CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes

Size: px
Start display at page:

Download "CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes"

Transcription

1 CIS-162 Intoduction to Netok Secuity Comptia Secuity+ Eam Domain 3 Secuity Baselines Secuity Baselines Standad that oganization systems must comply Establish the nom of consistency Detect the anomaly Pefom pio to binging into poduction Hadening the system Establish system secuity state base line Unifom baselines Maintenance cost eduction Use secuity template Best Pactice aka Bee and Pizza Remove all unneeded pocesses System utilities and sevices Default installation (IIS) Applications Netok sevices Apply patches (see above) Apply hot fies Apply (secuity) settings 1

2 Passod Secuity / Passod Policy Usename and passod fist line of defense Compleity Mi Alphabetic (A-Z and a-z) Numeic (0-9) Special chaactes as pemitted by OS No ods in dictionay Do not pemit use o pat of login name Length (Windos 8 o moe, Uni 6 o moe) Passod histoy etention Passod aging (maimum and minimum) Passod Secuity Enfoce passod policy Though OS passod policy settings System utilities: Windos NT 4.0 Sevice Pack 2 PASSFILT.DLL Linu NPassd PAM (Pluggable Authentication Modules) Solais PAM Pefom passod audit Shado file (only the shado knos) Passod Auditing Utilities Black-hat tools ae you tools L0phtCack - cuently LC5 (Windos) John the Rippe (Uni and DOS) Cack (Uni) Attacks Dictionay 2 million ods unabidged Bute Focing passod length of 8 chaactes 26 Uppe case 26 Loe case 10 Digits 32 Special chaactes Passod length of 8: 6,704,780,954,517,120 o Si Quadillion 2

3 Hadening Windos Restict pemission on citical files Restict pemission on the Registy Disable all unnecessay sevices Detemine unnecessay sevices and dependencies Block unneeded pots Eecutables Apply secuity pemissions Remove unnecessay eecutables At the least ename o move them Apply sevice packs, patches and hot-fies Hadening Windos Use accounts Remove all unnecessay use accounts Rename Administato Ceate dummy administato account Disable o emove Guest Enfoce passod secuity policy Minimum passod length 8 chaactes Hadening Windos Enfoce passod secuity policy Revie secuity on upgaded systems File / Folde Shae Remove unnecessay shaes Apply estictions Be aae of administative shae (disable as needed) Install antivius No entepise fieall? Install host fieall 3

4 Hadening Windos Monitoing Event viee Application log Secuity log System log Set log aning Auditing Hadening Windos Follo established guidelines Micosoft NSA Modify to fit you needs Use the Baseline Secuity Analyze Penetation testing Hadening Uni Uni flavos Solais BSD (Bekeley Univesity) Mac OS X (Uni based) Linu distibutions Red Hat SuSE Debian Knoppi Lycois Mandake Slackae (College Linu) Yello Dog Tubo Linu TSL Fedoa Poject Gentoo Ubuntu 4

5 Uni File / Diectoy Attibute Othes One Goup Wold File - Diectoy d Bit Value Eample: = Read, = Wite, = Eecute chmod a+ filename (ead to eveyone) chmod go+ filename (goup and othes ite and eecute) chmod u- filename (one inhibit ite) Uni File / Diectoy Commands Uni File / Diectoy Attibute Command chmod File o diectoy attibutes chon chgp Uni Oneship Commands Change oneship attibutes Change goup attibutes Uni Unmask Command Unmask Command Unmask command gants o denies pemissions It uses invese bits Eample: Unmask = gants to one 77 = denies to goup and old. 5

6 Solais pkgadd pkgm patchadd patchm pkgpaam smpatch Inetd.conf tcp appe Add binay distibution packages Remove binay distibution packages Add patch to system Remove patch fom system List installed patches Signed patches pocessing List of sevices - location /etc hosts.allo hosts.deny (ALL:ALL) Solais Use account in /etc/passd Goup in /etc/goup Maintenance Manual edit Useadd utility Management console Passd command /etc/default/passd Common Desktop Envionment (CDE) Linu (Red Hat) pm pm qa m -e useadd usedel Xinetd tcp appe Red Hat Package Manage List installed softae packages Remove softae package Add use account /etc/passd Delete use account /etc/passd Etended Intenet Sevice daemon (listen) /etc/inetd.d hosts.allo hosts.deny (ALL:ALL) 6

7 Softae Updates Hotfi Patch Sevice Pack Fimae Upgades Addesses specific poblem Addesses multiple poblems Fomal updates Rolled up patches Hadae specific Softae vesion/elease change Online Update Windos Automatic Update System based Red Hat Update Agent Pofile based Netok Hadening SNMP default community passod public ead community pivate ead/ite community Pots and Sevice blocking Taffic filteing Route access contol list (ACL) Route and fieall configuation 7

8 Application Hadening Webseve Intenet Infomation Seve (IIS) Micosoft IIS guidelines Remove sample files Set file and folde pemissions Apache Open souce guideline Remove sample files Set file and diectoy pemissions Application Hadening Mail Seves iz gives intude full system access vfy veifies valid account epn epands an alias list to full addess list Eample: epn all-uses Open elay (spam) Buffe oveflo patch Micosoft Echange Sendmail Application Hadening File Tansfe Potocol (FTP) Seves Disable anonymous Conside using secue potocol Active mode (Seve sends) Client pot > 1024 to seve 21 Client pot seve to connect back to data pot+1 Seve send data pot 20 to client data pot+1 Passive mode (Seve is passive) Client open pots fo contol, +1 fo data Client pasv tells seve to open its data pot Seve pot tells client of its data pot Client initiates its data pot +1 to seve data pot y 8

9 Domain Name System (DNS) UDP and TCP pot 53 (Zone Tansfe) 13 oot seves Bekley Intenet Name Domain (BIND) Dynamic DNS (Micosoft) and AD Secuity Attack: Buffe oveflo DoS Cache poisoning File / Pint Sevices and Active Diectoy File and Pint Sevices Requie authentication Pemission settings Disable if not needed Active Diectoy Domain, tee and foest Schema Distibuted management pemission LDAP, LDIF and DET (Diectoy Enty Table) 9

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifies: m SSN, name, Passpot # Intenet hosts, outes: m IP addess (32 bit) - used fo addessing datagams (in IPv4) m name, e.g., gaia.cs.umass.edu - used by humans

More information

How to create a default user profile in Windows 7

How to create a default user profile in Windows 7 AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

Welcome to the Cloud Stream. Sponsored by:

Welcome to the Cloud Stream. Sponsored by: Welcome to the Cloud Steam Sponsoed by: Entepise Cloud (HEC) Hanessing the Powe of eal- Time Business with the Simplicity of the Cloud Ben Lingwood Diecto HEC GtM Entepise Cloud - Oveview Announced May

More information

Smarter Transportation: The power of Big Data and Analytics

Smarter Transportation: The power of Big Data and Analytics Smate Tanspotation: The powe of Big Data and Analytics Eic-Mak Huitema, Global Smate Tanspotation Leade IBM 1 Intelligent Tanspot Systems (ITS) fo the futue 2 BECAUSE WE WANT IT FOR THE FUTURE. How? The

More information

Hitachi Virtual Storage Platform

Hitachi Virtual Storage Platform Hitachi Vitual Stoage Platfom FASTFIND LINKS Contents Poduct Vesion Getting Help MK-90RD7028-15 2010-2014 Hitachi, Ltd. All ights eseved. No pat of this publication may be epoduced o tansmitted in any

More information

Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2

Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2 Cisco 1841 Integate Sevices Route ith AIM-VPN/SSL-1 An Cisco 2801 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.7 Octobe 13, 2009 Copyight 2009

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

College of Engineering Bachelor of Computer Science

College of Engineering Bachelor of Computer Science 2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date

More information

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3 Cisco 3825 an Cisco 3845 Integate Sevices Routes ith AIM-VPN/SSL-3 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2007 Cisco Systems, Inc. This ocument may

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Integrating Net2 with an intruder alarm system

Integrating Net2 with an intruder alarm system Net AN035 Integating Net with an intude alam system Oveview Net can monito whethe the intude alam is set o uet If the alam is set, Net will limit access to valid uses who ae also authoised to uet the alam

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

ENTERPRISE LINUX NETWORKING SERVICES

ENTERPRISE LINUX NETWORKING SERVICES ENTERPRISE LINUX NETWORKING SERVICES The is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement

More information

Ou Appoach and Types of attack

Ou Appoach and Types of attack BlueBoX: A Policy diven, Host Based Intusion Detection system Suesh N. Chai Pau Chen Cheng IBM Thomas J. Watson Reseach Cente Yoktown Heights, NY 10598, U.S.A. schai,pau @watson.ibm.com Abstact In this

More information

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

GL275 - ENTERPRISE LINUX NETWORKING SERVICES Length: 5 days The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services securely,

More information

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Methods for the specification and verification of business processes MPB (6 cfu, 295AA) Methods fo the specification and veification of business pocesses MPB (6 cfu, 295AA) Robeto Buni http://wwwdiunipiit/~buni 22 - Business pocess execution language 1 Object We oveview the key featues of

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Application for Admission GENEVA COLLEGE

Application for Admission GENEVA COLLEGE Application fo Admission GENEVA COLLEGE 3 2 0 0 C o l l e g e A v e n u e, B e a v e F a l l s, P A 1 5 0 1 0 Application Instuctions When to apply You may apply fo admission any time afte you junio yea

More information

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS Highe Education Cente fo Alcohol and Othe Dug Abuse and Violence Pevention Education Development Cente, Inc. 55 Chapel Steet Newton, MA 02458-1060 COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

More information

Equity compensation plans New Income Statement impact on guidance Earnings Per Share Questions and answers

Equity compensation plans New Income Statement impact on guidance Earnings Per Share Questions and answers Investos/Analysts Confeence: Accounting Wokshop Agenda Equity compensation plans New Income Statement impact on guidance Eanings Pe Shae Questions and answes IAC03 / a / 1 1 Equity compensation plans The

More information

Lab Tasks 1. Configuring a Slave Name Server 2. Configure rndc for Secure named Control

Lab Tasks 1. Configuring a Slave Name Server 2. Configure rndc for Secure named Control Khóa học bao trùm tất cả các vấn đề về dịch vụ mạng trong doanh nghiệp bao gồm: khái niệm DNS, triển khai DNS sử dụng Bind; khái niệm LDAP và sử dụng OpenLDAP; dịch vụ Web với Apache; dịch vụ FTP với vsftpd;

More information

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages

More information

Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2

Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2 Cisco 2811 an 2821 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2005 Cisco Systems, Inc. This ocument may be feely

More information

Public Health and Transportation Coalition (PHiT) Vision, Mission, Goals, Objectives, and Work Plan August 2, 2012

Public Health and Transportation Coalition (PHiT) Vision, Mission, Goals, Objectives, and Work Plan August 2, 2012 Public Health and Tanspotation Coalition (PHiT) Vision, Mission, Goals, Objectives, and Wok Plan 2, 2012 Vision We envision Maine as a place whee people of all ages and abilities can move about in ways

More information

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days GL-275: Red Hat Linux Network Services Course Length: 5 days Course Description: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

In the Supreme Court of British Columbia

In the Supreme Court of British Columbia 26-Ap-11 Vancouve Fom 1 (Rule 3-1(1)) Cout File No. VLC-S-S-112673 Vancouve Registy In the Supeme Cout of Bitish Columbia Between Daniel Veniez Plaintiff And John Weston, Paul Veltmeye, John Doe & Jane

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

ENTERPRISE LINUX NETWORKING SERVICES

ENTERPRISE LINUX NETWORKING SERVICES ENTERPRISE LINUX NETWORKING SERVICES COURSE DESCRIPTION: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts

More information

"Charting the Course... Enterprise Linux Networking Services Course Summary

Charting the Course... Enterprise Linux Networking Services Course Summary Course Summary Description This an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services

More information

DOCTORATE DEGREE PROGRAMS

DOCTORATE DEGREE PROGRAMS DOCTORATE DEGREE PROGRAMS Application Fo Admission 2015-2016 5700 College Road, Lisle, Illinois 60532 Enollment Cente Phone: (630) 829-6300 Outside Illinois: (888) 829-6363 FAX: (630) 829-6301 Email: admissions@ben.edu

More information

GFI MilAchive 6 vs H&S Exchnge@PAM GFI Softwe www.gfi.com GFI MilAchive 6 vs H&S Exchnge@PAM GFI MilAchive 6 H&S Exchnge@PAM Who we e Genel fetues Suppots Micosoft Exchnge 2000, 2003 & 2007 Suppots distibuted

More information

What is included in the ATRC server support

What is included in the ATRC server support Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations

More information

Centralized and structured log file analysis with Open Source and Free Software tools

Centralized and structured log file analysis with Open Source and Free Software tools Bachelo Thesis Summe Semeste 2013 at Fachhochschule Fankfut am Main Univesity of Applied Sciences Depatment of Compute Science and Engineeing toads Bachelo of Science Compute Science submitted by Jens

More information

Personal Saving Rate (S Households /Y) SAVING AND INVESTMENT. Federal Surplus or Deficit (-) Total Private Saving Rate (S Private /Y) 12/18/2009

Personal Saving Rate (S Households /Y) SAVING AND INVESTMENT. Federal Surplus or Deficit (-) Total Private Saving Rate (S Private /Y) 12/18/2009 1 Pesonal Saving Rate (S Households /Y) 2 SAVING AND INVESTMENT 16.0 14.0 12.0 10.0 80 8.0 6.0 4.0 2.0 0.0-2.0-4.0 1959 1961 1967 1969 1975 1977 1983 1985 1991 1993 1999 2001 2007 2009 Pivate Saving Rate

More information

GFI MilAchive 6 vs EMC EmilXtende Achive Edition GFI Softwe www.gfi.com GFI MilAchive 6 vs EMC EmilXtende Achive Edition GFI MilAchive 6 EMC EmilXtende Achive Edition Who we e Genel fetues Suppots Micosoft

More information

Module Availability at Regent s School of Drama, Film and Media Autumn 2016 and Spring 2017 *subject to change*

Module Availability at Regent s School of Drama, Film and Media Autumn 2016 and Spring 2017 *subject to change* Availability at Regent s School of Dama, Film and Media Autumn 2016 and Sping 2017 *subject to change* 1. Choose you modules caefully You must discuss the module options available with you academic adviso/

More information

Mac OS X Directory Services

Mac OS X Directory Services Mac OS X Directory Services Agenda Open Directory Mac OS X client access Directory services in Mac OS X Server Redundancy and replication Mac OS X access to other directory services Active Directory support

More information

Cisco 2951, Cisco 3925 and Cisco 3945 Integrated Services Routers (ISRs)

Cisco 2951, Cisco 3925 and Cisco 3945 Integrated Services Routers (ISRs) Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) Haae vesions: 2951[1][2], 3925[1][3], 3945[1][3], FIPS Kit (CISCO-FIPS-KIT=), Revision -B0[1], ISR: FIPS- SHIELD-2951=[2] an FIPS-SHIELD-3900=[3]

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards BIOS Ameican Megatends Inc (AMI) v02.61 BIOS setup guide and manual fo AM2/AM2+/AM3 motheboads The BIOS setup, also called CMOS setup, is a cucial pat of the pope setting up of a PC the BIOS (Basic Input

More information

GFI MilAchive 6 vs Wtefod Technologies MilMete Achive GFI Softwe www.gfi.com GFI MilAchive 6 vs Wtefod Technologies MilMete Achive Genel fetues Suppots Micosoft Exchnge 2000, 2003 & 2007 Suppots distibuted

More information

Technology Launch from Seed Funding to Liquidity Event

Technology Launch from Seed Funding to Liquidity Event Technology Launch fom Seed Funding to Liquidity Event Tammi Smoynski Diecto, Intel Capital Intel Copoation Septembe, 2010 * Othe maks and bands ae popety of thei espective ownes Intel Capital Oveview Taditional

More information

Ubuntu 12.04 Sever Administration

Ubuntu 12.04 Sever Administration Ubuntu 12.04 Sever Administration 1. Introduction to Ubuntu Linux Ubuntu Server Ubuntu Server 12.04 Server Installation Alternatives and Options Server on the Desktop Installation Desktop on the server

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8 1 [Table of contents] Chapte 1: Intoduction... 7 1-1. BELSORP analysis pogam... 7 1-. Requied compute envionment... 8 Chapte : Installation of the analysis pogam... 9-1. Installation of the WIBU-KEY pogam...

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

Ashfield Girls High School. Critical Incident Policy

Ashfield Girls High School. Critical Incident Policy Ashfield Gils High School A Specialist School fo ICT Citical Incident Policy Citical Incident Policy 2 Citical Incident Policy A Specialist School fo ICT Ashfield Gils High School CRITICAL INCIDENT POLICY

More information

Security Best Practice

Security Best Practice Security Best Practice Presented by Muhibbul Muktadir Tanim mmtanim@gmail.com 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

nitrobit update server

nitrobit update server nitrobit update server Administrator's Guide 2011 analytiq consulting gmbh. All rights reserved. Page 2 nitrobit update server Administrator's Guide Content I. Introduction... 4 Overview... 4 Components

More information

Shaping the future of diabetes care

Shaping the future of diabetes care Shaping the futue of diabetes cae 1 Heino von Pondzynski Head of Roche Diagnostics 2 The idea Roche Diagnostics, the woldwide leade in Diabetes monitoing, and Disetonics, the woldwide numbe 2-playe in

More information

Managing Card Compromises from the Issuer s Perspective

Managing Card Compromises from the Issuer s Perspective Managing Cad Compomises fom the Issue s Pespective Industy insides shae tips fo effectively managing mass compomises Numbe 60 June 2012 Lage-scale payment cad compomises and account data beaches continue

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT

PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT PLANNING THE CAPACITY OF A WEB SERVER: AN EXPERIENCE REPORT Daniel A. Menascé Robet Peaino Depatment of Compute Science, MS 4A5 Univesity Computing Geoge Mason Univesity Geoge Mason Univesity Faifax, VA

More information

Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, and Cisco 2921 Integrated Services Routers (ISRs)

Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, and Cisco 2921 Integrated Services Routers (ISRs) Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) Haae vesions: 1905[1][2], 1921[1][2], 1941[1][2], 2901[1][3], 2911[1][4], 2921[1][5], FIPS Kit (CISCO-FIPS-

More information

CUIT UNIX Standard Operating Environment and Security Best Practices

CUIT UNIX Standard Operating Environment and Security Best Practices Objective and Scope Effective Date: August 2008 This CUIT UNIX Standard Operating Environment (SOE) document defines the agreed system hardening requirements as well as security best practices for CUIT

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at Internet Security [1] VU 184.216 Engin Kirda engin@infosys.tuwien.ac.at Christopher Kruegel chris@auto.tuwien.ac.at Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will

More information

BorderWare Firewall Server 7.1. Release Notes

BorderWare Firewall Server 7.1. Release Notes BorderWare Firewall Server 7.1 Release Notes BorderWare Technologies is pleased to announce the release of version 7.1 of the BorderWare Firewall Server. This release includes following new features and

More information

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION Application Fom SECTION 1 COMPANY DETAILS New Company Yes No Company Name Tading As Pevious Company Name Email Addess Contact Numbe Tel Cell Fax Registeed Numbe Natue of Business Yea of Incopoation Yea

More information

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson pp@kth.se Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact

More information

HC INSTALLATION GUIDE. For Linux. Hosting Controller 1998 2010. All Rights Reserved.

HC INSTALLATION GUIDE. For Linux. Hosting Controller 1998 2010. All Rights Reserved. HC INSTALLATION GUIDE For Linux Hosting Controller 1998 2010. All Rights Reserved. Contents Proprietary Notice... 3 Document Conventions... 3 Target Audience... 3 Introduction... 4 About HC... 4 Before

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

ENTERPRISE LINUX SECURITY ADMINISTRATION

ENTERPRISE LINUX SECURITY ADMINISTRATION ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet

More information

Mac OS X Security Checklist:

Mac OS X Security Checklist: Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded

More information

Highest Pefomnce Lowest Pice PRODUCT COMPARISON GFI MilAchive vs Symntec Entepise Vult GFI Softwe www.gfi.com GFI MilAchive vs Symntec Entepise Vult GFI MilAchive 6 Symntec Entepise Vult Who we e Genel

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

Do Vibrations Make Sound?

Do Vibrations Make Sound? Do Vibations Make Sound? Gade 1: Sound Pobe Aligned with National Standads oveview Students will lean about sound and vibations. This activity will allow students to see and hea how vibations do in fact

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

A Roadmap for Securing IIS 5.0

A Roadmap for Securing IIS 5.0 This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Confirmation of Booking

Confirmation of Booking The Pesentes Rebecca Mogan Rebecca is a Taxation Consultant with the NTAA and has ove 15 yeas tax expeience. Rebecca holds a Bachelo of Ats and Law and a Mastes of Taxation. Rebecca has pesented a numbe

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Avira AntiVir MailGate 3.2 Release Notes

Avira AntiVir MailGate 3.2 Release Notes Release Notes 1. Features 1.1 Assigning recipient addresses to groups either by using Active Directory or a plain text file 1.1.1 Using a Active Directory server MailGate communicates with Active Directory

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

CAC AND KERBEROS FROM VISION TO REALITY

CAC AND KERBEROS FROM VISION TO REALITY CAC AND KERBEROS FROM VISION TO REALITY Mil OSS Conference 2011 Dmitri Pal Sr. Engineering Manager Red Hat Inc. Aug 31, 2011 Outline Setting up context... Card authentication now Open issues Pieces of

More information

Nessus Agents. October 2015

Nessus Agents. October 2015 Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing

More information

ICD-10. Implementation

ICD-10. Implementation ICD-10 Implementation Mein McCabe AAPC Cetified Pofessional Code (CPC) AAPC Cetified Coding Instucto (PMCC and ICD-10) Code/Bille Independent Contacto Medical Business Advocates, LLC 858-382-9853 Mein@MedicalBusinessAdv.com

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information