFD APPROACH. Xiaosong Zheng, Petri Pulli

IMPROVING MOBILE SERVICES DESIGN: A QFD APPROACH. Xiaosong Zheng, Petri Pulli Computing and Informatics, Vol. 26, 2007, 369 381 IMPROVING MOBILE SERVICES DESIGN: A QFD APPROACH Xiaosong Zheng, Petri Pulli Department of Information Processing Science University of Oulu, FIN-90570

More information

Software Process Improvement Framework Based on CMMI Continuous Model Using QFD

Software Process Improvement Framework Based on CMMI Continuous Model Using QFD www.ijcsi.org 281 Software Process Improvement Framework Based on CMMI Continuous Model Using QFD Yonghui CAO 1, 2 1, School of Economics & Management, Henan Institute of Science and Technology, Xin Xiang,

More information

Using Data Mining to Identify Customer Needs in Quality Function Deployment for Software Design

Using Data Mining to Identify Customer Needs in Quality Function Deployment for Software Design Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Corfu Island, Greece, February 16-19, 007 170 Using Data Mining to Identify Customer Needs in Quality

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Y. H. Liang Department of Information Management, I-SHOU

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

CHAPTER 6 QUALITY ASSURANCE MODELING FOR COMPONENT BASED SOFTWARE USING QFD

CHAPTER 6 QUALITY ASSURANCE MODELING FOR COMPONENT BASED SOFTWARE USING QFD 81 CHAPTER 6 QUALITY ASSURANCE MODELING FOR COMPONENT BASED SOFTWARE USING QFD 6.1 INTRODUCTION Software quality is becoming increasingly important. Software is now used in many demanding application and

More information

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds Original Article Healthc Inform Res. 2010 June;16(2):89-99. pissn 2093-3681 eissn 2093-369X Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds Woo-Sung

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

INTEGRATION OF ANALYTICAL TECHNIQUES FOR SERVICE MANAGEMENT LOGISTICAL COORDINATION AT THE COLOMBIAN SHIPBUILDING INDUSTRY WILSON ADARME JAIMES 1

INTEGRATION OF ANALYTICAL TECHNIQUES FOR SERVICE MANAGEMENT LOGISTICAL COORDINATION AT THE COLOMBIAN SHIPBUILDING INDUSTRY WILSON ADARME JAIMES 1 INTEGRATION OF ANALYTICAL TECHNIQUES FOR SERVICE MANAGEMENT LOGISTICAL COORDINATION AT THE COLOMBIAN SHIPBUILDING INDUSTRY WILSON ADARME JAIMES 1 1 Industrial Engineering, Production Specialist, MSc Industrial

More information

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Presented by: Kristen Zarcadoolas, Jim Soenksen, and Ed Sale PART 2: plan, act, repeat (from the look, plan,

More information

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

N e t w o r k E n g i n e e r Position Description

N e t w o r k E n g i n e e r Position Description Position Title: Group/Division/Team Network Engineer Business Technology Services / IT Operations Division Date October 2011 Reports to Roles Reporting to This Primary Objective Decision Making Authority

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information

Free ITIL v.3. Foundation. Exam Sample Paper 1. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass

Free ITIL v.3. Foundation. Exam Sample Paper 1. You have 1 hour to complete all 40 Questions. You must get 26 or more correct to pass Free ITIL v.3. Foundation Exam Sample Paper 1 You have 1 hour to complete all 40 Questions You must get 26 or more correct to pass Compliments of Advance ITSM www.advanceitsm.com 1. What is the main reason

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Assessment of Prioritization Strategies of the Requirements Gathering

Assessment of Prioritization Strategies of the Requirements Gathering Assessment of Prioritization Strategies of the Requirements Gathering Mohd Shafaat Hussain M. Tech. Scholar, Department of Computer Science and Engineering, Al-Falah School of Engineering and Technology,

More information

Certified Software Quality Assurance Professional VS-1085

Certified Software Quality Assurance Professional VS-1085 Certified Software Quality Assurance Professional VS-1085 Certified Software Quality Assurance Professional Certified Software Quality Assurance Professional Certification Code VS-1085 Vskills certification

More information

QRadar SIEM 6.3 Datasheet

QRadar SIEM 6.3 Datasheet QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar

More information

II. Supports the department in implementing the strategy established by management.

II. Supports the department in implementing the strategy established by management. Position Description: Network Security Engineer Department: Information Technology Division: Information Technology FLSA: Exempt Location: Griffiss Revised: January 2016 Overview: The Network Security

More information

STUDY OF SPI FRAMEWORK FOR CMMI CONTINUOUS MODEL BASED ON QFD

STUDY OF SPI FRAMEWORK FOR CMMI CONTINUOUS MODEL BASED ON QFD STUDY OF SPI FRAMEWORK FOR CMMI CONTINUOUS MODEL BASED ON QFD 1,2 YONGHUI CAO 1 School of Economics & Management, Henan Institute of Science and Technology 2 School of Management, Zhejiang University,

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

RANKING REFACTORING PATTERNS USING THE ANALYTICAL HIERARCHY PROCESS

RANKING REFACTORING PATTERNS USING THE ANALYTICAL HIERARCHY PROCESS RANKING REFACTORING PATTERNS USING THE ANALYTICAL HIERARCHY PROCESS Eduardo Piveta 1, Ana Morra 2, Maelo Penta 1 João Araújo 2, Pedro Guerrro 3, R. Tom Price 1 1 Instituto de Informática, Universidade

More information

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

University of Central Florida Class Specification Administrative and Professional. Information Security Officer Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team

More information

Description: Setting Strategic Change Priorities

Description: Setting Strategic Change Priorities Date: 28 October 2015 9:00-16:00 Activity: Post-Conference Seminar for World Quality Forum Location: Budapest, Hungary Program: One Day Seminar (lunch included) [four sessions of 1.5 hours each] Title:

More information

ITIL V3 Foundation Certification - Sample Exam 1

ITIL V3 Foundation Certification - Sample Exam 1 ITIL V3 Foundation Certification - Sample Exam 1 The new version of ITIL (Information Technology Infrastructure Library) was launched in June 2007. ITIL V3 primarily describes the Service Lifecycle of

More information

JUNIPER NETWORKS CUSTOMER SUPPORT CENTER (CSC) OVERVIEW GUIDE

JUNIPER NETWORKS CUSTOMER SUPPORT CENTER (CSC) OVERVIEW GUIDE JUNIPER NETWORKS CUSTOMER SUPPORT CENTER (CSC) OVERVIEW GUIDE Getting the most from Juniper Networks Award-winning Customer Support Center (CSC) is as easy as 1, 2, 3 1 2 Set up your CSC account with a

More information

A STUDY ON THE INTEGRATION OF QFD-PMMM IN CLOUD COMPUTING SYSTEM QUALITY. Received June 2010; accepted September 2010

A STUDY ON THE INTEGRATION OF QFD-PMMM IN CLOUD COMPUTING SYSTEM QUALITY. Received June 2010; accepted September 2010 ICIC Express Letters ICIC International c ISSN 88-8X Volume, Number (A), April pp. 7 A STUDY ON THE INTEGRATION OF QFD-PMMM IN CLOUD COMPUTING SYSTEM QUALITY Chih-Had Chen, Shing-Han Li, Mark Hwang and

More information

I E 361. Jennifer Tapke Allyson Muller Greg Johnson Josh Sieck. House of Quality. Steps in Understanding the House of Quality

I E 361. Jennifer Tapke Allyson Muller Greg Johnson Josh Sieck. House of Quality. Steps in Understanding the House of Quality I E 361 Jennifer Tapke Allyson Muller Greg Johnson Josh Sieck House of Quality Steps in Understanding the House of Quality House of Quality Steps in Understanding the House of Quality Introduction Every

More information

INTERNATIONAL SYMPOSIUM ON QFD 2003-ORLANDO THE FIFTEENTH SYMPOSIUM ON QUALITY FUNCTION DEPLOYMENT. December 12-13, 2003 Orlando, Florida

INTERNATIONAL SYMPOSIUM ON QFD 2003-ORLANDO THE FIFTEENTH SYMPOSIUM ON QUALITY FUNCTION DEPLOYMENT. December 12-13, 2003 Orlando, Florida INTERNATIONAL SYMPOSIUM ON QFD 2003-ORLANDO THE FIFTEENTH SYMPOSIUM ON QUALITY FUNCTION DEPLOYMENT December 12-13, 2003 Orlando, Florida This collection of QFD papers and case studies is the companion

More information

ITIL v3 Service Manager Bridge

ITIL v3 Service Manager Bridge ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode)

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Processes and Best Practices Guide (Codeless Mode) HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Processes and Best Practices Guide (Codeless Mode) Document Release Date: December, 2014 Software Release

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi

ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING. Mehran G. Nezami Wai M. Cheung Safwat Mansi Proceedings of the 10 th International Conference on Manufacturing Research ICMR 2012 ADOPTION OF OPEN SOURCE AND CONVENTIONAL ERP SOLUTIONS FOR SMALL AND MEDIUM ENTERPRISES IN MANUFACTURING Mehran G.

More information

Designing MS Supply Chain Management program using quality function deployment

Designing MS Supply Chain Management program using quality function deployment Designing MS Supply Chain Management program using quality function deployment Kamran Rashid, M.M. Haris Aslam Abstract - Course design is an important component in the success of academic programs. The

More information

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

INFORMATION TECHNOLOGY INFRASTRUCTURE ANALYST

INFORMATION TECHNOLOGY INFRASTRUCTURE ANALYST JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION INFORMATION TECHNOLOGY INFRASTRUCTURE ANALYST Employees in this job function as information technology (IT) professionals serving as

More information

Zeki Ayag QUALITY FUNCTION DEPLOYMENT APPROACH TO EVALUATE SUPPLY CHAIN STRATEGIES IN TURKISH AUTOMOTIVE INDUSTRY

Zeki Ayag QUALITY FUNCTION DEPLOYMENT APPROACH TO EVALUATE SUPPLY CHAIN STRATEGIES IN TURKISH AUTOMOTIVE INDUSTRY Zeki Ayag Kadir Has University, Turkey QUALITY FUNCTION DEPLOYMENT APPROACH TO EVALUATE SUPPLY CHAIN STRATEGIES IN TURKISH AUTOMOTIVE INDUSTRY Abstract: The main objective of this study is to analyze automotive

More information

Achieving SOX Compliance with Masergy Security Professional Services

Achieving SOX Compliance with Masergy Security Professional Services Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called

More information

ITIL: Service Operation

ITIL: Service Operation ITIL: Service Operation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom s Taxonomy What do you Expect? Housekeeping

More information

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS

PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS PRIVACY IMPLICATIONS FOR NEXT GENERATION SIEMs AND OTHER META-SYSTEMS www.massif-project.eu Dr Andrew Hutchison T-Systems (andrew.hutchison@t-systems.com) MAanagement of Security information and events

More information

Advantage of using Service Desk Management Systems in real organizations

Advantage of using Service Desk Management Systems in real organizations Advantage of using Service Desk Management Systems in real organizations Anel Tanovic*, Nikos E. Mastorakis** *Department of Computer Science and Informatics University of Sarajevo, Faculty of Electrical

More information

Tutorial on Service Level Management in e- Infrastructures State of the Art and Future Challenges. The FedSMProject Thomas Schaaf & Owen Appleton

Tutorial on Service Level Management in e- Infrastructures State of the Art and Future Challenges. The FedSMProject Thomas Schaaf & Owen Appleton Tutorial on Service Level Management in e- Infrastructures State of the Art and Future Challenges The FedSMProject Thomas Schaaf & Owen Appleton Contents IntroducCon Background: why ITSM in e- Infrastructure?

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020

Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3281044/ Africa Cyber Security Market by Solution, by Service, by Verticals, by Country - Global forecast to 2020 Description: Africa

More information

THE OPEN UNIVERSITY OF TANZANIA

THE OPEN UNIVERSITY OF TANZANIA THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Net Optics and Cisco NAM

Net Optics and Cisco NAM When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco

More information

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...

More information

The Total Quality Assurance Networking Model for Preventing Defects: Building an Effective Quality Assurance System using a Total QA Network

The Total Quality Assurance Networking Model for Preventing Defects: Building an Effective Quality Assurance System using a Total QA Network The Total Quality Assurance Networking Model for Preventing Defects: Building an Effective Quality Assurance System using a Total QA Network TAKU KOJIMA 1, KAKURO AMASAKA 2 School of Science and Engineering

More information

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Eoin Thornton Senior Security Architect Zinopy Security Ltd. RSA envision: Transform your Security Operations A Technical overview & demo of RSA envision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability

Service. Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability Service Strategic Technology Solutions for DNA Technology Solutions and Services That Help You Optimize System Performance, Security and Availability Products As your information systems grow more complex,

More information

Unit 10: Software Quality

Unit 10: Software Quality Unit 10: Software Quality Objective Ð To introduce software quality management and assurance with particular reference to the requirements of ISO 9000 and associated standards. Ð To introduce QFD, a technique

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Total Quality Management Implementation in Cosmetic SME

Total Quality Management Implementation in Cosmetic SME Total Quality Management Implementation in Cosmetic SME Puntaree Watcharavittayakul Fukuoka Institute of Technology, Japan Abstract: This study is about how to implement TQM (Total Quality Management)

More information

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

The impact of active network devices mis-configuration in network security

The impact of active network devices mis-configuration in network security The impact of active network devices mis-configuration in network security Research Design 1. Background: Adversaries take advantage of the fact that network devices may become less securely configured

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

Software Project Tracking Metrics Analysis Model Based on Project Requirements

Software Project Tracking Metrics Analysis Model Based on Project Requirements Software Project Tracking Metrics Analysis Model Based on Project Requirements EVANGELOS MARKOPOULOS Department of Informatics University of Piraeus 80 Karaoli & Dimitriou Str., Piraeus GREECE epm@unipi.gr

More information

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

IT Service Desk Manager

IT Service Desk Manager IT Service Desk Manager Sangita Chandrakant Panmand [1], Sudarshan Ramakant Patil [2] Jainam Technology Pvt. Ltd, Bhaveshwar Complex, Patelwadi. Kurla, Mumbai, Maharashtra 400086. sangitap@jainamtech.com,

More information

Implementation Approach of ERP with Mass Customization

Implementation Approach of ERP with Mass Customization Implementation Approach of ERP with Mass Customization Yu ZHAO, Yushun FAN CIMS Engineering Research Center, Department of Automation, Tsinghua University, Beijing, China 100084 zhaoyu96@ tsinghua.org.cn,

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Roles within ITIL V3. Contents

Roles within ITIL V3. Contents Roles within ITIL V3 Roles are employed in order to define responsibilities. In particular, they are used to assign Process Owners to the various ITIL V3 processes, and to illustrate responsibilities for

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

In the launch of this series, Information Security Management

In the launch of this series, Information Security Management Information Security Management Programs: Operational Assessments Lessons Learned and Best Practices Revealed JUSTIN SOMAINI AND ALAN HAZLETON As the authors explain, a comprehensive assessment process

More information

Level 3 Public Use. Information Technology. Log/Event Management Guidelines

Level 3 Public Use. Information Technology. Log/Event Management Guidelines Page 1 of 5 Prepared by: Leigh Lopez Approved by: Chris Olsen, ISO Date: May 12, 2009 Date: June 8, 2009 Last revised by: Chris Olsen Last approved by: Chris Olsen, ISO Date: June 6, 2009 Date: January

More information

IDENTIFYING AND PRIORITIZING THE FINANCING METHODS (A HYBRID APPROACH DELPHI - ANP )

IDENTIFYING AND PRIORITIZING THE FINANCING METHODS (A HYBRID APPROACH DELPHI - ANP ) IDENTIFYING AND PRIORITIZING THE FINANCING METHODS (A HYBRID APPROACH DELPHI - ANP ) Pezhman Arzhang 1, Naser Hamidi 2 1 MSc.Business Administration, Department of Business Management, Qazvin Branch, Islamic

More information

Clavister InSight TM. Protecting Values

Clavister InSight TM. Protecting Values Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide

More information

Cisco Unified MobilityManager Version 1.2

Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.1, Release 1.2 The Cisco Unified Communications system of voice and IP communications products and applications enables

More information

Recent Researches in Electrical Engineering

Recent Researches in Electrical Engineering The importance of introducing Information Security Management Systems for Service Providers Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis**** * Faculty of Electrical Engineering

More information

Stable and Secure Network Infrastructure Benchmarks

Stable and Secure Network Infrastructure Benchmarks Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day

More information

IDM and Endpoint Integrity Technical Overview

IDM and Endpoint Integrity Technical Overview ProCurve ing by HP IDM and Endpoint Integrity Technical Overview The Threats to Today s ing Environments... 2 Endpoint Integrity Defined... 2 Endpoint Integrity Options... 2 The ProCurve Solution: Endpoint

More information

Integrate ExtraHop with Splunk

Integrate ExtraHop with Splunk Integrate ExtraHop with Splunk Introduction The ExtraHop system monitors network and application performance by gathering data passively on the network. It offers deep and customizable analytics of wire

More information

Spooks in the Machine

Spooks in the Machine A Higher Education Services Company Spooks in the Machine Proactive Strategies for Securing the Network Steven M. Helwig, CISSP Technical Director shelwig@sungardcollegis.com Contents of Presentation Aligning

More information

MULTI ATTRIBUTE DECISION MAKING FOR MOBILE PHONE SELECTION

MULTI ATTRIBUTE DECISION MAKING FOR MOBILE PHONE SELECTION MULTI ATTRIBUTE DECISION MAKING FOR MOBILE PHONE SELECTION Sandeepak Saket 1, Vidyapati Purbey 2, Jagadish 3, Amitava Ray 4 1 B.Tech, Mechanical Engineering, NIT Silchar, Assam, India 2 B.Tech, Mechanical

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed? Information Security Incident Management Program What is an Incident Management Program? It is a coordinated program of people, processes, tools and technology, which prevents and manages information security

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Structured Threats 21 External Threats 22 Internal Threats 22 Network Attacks 22 Reconnaissance Attacks 22 Access Attacks 23 Data Retrieval 23 System

Structured Threats 21 External Threats 22 Internal Threats 22 Network Attacks 22 Reconnaissance Attacks 22 Access Attacks 23 Data Retrieval 23 System xii Contents Structured Threats 21 External Threats 22 Internal Threats 22 Network Attacks 22 Reconnaissance Attacks 22 Access Attacks 23 Data Retrieval 23 System Access 24 Privilege Escalation 24 DoS

More information