Secure software updates for ITS communications devices
|
|
|
- Jean Glenn
- 9 years ago
- Views:
Transcription
1 Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute, NICT 1
2 Outline Background Computerization of vehicle Necessity of remote update (maintenance) of vehicle Threats against networked vehicle General remote update procedure and threat analysis An approach of international standardization in ITU-T Introduction of Secure software update capability for ITS communications devices Conclusion 2
3 Background 3
4 Computerization of vehicle 50% 100 Proportion of electronic components of car production costs Number of ECUs (Electronic Control Unit) in luxury models 100 million Number of program lines of car software Number of networks in a car (average) 5 2 miles Length of cable in a car Software Development Volume Software Development Cost Multimedia Audio Vehicle body Air bag Assist Chassis HV Powertrain 4
5 Necessity of remote update (maintenance) of vehicle Improvement of vehicle Software modules inside ECUs must be frequently updated e.g.) bug fix, performance and security improvement Cost Reduction Failure of the software accounts for about 30% of the current recall of the cars. Manufacturers and users expect benefit from the remote update service 5
6 Remote exploitation against FIAT Chrysler s Jeep Cherokee 6
7 Remote exploitation against FIAT Chrysler s Jeep Cherokee Research activity by two hackers An article published in a news website Detail will be presented at Black Hat USA 2015 (5-6, Aug) Remote Exploitation of an Unaltered Passenger Vehicle Charlie Miller, Security Engineer, Twitter Chris Valasek, Director of Security Intelligent at IOACTIVE, INC. Demonstration of attacks against FIAT Chrysler s Jeep Cherokee Remote exploit attack against an Internet-connected device (UConnect) Remotely controlled the vehicle on the highway Abuse a steering wheel Abuse brake and accelerator On/Off of the engine 7
8 General remote update procedure and threat analysis for networked vehicle 8
9 Model data flow of remote software update Supplier..... Vehicle mobile gateway Update Server at Car.. Manufacturer ECU (VMG) User Interface 1. Supplier provides an update module to a car update manufacturer. request 2. Vehicle mobile gateway requests ECUs to diagnose themselves and submit their software list. list 3. ECUs generate a software list and submit it to the Vehicle mobile gateway. report 4. The vehicle mobile gateway gathers the lists of software and submit them to update server. receipt request for each step in the procedure update Conducted threat analysis 5. Update server issues a receipt of the software list for vehicle mobile gateway. 6. Update server determines necessary software modules for each ECU. 7. After a certain period of time, the vehicle mobile gateway requests update modules for the vehicle. 8. Update software modules are delivered to vehicle mobile gateway. notification 9. The gateway pushes a notification to a user interface. confirmation 10. The car owner confirms to apply the update via the user interface. update update 11. Vehicle mobile gateway delivers the updates to corresponding ECUs and request them to apply the updates. 12. Each ECU applies the update and reports the application result to the vehicle mobile gateway. update 13. Finally the vehicle mobile gateway submits a report of application results to the update server. receipt 14. Finally the vehicle mobile gateway submits a report of application results to the update server. 9
10 Threat analysis: example case 1 Impersonation of VMG! DoS attack against ECUs by sending frequent requests Tampering / eavesdropping / replay of a message! An illegitimate request message is sent to ECUs by an attacker in order to illegally acquire software information! DoS attack against ECUs by sending frequent requests 10
11 Threat analysis: example case 2 Impersonation of ECU! Improper software information is uploaded to VMG! DoS attack against VMG by sending forged data (e.g., enormously huge data) Impersonation of VMG! Software information on every ECU in the vehicle is improperly collected Tampering / eavesdropping / replay of a message! Improper software information is uploaded to VMG! Software information on every ECU in the vehicle is improperly collected! DoS attack against VMG by sending forged data (e.g., enormously huge data) 11
12 Functional Requirements for the secure software update Message verification Threats: tampering, eavesdropping and replaying of messages Measure: message verification mechanism based on Message Authentication Code (MAC) or digital signature method Trusted boot of ECUs Threats: tampering of software in ECU Measure : hardware Security Module (HSM) to verify software modules in ECUs boot sequences Authentication of communication entity Threats: impersonation of the entities Measure : authentication of both client and server of each communication based authentication protocol such as SSL/TLS Message filtering Threats: DoS attack against VMG or update server Measure : message filtering based on white listing of senders and frequency limitation of received messages, etc. 12
13 An approach of international standardization in ITU-T Introduction of Secure software update capability for ITS communications devices 13
14 Development of an ITU-T Recommendation ITU-T: International Telecommunication Union, Telecom sector SG17: Responsible for security standards Title of Recommendation Secure software update capability for ITS communications devices (X.itssec-1) Purpose to provide common methods to update the software by a secure procedure Editor Masashi Eto (NICT) Koji Nakao (KDDI/NICT) 14
15 Functional Requirements for the secure software update Message verification Threats: tampering, eavesdropping and replaying of messages Measure: message verification mechanism based on Message Authentication Code (MAC) or digital signature method Trusted boot of ECUs Threats: tampering of software in ECU Measure : hardware Security Module (HSM) to verify software modules in ECUs boot sequences Authentication of communication entity Threats: impersonation of the entities Measure : authentication of both client and server of each communication based authentication protocol such as SSL/TLS Message filtering Threats: DoS attack against VMG or update server Measure : message filtering based on white listing of senders and frequency limitation of received messages, etc. 15
16 General message format with security functions Digital signature method message Communication data Protocol version Content type Signer ID type Public key certificate Signature target data Signature Flag Service ID Application Length information Application data Time with standard deviation Three D location Public key certificate Protocol version Content type Signer ID type Signature algorithm Certificate specific data Expiration CRL_ID Public key information Signature Algorithm Public key MAC method message Communication data Protocol version Content type MAC target data MAC Type Equipment ID ID of expired equipment ID list Key version Algorithm Application information Length Application data Time with standard deviation Three D location 16
17 Application data format for each message type Message format Message category (diagnose_report) Message type (request / response / submit) Status code Issued date Expiration date Extension Length Extension data 17
18 Conclusion Threat analysis in a general software update procedure Impersonation of entities, tampering of software in ECU, etc., Introduction of ITU-T draft Recommendation X.itssec-1 Secure software update capability for ITS communications devices Message verification Trusted boot Authentication of communication entity Message filtering The standardization activity on this topic should be accelerated in corporation with car manufactures/venders in ITU-T SG17 Future plan for developing this Recommendation ITU-T SG17 meeting at Geneva, Sep, 2015 Pre-final revision to request for comments ITU-T SG17 meeting at Geneva, Mar, 2016 To be approved as a Recommendation 18
19 19
20 Threat analysis In total, 53 threats have been found. According to the threats, possible countermeasures have been studied. ITU-Tで53の 脅 威 解 析 を 実 施 していないと 思 います が どこのを 引 用 しています か?? 20
21 Remote exploitation against Jeep Cherokee 21
22 Connected Vehicles Internet connection (LTE, 3G, Wi-Fi, Bluetooth ) via customer s smartphone, SIM embedded in the vehicle, etc. Autonomous car Control engines and brakes based on the information from roadside infrastructure as well as car-mounted sensors, cameras, and radars 22
23 Scope of the Recommendation Functionality of Server! Stored Data Definition Auth info Log Audit With considerations of privacy concerns Communication protocol! Between Car and Manufacturer / Garage! Encryption! Authentication Functionality of Head Unit! Status check of ECUs! Log collection! In-car diagnosis function Diagnosis of on-board devices! Status check of ECUs! Log collection! Verification of update module Aftermarket Information Device On-board Information Device Car Manufacturer / Garage center Power Management Control ECU Seat Belt Control ECU Driving Support ECU Supplier Communication Path Update Server / log database Communication Path Vehicle Mobile Gateway Parking Assist ECU Skid Control ECU etc., 23
24 More Attacks Surfaces! 24
25 General model of networked vehicle Aftermarket Information Device On-board Information Device Car Manufacturer / Garage center Power Management Control ECU Seat Belt Control ECU Driving Support ECU Supplier Communication Path Update Server / log database Communication Path Vehicle Mobile Gateway Parking Assist ECU Skid Control ECU etc., 25
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
Securing the Internet of Things
Securing the Internet of Things Challenges & Opportunities Licensing Executive Society December 15, 2015 World s first Linear in Time Asymmetric Security Addressing Authentication and Data Protection For
The Trend Toward Convergence of Physical and Logical (Cyber) Security
The Trend Toward Convergence of Physical and Logical (Cyber) Security Fred S. Roberts Director Command, Control, and Interoperability Center for Advanced Data Analysis (CCICADA)* Rutgers University *A
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
Frost & Sullivan Cybersecurity Presentation
Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting
The Internet of Things: 4 security dimensions of smart devices
The Internet of Things: 4 security dimensions of smart devices Like all major technological revolutions, digital transformation is spreading over many areas: home automation, physical security, mobility,
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Automotive and Industrial Data Security
André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
TRW Automotive 2012. TRW Automotive Profile 2012
TRW Automotive 2012 TRW Automotive Profile 2012 Company Profile Headquartered in Livonia, Michigan, US More than 60,000 employees / contractors worldwide Balanced global presence, with approximately 185
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
Automotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
WE MAKE SECURITY WORK
WE MAKE SECURITY WORK Identity Management in action isecure Product family Introduction Infrasec Sweden AB was founded in 2002. Since our start, we have focused on in-house developed security products
Testing the Internet of Things
Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
You don t hear me but your phone s voice interface does. José LOPES ESTEVES & Chaouki KASMI
You don t hear me but your phone s voice interface does José LOPES ESTEVES & Chaouki KASMI Hack In Paris - 18/06/2015 WHO WE ARE José Lopes Esteves and Chaouki Kasmi ANSSI-FNISA / Wireless Security Lab
Wireless Asset Management
HYSTER TRACKER Wireless Asset Management 2 UPSIZE, DOWNSIZE, RIGHT SIZE, OPTIMISE SEE WHAT YOUR FLEET S DOING WITH HYSTER TRACKER WIRELESS ASSET MANAGEMENT SOLUTION Take your fleet operation to the next
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Hacking cars in the style of Stuxnet
Hacking cars in the style of Stuxnet András Szijj 1, Levente Buttyán 1, Zsolt Szalay 2 1 CrySyS Lab, Department of Networked Systems and Services 2 Department of Automobiles and Vehicle Manufacturing Budapest
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Security for the Internet of Things (IoT) John Yeoh, IoT Working Group
Security for the Internet of Things (IoT) John Yeoh, IoT Working Group Cloud Security Alliance, 2015 Agenda Introduction IoT Security Challenges IoT Threat Discussion Working Group Activities Cloud Security
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Embedded Security for Modern Building Automation Systems
Embedded Security for Modern Building Automation Systems Daniel Höttges, ESCRYPT GmbH Embedded Security, Bochum, Germany Marko Wolf, ESCRYPT GmbH Embedded Security, München, Germany Digitalization and
Introduction CHAPTER 1
CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
A Framework for Secure and Verifiable Logging in Public Communication Networks
A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr [email protected]
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
VEHICLE CYBERSECURITY. DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Realworld
United States Government Accountability Office Report to Congressional Requesters March 2016 VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
Connected and Automated Vehicles and the Cybersecurity Threat
Connected and Automated Vehicles and the Cybersecurity Threat How the Industry is Responding Dr Andrew Brown, Jr, PE, FESD, FSAE, NAE Vice President & Chief Technologist CAR Breakfast Briefing Series February
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack
Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
Embedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Chapter 7 Information System Security and Control
Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
CellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June 2010. www.mlearning.com
CellCast Solution for BlackBerry Smartphones Security Overview Revised: June 2010 www.mlearning.com Introduction The CellCast Solution for BlackBerry empowers sales, service and other remote teams to distribute
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Den Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
Business Phone Security. Threats to VoIP and What to do about Them
Business Phone Security Threats to VoIP and What to do about Them VoIP and Security: What You Need to Know to Keep Your Business Communications Safe Like other Internet-based applications, VoIP services
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
MOBILE GAMING SYSTEM POLICIES
MOBILE GAMING SYSTEM POLICIES This document is intended to provide further clarification on applicable mobile gaming Technical Standards and additionally to define policies associated with the manufacturing
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI Introduction. I. VULNERABILITIES AND TECHNOLOGIES. 1. Hackers and Threats. Contending with Vulnerability Realizing Value in Security
Public Key Applications & Usage A Brief Insight
Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control
AUTOPLUG: Remote Diagnostics Automotive Architecture for Control Software Safety Rahul Mangharam, Yash V. Pant and Truong X. Nghiem Department of Electrical & Systems Engineering University of Pennsylvania
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
PopimsCard. Franck GUIGAN [email protected] +33 6 14 63 93 36. The magic card. February 16. 2016
PopimsCard The magic card February 16. 2016 Franck GUIGAN [email protected] +33 6 14 63 93 36 We all need to identify other persons, but official documents are not safe: Authenticating an ID card
Penetration testing & Ethical Hacking. Security Week 2014
Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information
Cyber-Security in the Connected Car Age
IHS AUTOMOTIVE Presentation Cyber- in the Connected Car Age GENIVI Conference Seoul, October 21, 2015 ihs.com Egil Juliussen, Director Research & Principal Analyst +1 630 432 1304, [email protected]
This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.
Catalogue Basic Operation... 2 For Internet Explorer... 2 For Other Non-IE Web Browsers... 5 Camera Settings... 6 System... 6 About... 6 PT Setting... 7 Backup and Restore Setup... 8 NTP Setting... 8 System
