Adaptive Automated Threat Recognition (AATR) Introduction
|
|
|
- Laurel Lee
- 5 years ago
- Views:
Transcription
1 Adaptive Automated Threat Recognition (AATR) Introduction May 17, 2018 Carl Crawford, Csuptwo Harry Martz, LLNL David Castanon, Boston University This material is based upon work supported by the U.S. Department of Homeland security under Award Number 2013-ST-061-E0 1
2 So What? Who Cares? Space: CT-based explosive detection scanners (checked and carryon) with automated threat recognition (ATR) Problem: Takes too long to field ATRs based on emerging threats from adapting adversary Part of the solution: Adaptive automated threat recognition (AATR) Automatically adapt to computer-readable detection requirement specification Goal: same-day deployment of new AATR after new threat identified Status: ALERT & LLNL funded to develop requirements, algorithms, metrics and testing methods for AATRs TSA benefit: Faster response to emerging threats, trade PD/PFA, change min mass, min sheet thickness Also applicable to AT2, AIT 2
3 ADSA Format This is a workshop, not a conference Speakers are instructed to begin with So What? Who Cares? (elevator speech) Crawford bears responsibility for format (and agenda) Conversation and questions are expected at all times, especially during presentations after first slide Optimal presentation ends after first slide Public domain no SSI or classified material No speaker introductions; read handouts 3
4 Goal Vendors deliver an automated system (or tool, process, denoted AATR) that can be used to create new ATRs. ATRs developed without extensive training data and without rigorous TSL testing ATRs can be refined with additional training data and testing AATRs may be complementary to traditionally certified ATRs or could be standalone depending on CONOPS and performance. Hence, time from identification to deployment is reduced Most of the ~20 steps used today would be eliminated Steps may need to be eliminated if Intel says that country being attacked with new threat High PFA may be acceptable with adapted ATR 4
5 Data: Objects of Interest (OOI) TO4: 188 SSNs -> Clay, Saline, Rubber (training) TO7: 101 SSNs -> m1, m2, m3, m4 (sequestered) Scanned on medical CT scanner OOI Min Density [ MHU ] Max Density [ MHU ] m m m m
6 Object ment Spec (ORS) Types of threat classes For each class Minimum mass Minimum thickness (sheets only) Density range Coefficient for calculating weighted PD PD per class Texture: no spec at present PFA Computer readable 6
7 AMs Adaptability Metrics (AM) PD when varying PFA PD/PFA when varying specified OOIs Clay: OOI -> confuser PD/PFA when varying relative weighting (contribution) of a specified OOI PD/PFA when varying specified minimum mass PD/PFA when varying specified minimum thickness PD/PFA: OOIs not found in training data 7
8 Adaptability Metrics: PD/PFA function different ORSs 8
9 Performers - AATR David Castanon, Boston University Trent Montgomery Toby Breckon, Durham University, UK Qian Wang, Khalid Ismail Dong Hye Ye + Charlie Bouman, Purdue University Dave Paglieroni, Lawrence Livermore National Laboratory (LLNL) (funded by EXD) Hema Chandrasekaran, Christian Pechard, Harry Martz Avi Kak, Purdue University (unfunded participant) Ankit Manerikar 9
10 Tools Performers - Support Franco Rupcich, Cich Solutions Technical Leads Carl Crawford, Csuptwo Harry Martz, LLNL David Castanon, Boston University 10
11 Acknowledgements - Logistics Melanie Smith, lead Tiffany Lam Deanna Beirne Kristin Hicks Anne Magrath Pooja Ravichandran Sara Baier 11
12 BACKUP SLIDES 12
13 Potential TSA Usage 13
14 Test Environment Implementation 14
15 Virtual Machine - Testing Testing performed in phases (steps) to allow debugging and improvements. 15
16 Support Functions (Tools) Sample ATR Reading image; Writing results (label, log files) Replace ATR functions with your own Sample ADS Interfaces to tools and to sample ATR Scoring software Detection using recall/precision PD/PFA Compiles results from all runs & AMs into single Top Level Report Must run in Linux Master driver program Runs ADS/AATR for different detection requirement specs Simulated images for validation available Image conversion to FITS Ground truth - Mevislab 16
17 Performer Training / TO4 Data AM 1: AROC AM 4: PD/PFA for Varying Mass OO I d PD d PFA S S S S S AATR PD AATR PFA OOI Min Mass [ g ] d PD d PFA AAT R PD [ % ] AAT R PFA [ % ] Increment al Mass Rnge [ g ] AATR Incrementa l PD S N/A N/A S S AM 5: PD/PFA for Varying Thicness AM 2: PD/PFA for Varying OOIs (ORS #1 OOI C,S, R AROC d PD only) d PFA C S <insert value here> AAT R PD R AM 90 3: Varing 10 PD Weight OO I C, S C, S Req PD C:90, S:90 C:20, S:90 Req PFA [ % ] AATR PD 10 C: xx, S: xx 10 C: xx, S: xx AAT R PFA AATR PFA OO I Min Thickne ss [ mm ] d PD OOI( s) d PFA ALERT Testing / TO7 Data AM 2: PD/PFA for Varying OOIs d PD d PFA m m m m AAT R PD AAT R PFA [ % ] AATR PD Increment al Thickness Rnge [ mm ] AAT R PFA AATR Incrementa l PD R N/A N/A R R
LLNL Production Plans and Best Practices
LLNL Production Plans and Best Practices Lustre User Group, 2014. Miami, FL April 8, 2014 LLNL-PRES-652453 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore
SIM Card Clone Guide
SIM Card Clone Guide Phonevolts.ie 28 North Lotts Dublin 1 Ireland Customer Support: 01 8728722 (6 lines) Email: info[at]phonevolts.com Installation & Instructions 1. Insert CD and install software by
SNOW SOFTWARE. Fredrik Spolén Country Manager Sales Director. Norway Denmark Finland
SNOW SOFTWARE Fredrik Spolén Country Manager Sales Director Norway Denmark Finland AGENDA FOR TODAY Introduction to SAM and Snow 4 th Generation SAM Snow SAM Platform Questions and Answers LACK OF SAM
Brammer Invend TM. > Convenience & simplicity > Reduce consumption > Lower inventory costs > Improve productivity. 28 th July 2015
Brammer Invend TM > Convenience & simplicity > Reduce consumption > Lower inventory costs > Improve productivity 28 th July 2015 Agenda What is Invend? Benefits for Brammer s customers Benefits for Brammer
Mobile application testing for the enterprise
Mobile application testing for the enterprise Accenture brings together deep knowledge of the enterprise, expertise in mobile technologies and strong end-to-end testing practices to help all enterprises
HP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
Tertiary Backup objective is automated offsite backup of critical data
Tertiary Backups Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Tertiary Backup Tertiary Backup objective is automated
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Film Scanner The term Film Scanner can refer to a dedicated slide and negative film scanner or to a capture type scanner.
Film Scanner The term Film Scanner can refer to a dedicated slide and negative film scanner or to a capture type scanner. Negative Scanner The term Negative Scanner can refer to a dedicated slide and negative
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Developing a Risk Based Testing Plan for Enterprise Applications Systems
Developing a Risk Based Testing Plan for Enterprise Applications Systems Alex Collier Senior Director, Services Engineering The following is intended to outline our general product
Welcome Computer System Validation Training Delivered to FDA. ISPE Boston Area Chapter February 20, 2014
Welcome Computer System Validation Training Delivered to FDA ISPE Boston Area Chapter February 20, 2014 1 Background Training Conducted on April 24, 2012 Food & Drug Administration Division of Manufacturing
Xerox WorkCentre 4260 vs. Samsung SCX-6555N. Competitive Assessment. WorkCentre 4260 Multifunction Printer. Competitive Assessment
WorkCentre 4260 Multifunction Printer Competitive Assessment Xerox vs. Samsung Competitive Assessment This document has been prepared from data prepared by Buyers Laboratory Inc. (BLI), the imaging industry
Amazon EC2 XenApp Scalability Analysis
WHITE PAPER Citrix XenApp Amazon EC2 XenApp Scalability Analysis www.citrix.com Table of Contents Introduction...3 Results Summary...3 Detailed Results...4 Methods of Determining Results...4 Amazon EC2
Cyber Adversary Characterization. Know thy enemy!
Cyber Adversary Characterization Know thy enemy! Brief History of Cyber Adversary Modeling Mostly Government Agencies. Some others internally. Workshops DARPA 2000 Other Adversaries, RAND 1999-2000 Insider
Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15
Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15 GENIVI is a registered trademark of the GENIVI Alliance in the USA and other countries Copyright GENIVI Alliance
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
ACCELERATING. Business Processes. through the use of:
ACCELERATING Business Processes through the use of: Business Process Automation Document Management Imaging and Scanning Data Transformation Paper and eforms Processing Enterprise Faxing ERP Integration
Go From Spreadsheets to Asset Management in 40 Minutes
E-ISG Asset Intelligence, LLC Go From Spreadsheets to Asset Management in 40 Minutes 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com January, 2013 Summary This
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Is Penetration Testing recommended for Industrial Control Systems?
Is Penetration Testing recommended for Industrial Control Systems? By Ngai Chee Ban, CISSP, Honeywell Process Solutions, Asia Pacific Cyber Security Assessment for Industrial Automation Conducting a cyber-security
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
A Conceptual Methodology and Practical Guidelines for Managing Data and Documents on Hydroelectric Projects
A Conceptual Methodology and Practical Guidelines for Managing Data and Documents on Hydroelectric Projects Alan Hodgkinson SoftXS GmbH Alpensrasse 14 CH-6300 Zug Switzerland Joseph J Kaelin Pöyry Infra
203.4770: Introduction to Machine Learning Dr. Rita Osadchy
203.4770: Introduction to Machine Learning Dr. Rita Osadchy 1 Outline 1. About the Course 2. What is Machine Learning? 3. Types of problems and Situations 4. ML Example 2 About the course Course Homepage:
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
LIGHTING CONTROL AT YOUR FINGERTIPS
User Interface LIGHTING CONTROL AT YOUR FINGERTIPS is a web-based lighting system management interface that allows end-users to monitor their energy usage and adjust scene levels via most web accessing
Open Source Solution for IVI: Tizen IVI. Brett Branch Tizen IVI Product Marketing
Open Source Solution for IVI: Tizen IVI Brett Branch Tizen IVI Product Marketing Agenda The Connected Car ecosystem Connected Car Usages what drives us? Key Requirements Tizen in Automotive Open Standards
The top 10 advantages of a Windows based PBX
Whitepaper The top 10 advantages of a Windows based PBX Why your next Phone System should be software based This whitepaper outlines the top 10 advantages of choosing a Windows based PBX as your next phone
Assurance Cases and Test Design Analysis
Assurance Cases and Test Design Analysis Flight Software Workshop November 7-9, 2012 Khalid Lateef Ph.D. Outline Scope Test Design challenges Assurance cases Example of test design IV&V for an automobile
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Monitoring HP OO 10. Overview. Available Tools. HP OO Community Guides
HP OO Community Guides Monitoring HP OO 10 This document describes the specifications of components we want to monitor, and the means to monitor them, in order to achieve effective monitoring of HP Operations
Department of Homeland Security
Department of Homeland Security National Cybersecurity Assessments & Technical Services (NCATS) Service Overview, Success and Challenges 3/18/2016 1 Agenda Discussion about NCATS Current Programs and Services
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market
Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions July 2014 1 Contents Section Slide Number Executive Summary
Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?
Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M? Joshua Corman Akamai Technologies David Etue SafeNet Session ID: GRC-202 Session Classification: Intermediate About Joshua Corman
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
System Behavior Analysis by Machine Learning
CSC456 OS Survey Yuncheng Li [email protected] December 6, 2012 Table of contents 1 Motivation Background 2 3 4 Table of Contents Motivation Background 1 Motivation Background 2 3 4 Scenarios Motivation
Design for Success: Designing for the Internet of Things with TiWiConnect
Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Computer Science Theory. From the course description:
Computer Science Theory Goals of Course From the course description: Introduction to the theory of computation covering regular, context-free and computable (recursive) languages with finite state machines,
IBM Infrastructure Suite for z/vm and Linux
IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM [email protected] October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite
Service Overview. Business Reply Mail. Trade-mark of Canada Post Corporation. OM Official mark of Canada Post Corporation.
Service Overview Business Reply Mail Effective January 11, 2016 Trade-mark of Canada Post Corporation. OM Official mark of Canada Post Corporation. canadapost.ca/brmguides T455088 IMPORTANT UPDATES Any
Higher Focus on Quality. Pressure on Testing Budgets. ? Short Release Cycles. Your key to Effortless Automation. OpKey TM
Pressure on Testing Budgets Higher Focus on Quality Short Release Cycles Your key to Effortless Automation OpKey TM Most of the CTOs face a common challenge i.e. the need to go to Market in shortest possible
Semantic Analysis of Business Process Executions
Semantic Analysis of Business Process Executions Fabio Casati, Ming-Chien Shan Software Technology Laboratory HP Laboratories Palo Alto HPL-2001-328 December 17 th, 2001* E-mail: [casati, shan] @hpl.hp.com
TRANSACTION Developer Advanced Training I. Copyright ADSOTECH Scandinavia Oy 2014
TRANSACTION Developer Advanced Training I 1 Copyright ADSOTECH Scandinavia Oy 2014 Contents Winshuttle TRANSACTION Developer Basic Training TRANSACTION User Interface Creating the First Script Problem
Module 5. Deep Convnets for Local Recognition Joost van de Weijer 4 April 2016
Module 5 Deep Convnets for Local Recognition Joost van de Weijer 4 April 2016 Previously, end-to-end.. Dog Slide credit: Jose M 2 Previously, end-to-end.. Dog Learned Representation Slide credit: Jose
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
Robotic Process Automation Overview and RPA Case Study. November 2015
Robotic Process Automation Overview and RPA Case Study November 2015 Big data?! Effective data management?! 2 What is Robotic Process Automation (RPA)? Software! Robots are Robots are not Computer coded
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
4. Executive Summary of Part 1 FDA Overview of Current Environment
Public Meeting Regulatory New Drug Review: Solutions for Study Data Exchange Standards 1. Background Meeting Summary Food and Drug Administration White Oak, MD November 5, 2012 10am 4pm On November 5,
OCR and 2D DataMatrix Specification for:
OCR and 2D DataMatrix Specification for: 2D Datamatrix Label Reader OCR & 2D Datamatrix Standard (Multi-read) Camera System Auto-Multi Reading Camera System Auto-Multi Reading Camera System (Hi-Res) Contents
Pathways to Financial Empowerment
Pathways to Financial Empowerment May 14, 2015 Ann Solomon, Federation Strategic Initiatives Manager Sarah Sable, Neighborhood Trust, Chief Program Officer 1 Agenda Overview Background & Financial Counseling
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
DVLA ELISE GSi Closed User Group Code of Connection
DVLA ELISE GSi Closed User Group Code of Connection Security Warning Notice The following handling instructions apply to this document: - Handle, use and transmit with care - Take basic precautions against
Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives
Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services
Category: Nomination for NASPE s Eugene H. Rooney, Jr. Award Innovative State Human Resource Management Program
PA Enterprise Learning Management System 2009 Rooney Award Nomination Cover Sheet: PA Enterprise Learning Management System Category: Nomination for NASPE s Eugene H. Rooney, Jr. Award Innovative State
Managed Network Services
Managed Network Services Delivering innovative network data services to business NETWOR Communications are an essential and integral part of any IT strategy and are as important as the systems and processes
Information Assurance Program at West Point
Information Assurance Program at West Point [email protected] John.Hill@usma usma.edu Scott.Lathrop@usma usma.edu Gregory.Conti@usma usma.edu USMA Information Assurance Program Institutional Support
APPENDIX 2 MIX DESIGNS. Chapter 4: mix design calculation sheet for 40 N/mm 2 strength)
APPENDIX 2 MIX DESIG All mixes in this study were designed in accordance with the Building Research Establishment (BRE 1992) method, recommended by the UK Department of the Environment. Reference should
Challenges in Cyber Security Experiments: Our Experience
Challenges in Cyber Security Experiments: Our Experience Annarita Giani, UC Berkeley, George Cybenko, Dartmouth College Vincent Berk, Dartmouth College Eric Renauf, Skaion Outline 1. The Situational Awareness
HOST BASED INTERNAL INTRUSION DETECTION AND PREVENTION SYSTEM.
HOST BASED INTERNAL INTRUSION DETECTION AND PREVENTION SYSTEM. 1 Rane Ankit S., 2 Waghmare Amol P., 3 Payal Ashish M., 4 Markad Ashok U, 3 G.S.Deokate. 1,2,3,4 Department of Computer Engineering SPCOE
SANS Dshield Webhoneypot Project. OWASP November 13th, 2009. The OWASP Foundation http://www.owasp.org. Jason Lam
SANS Dshield Webhoneypot Project Jason Lam November 13th, 2009 SANS Internet Storm Center [email protected] The Foundation http://www.owasp.org Introduction Who is Jason Lam Agenda Intro to honeypot
Cyber Security RFP Template
About this document This RFP template was created to help IT security personnel make an informed decision when choosing a cyber security solution. In this template you will find categories for initial
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
San Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
AP ENPS ANYWHERE. Hardware and software requirements
AP ENPS ANYWHERE Hardware and software requirements Contents Server requirements 3 Hard drives 5 Virtual machines 6 AP ENPS mobile server 6 Client requirements 7 AP ENPS client on a Mac-based computer
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
Implicit Affinity Networks
Implicit Affinity Networks Matthew Smith Christophe Giraud-Carrier Brock Judkins (now at Amazon.com) Department of Computer Science Brigham Young University Data Mining Lab - http://dml.cs.byu.edu WITS
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
Cisco Security IntelliShield Alert Manager Service
Data Sheet Cisco Security IntelliShield Alert Manager Service The Cisco Security IntelliShield Alert Manager Service provides a comprehensive, cost-effective solution for delivering the security intelligence
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis
, 22-24 October, 2014, San Francisco, USA Problem Solving Hands-on Labware for Teaching Big Data Cybersecurity Analysis Teng Zhao, Kai Qian, Dan Lo, Minzhe Guo, Prabir Bhattacharya, Wei Chen, and Ying
Model-Based Testing of Spacecraft Flight Software
Model-Based Testing of Spacecraft Flight Software Maria Hernek Virtual 12/09/2013 Objective/Outline Objective: To present the result and achievements of ESA study Model Based Testing of flight SW and discuss
Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011
Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011 "You" and "your" refers to the individual or entity that has ordered Advanced Customer Services from Oracle or an authorized distributor.
Check Point Security Administrator R70
Page 1 of 6 Check Point Security Administrator R70 Check Point Security Administration R70 Length Prerequisites 5 days* (recommended) Basic networking knowledge, knowledge of Windows Server and/or UNIX,
