Threat!and!Vulnerability!Assessments!
|
|
|
- Susanna Merritt
- 10 years ago
- Views:
Transcription
1 ThreatandVulnerabilityAssessments 13720JetportCommerceParkway STE13 Ft.Myers,FL33913 COPYRIGHT 2015,CybersecurityDefenseSolutions,LLC ALLRIGHTSRESERVED
2 ThreatandVulnerabilityAssessmentUOverview Table&of&Contents& SYNOPSIS' 3 UNDERSTANDING'TVAP ' 3 THE'PROCESS' 4 THE'REPORT' 4 SUMMARY' 5 ABOUT'CYBERSECURITY'DEFENSE'SOLUTIONS:' 6 2
3 ThreatandVulnerabilityAssessmentUOverview Synopsis& Identifyingandunderstandingwhatthreatsyouarevulnerabletoandwhatmayalreadybeonyour networkisthefirststeptoprotectingyourdata. It snosurprisethatthenumberandintensityofdatabreacheshasbeenontherise.seemseveryweek wehearaboutanotherlargeincidentinvolvingpersonalandfinancialdata.alongwiththenegative publicityaroundthesebreaches,thefinancialtollisalsoontherise. OurThreatandVulnerabilityAssessmentsarejustthat,trueassessments.Notjustautomatedscanner resultsputintoanicereport(ourreportsarenice,but ).Wethinklikeattackers.Welookatyour systemslikeanattackerwouldlookatthem,andgivehonesttrueassessmentstotheriskyoucould facefromreallifeattacksthathappenonadailybasis. Inaddition,weutilizeuptotheminutethreatintelligencetoaidinthediscoveryofvulnerabilitiesand threatsthatmayalreadybeinplaceandrunningonyournetworksandsystems. Understanding&TVAP && TheCDSTVAP (ThreatandVulnerabilityAssessmentPlatform)isaverysmallformfactordevice (shownbelow)thatallowsustoperformallinternalandexternalthreatandvulnerability assessments.thisdevicesitsonyournetworksegmenttoallowustoassessthevulnerabilitiesofthe systemsonthatsegmentandalsoplugsintoaspanportonyouredgeswitchingequipmentto monitoralltrafficgoingtoandfromyourfirewalltolookforthreatsandotherpotentiallymalicious traffic. TVAP% ConnectionbytheTVAPissecurelymadebacktoCDSutilizing4096BitkeysandAESU256Bit encryptedcommunications. OuranalystsutilizeourinUhouseTVAPtoassessyournetworksfromtheoutside,whilealsorunning assessmentsusingthetvapinstallonpremise. 3
4 ThreatandVulnerabilityAssessmentUOverview The&Process& OncetheTVAPisinplaceandtheagreeduponassessmentstartdateisreached,ouranalystsbeginthe assessment. OnlyauthorizedCDSpersonallyassignedtoyourprojectcanstartandviewthevulnerabilityand threatassessmentdataonyourcdsutvapaccordingtoyourrulesofengagement. Oncealldataiscollected,processed,verifiedandreviewedbyouranalysts,reportsareprepared showingalldatacollected,vulnerabilitiesfound,assessmentofcollecteddata,summarydataand recommendations. Thesereportsarethendeliveredanddiscussedforpossibleremediationtacticsandriskmitigation.If anyevidenceofexistingcompromiseisfoundduringthedataugatheringphaseoftheassessment, thesearereportedimmediatelytotheclientviaphone. Ifthelengthandreportingfrequencyoftheengagementisextendedandmultiple,theCDSUTVAP systemcantransmitallassessmentdatatocdsviathesecureconnectionforanalysisandreport generationatmultiplepointsthroughouttheengagement. Whentheengagementhasended,weutilizeourDataDestructionServicestoeradicatethedataonthe CDSUTVAP,andsendyouacertificateofdestructionifyousowish. The&Report& Oncethedataiscollectedandanalyzed,wegenerateourreport.Thereportconsistsofthefollowing sections: ExecutiveSummary Highleveloverviewofwhatwasdoneandwhen SummaryofResults Summationofitemsofinterestthatwerefoundalongwithariskrating foreachitem,brokendownby: o ExternalVulnerabilityAssessment o InternalVulnerabilityAssessment o ThreatAssessment ConclusionsandRecommendations APPENDIX AssessmentDetailedReportsandData WeprovideacondensedprintedreportthatdoesnotincludetheAPPENDIX,asitcontainsallthe detailedreportsanddataandistypicallyseveralhundredpageslong.wedoprovidetheentirereport inandencryptedelectronicformat. & & 4
5 ThreatandVulnerabilityAssessmentUOverview Why&you&should&do&a&Threat&and&Vulnerability&Assessment& Everybusinesshassomeelementofriskwhenitcomestotheirdataandelectronicsystems.Data breachesarenowcommonplaceandbusinessowners,culevelexecutiveandboardsofdirectorsare nowinthespotlightonwhatproactivestepstheyaretakingtosecuretheircomputersystems. ThepracticeofperformingregularThreatandVulnerabilityassessmentshasproventobeaneffective beneficialadditiontoanorganizationsecurityposture,nomatterthesizeoftheorganization. ByperformingaThreatandVulnerabilityAssessmentwithacompanythatthinkslikeattackers, organizationsroutinelydiscoverexposuresandrisksbeforepotentialattackersdo,ordiscoverassets currentlyunderattackthattheywereunawareof. Bycompletingcontinualassessmentsitiseasytoidentifypossiblesecurityconcernsthatmaybe presentonthenetwork,bothfromaninternalandanexternalperspective.earlydetectionintroduces theopportunitytoaddresstheissuesbeforetheattackerscanexploittheweakness,whichmaycause seriousdamagetothecompaniesassetsandpossiblytheirreputation.noonewantstohearabout theirsecuritydeficienciesontheeveningnewsorworse,fromtheircustomers. Summary& Ifyouhavequestionsorneedassistanceonimplementinganythinginthisoverview,needa VulnerabilityAssessment,PenetrationTest,PhishingAssessment,CybersecurityAwarenessTraining oranythingelserelatedtoyourorganizationscyberandinformationsecurity,pleasegiveusacall,or interactwithusonline.youcan usat,visitourwebsiteat 5
6 ThreatandVulnerabilityAssessmentUOverview About&Cybersecurity&Defense&Solutions: CybersecurityDefenseSolutionswasfoundedbyagroupofITprofessionalswithlongUtermDataand NetworkSecurity,SoftwareDevelopment,ITManagementandBusinessManagementbackgrounds. Ourfoundershaveleveragedsolutionstoassistprivateandpublicsectorcompaniesinbothnetwork anddatasecurityforover20years.drawingontheircombinedexpertiseindatasecurity,data Eradication,NetworkSecurity,EthicalHacking,DataForensics,DataRecoveryandBestSecurity Practices,CDSwasborntoassistcompanieswiththeirCybersecuritydefenses,bringingtogetherbestU ofubreedsolutionswitheducationandawarenessandaprovenmethodologytoassurethatcompanies aredoingeverythingwithintheirpowertodefendfromcyberattacks. Ourmethodologiesfollowindustrystandardbestpracticeincluding,butnotlimitedtotheNIST CybersecurityFrameworkandDHSCUCubedFrameworktoassurethatcompaniescanproveboth reasonableandreliableeffortstoidentify,protect,detect,respondandrecoverfromacybersecurity Incident. Weprideourselvesinourdetailed,handsUonapproach,customerserviceandquickreaction capabilities.wearededicatedtoourmission,visionandvalues: CDS'Mission:' Toenhancethesecurity,resiliency,andreliabilityofourclient scybersecuritydefenses.we accomplishthisbydeliveringhighuquality,innovativecyberanddatasecurityservicesandsolutions. CDS'Vision:' Tobearecognized,worldclassleaderinprovidingindustrychangingCybersecuritysolutionsto protecttheassetsofourclients,andtocontributeourknowledgetobettermentofthecybersecurity communityatlarge. Our'Core'Values:' ' IntegrityUUnifiedapproachtohowwedobusiness HonestyUDoingtherightthing,everytime RespectUValuingtheopinionsandperspectivesofothers DedicationUCommitmenttoourword DiligenceUWorkinghardtoprovidetherightsolutionsandsolvecomplexproblems Feelfreetointeractwithusonline: Web Facebook Linkedin & 6
Cybersecurity!Evaluations!
CybersecurityEvaluations https://www.cybersecdefense.com @cybersecdefense 13720JetportCommerceParkway STE13 Ft.Myers,FL33913 COPYRIGHT 2015,CybersecurityDefenseSolutions,LLC ALLRIGHTSRESERVED CybersecurityEvaluationsVOverview
Copyright 2013 wolfssl Inc. All rights reserved. 2
- - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.
McLellan s+brook+asbestos+disposal+facility+
McLellan sbrookasbestosdisposalfacility ArchaeologicalResourceImpactAssessment DavisMacIntyre&AssociatesLimited 1 09JohnStewartDrive,Dartmouth,NSB2W4J7 McLellan sbrookasbestosdisposalfacility ArchaeologicalResourceImpactAssessment
!!!! Creating!the!ALHFAM!Knowledge!Base!
CreatingtheALHFAMKnowledgeBase AMaster sthesis Presentedto SchoolofInformationDesignandTechnology InPartialFulfillment oftherequirementsforthe MastersofScienceDegree By GretchenL.Kriesen May2013 StateUniversityofNewYork
Copyright 1980 by the Association for Supervision and Curriculum Development. All rights reserved.
Measuring Caring: A compilation of international research on Caritas as Healing intervention. Table of Contents
MeasuringCaring:Acompilationofinternationalresearchon CaritasasHealingintervention. TableofContents SECTION1,THEORETICALBACKGROUDOFCARITAS... p. Chapter1,ConceptsofCaringasConstructofCaritas... p. JohnNelson,RN,MS,PhDc;PamDiNapoli,RN,PhD;MarianTurkel,RN,PhDNEA
Private Developer Ground Lease. Example (Denver) C-1
Appendix C Private Developer Ground Lease Example (Denver) C-1 C-2 C-3 C-4 C-5 C-6 C-7 C-8 C-9 C-10 C-11 C-12 C-13 C-14 C-15 C-16 C-17 C-18 C-19 C-20 C-21 C-22 C-23 C-24 C-25 C-26 C-27 C-28 C-29 C-30 C-31
Implementing!SoftNAS!Cloud!with!Docker! November!2014!
ImplementingSoftNASCloud withdocker November2014 SoftNAS'Cloud'with'Docker'provides'simple,'on:demand,'persistent'shared' storage'for'devops'striving'to'obtain'continuous'delivery/integration'and' applications'to'scale
Tourism Prince George Meetings & Conventions 2015 Marketing Plan and Implementation Strategy
Tourism Prince George Meetings & Conventions 2015 Marketing Plan and Implementation Strategy Prepared by Jen Tkachuk, March 2015 Meeting & Convention Sales Manager TourismPrinceGeorgeMeetings&Conventions2015MarketingPlanandImplementationStrategy
Big Data in Commercial Buildings: The Market for Internet of Things in Buildings 2014 to 2018
Big Data in Commercial Buildings: The Market for Internet of Things in Buildings 2014 to 2018 Published: Q4 2014 The$ Internet$of$ Things$in$ Smart$ Buildings$ 201492020$ Synopsis $ ThisreportwillhelpallstakeholdersandinvestorsintheInternetof
STATE OF DIGITAL MARKETING REPORT
2011 STATE OF DIGITAL REPORT Executive Summary This report contains results of the first annual Webmarketing123 State of Digital Marketing Survey, which spans across the areas of Search Engine Optimization
Keefo s Design wants to be an integral partner in your success!
Get you or your business on the web and let Keefo s Design help you to create an effective and competitive face to the public to get you and your business online! Below is a menu of our website design
Professional Diploma in Digital Marketing
Professional Diploma in Digital Marketing Agenda Day 1: Day 2: Day 3: Day 4: Day 5: to Digital Marketing Search Engine Optimisation Search Engine Marketing Email Marketing Digital Display Advertising Mobile
Is#CROA#Choking#Credit# Report#Literacy?#
Is#CROA#Choking#Credit# Report#Literacy?#! Authors:# Michael#A.#Turner,#Ph.D.#(PERC)# Michael#Staten,#Ph.D.#(U.#of#Arizona)# Patrick#Walker,#M.A.#(PERC)# April#2015# Is#CROA#Choking#Credit#Report#Literacy?#
! PRIVATE!PAGES! DRUPAL!7!WEB!CONTENT!MANAGEMENT!
UNIVERSITY*OF*CALGARY InformationTechnologies PRIVATEPAGES DRUPAL7WEBCONTENTMANAGEMENT September2015 TableofContents FirstSteps...1 AddingaPrivatePage...2 AccessControl...4 PrivatePages Drupal7WebContentManagement
SOCIAL NETWORKING USAGE AND GRADES AMONG COLLEGE STUDENTS
SOCIAL NETWORKING USAGE AND GRADES AMONG COLLEGE STUDENTS A Study to Determine the Correlation Of Social Media Usage and Grades Contact: Chuck Martin [email protected] (603) 750-3020 The Study This
List of figures. List of tables. Abbreviations and acronyms
Preface List of figures List of tables Abbreviations and acronyms vii xv xix xxiii I Introduction and methods 1 General introduction 3 1.1 Introduction... 3 1.2 Themotivesforthisresearch... 3 1.3 Riskmanagement...
How to use Google Analytics to track clicks from within emails
How to use Google Analytics to track clicks from within emails What s the Benefit? Constant Contact can tell you which of your email recipients clicked a link in your email. They will give you the percentage
Big Data Privacy Scenarios Elizabeth Bruce, Karen Sollins, Mona Vernon, and Danny Weitzner
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2015-030 October 1, 2015 Big Data Privacy Scenarios Elizabeth Bruce, Karen Sollins, Mona Vernon, and Danny Weitzner
Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Appendix A Cyber Security 1 Copyright 2012, Oracle and/or its affiliates. All rights Overview This lesson covers the following topics: Define cyber security. List the risks of cyber security. Identify
Search Engine Marketing(SEM)
Search Engine Marketing(SEM) Module 1 Website Analysis Competition Analysis About Internet Marketing Scope & Career Opportunities Basics Of HTML & Website Development Platforms Module 2. Search Engine
Social networking allows you to reach out to potential customers without spending exorbitant amounts of money.
Legal Marketing It came into existence not to confront the Code of Ethics, but to cooperate with it in building an enduring legal brand. Punishment would befall only those without in-depth knowledge of
Company Profile. Contemporary ICT consulting
Company Profile Contemporary ICT consulting Executive Summary October ICT is a fully fledged ICT solutions provider, Founded in 2010. We offer ICT consultancy services always keeping our clients abreast
The Business Plan: Defining the Components of a Business Plan
UNITII/LESSON4 TheBusinessPlan: DefiningtheComponentsofaBusinessPlan TimeFrame 2 5days Standards EntrepreneurialSkills:TheProcessesandTraits/Behaviors associatedwithentrepreneurialsuccess A.EntrepreneurialProcesses:Understandsconcepts
Fire Risk Assessment Network
Fire Risk Assessment Network Fire risk assessments completed nationwide by the UK's number 1 network of fire risk assessors. Office 34 67-68 Hatton Garden London EC1N 8JY United Kingdom http://fire-risk-assessment-network.com
Social Media. A brief overview of the Social Media module
Social Media A brief overview of the Social Media module Title of Page to Appear Here in Arial Bold. Size: 32pt Line 1 of bullet point text to appear here in Arial regular. Size: 18pt Line 2 of bullet
Exemplary*Preschool*Community*Partnership* Case*Study*#2:*Inclusion*Model*
ExemplaryPreschoolCommunityPartnership CaseStudy#2:InclusionModel This%case%study%was%developed%by%the%Early%Care%and%Education%Consortium%(ECEC)%and%is%based%on% discussions%with%the%u.s.%department%of%education%office%of%early%learning."it%is%part%of%a%series%of%case%
SLCC WEB PUBLISHING GUIDELINES AND PROCEDURES
SLCC WEB PUBLISHING GUIDELINES AND PROCEDURES The purpose of the Web Publishing Guidelines and Procedures document is to ensure consistency, compliance and provide standards and direction for the advancement
Social Application Guide
Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved
Managing Social Media During a Consumer Product Recall
Managing Social Media During a Consumer Product Recall Thanks to the advent of social media, companies and consumers now have a direct line to each other to exchange information and voice opinions, whether
Ignite Visibility Consulting. How to Blog. Prepared by John Lincoln. Copyright 2013 Ignite Visibility Page 1
Ignite Visibility Consulting How to Blog Prepared by John Lincoln Copyright 2013 Ignite Visibility Page 1 Introduction... 3 What is a Blog?... 3 Technical Checklist... 3 Important Promotional Notes...
CORPORATE STRATEGIC & OPERATIONAL CONTROLS EXTENDED SUMMARY & SYNOPSIS
BOOK SYNOPSIS CORPORATE STRATEGIC & OPERATIONAL CONTROLS EXTENDED SUMMARY & SYNOPSIS This book is about corporate controls and how they enable and support all management levels of the organization (top,
How LinkedIn Can Consistently Generate Appointments with Pre-Qualified Prospects for Your High Ticket Offers
How LinkedIn Can Consistently Generate Appointments with Pre-Qualified Prospects for Your High Ticket Offers and Got Up to 555.56% ROI By Angela Lin PUBLISHED BY: Angela Lin & Social Media 4Hire Copyright
RLI PROFESSIONAL SERVICES GROUP LEARNING EVENT PSGLE 128. Social Media: Trends, Tools and Tips
RLI PROFESSIONAL SERVICES GROUP LEARNING EVENT PSGLE 128 Social Media: Trends, Tools and Tips Copyright Materials This presentation is protected by US and International Copyright laws. Reproduction, distribution,
( ( ( Kaleidescape(Secure(Content(Delivery(System( (KDRMBC)(
( ( ( Kaleidescape(Secure(Content(Delivery(System( (KDRMBC)( ( ( ( ( ( ( ( Security(Review(Management(Report( Version1.1(Final) Author:(Tom(Thomas,(Ian(Whitworth( T+441256844161 F+441256844162 www.farncombe.com
RENEWAL OF MOTOROLA CRMS SOFTWARE MAINTENANCE & SUPPORT AGREEMENT AND UPGRADE TO PREMIERONE FOR 311
RENEWAL OF MOTOROLA CRMS SOFTWARE MAINTENANCE & SUPPORT AGREEMENT AND UPGRADE TO PREMIERONE FOR 311 June 11, 2012 Overview 311 City of Dallas CRMS Software History and Usage Motorola Citizen Request Management
Lead Generation Quickstart Guide
Lead Generation Quickstart Guide 1 2 Lead Generation Quickstart Guide Copyright 2014 Mooloop Ltd All Rights Reserved You re welcome to email, tweet, blog, and pass this ebook around. But please don t change
USING CRITICAL & CREATIVE THINKING TO ENHANCE PRODUCTIVITY IN INTEGRATED MARKETING COMMUNICATIONS MEETINGS AND PROCEDURES
USINGCRITICAL&CREATIVETHINKINGTOENHANCEPRODUCTIVITYININTEGRATED MARKETINGCOMMUNICATIONSMEETINGSANDPROCEDURES ASynthesisProjectPresented by ASHLEYN.SMITH SubmittedtotheOfficeofGraduateStudies,UniversityofMassachusettsBoston,
How to Use the Internet to Market Your Business
How to Use the Internet to Market Your Business What are your marketing goals? If you don t think Social Media marketing is powerful, just ask someone from Egypt. 89% of US internet users search online
How To Increase Business Leads Using LinkedIn
How To Increase Business Leads Using LinkedIn Are you looking for an easy and effective way to bring more traffic to your company website and generate more leads for your business? ParasolLeads, a division
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE TITLE: Web Design 2 COURSE OUTLINE CODE NO. : SEMESTER: 4 PROGRAM: AUTHOR: Digital Photography and Imaging M. VanLandeghem
VDI and snapshots: A winning combination
ANALYSTVIEW VDIandsnapshots:Awinningcombination ByRayLucchesi January2009InfoStor Theproliferationofuserdesktopsisrapidlybecominganadministrativequagmire fortoday'sdatacenters.however,desktopvirtualizationproductshaverecently
WorkInCulture E-learning Crash Course Series
WorkInCulture E-learning Crash Course Series Delivering common and critical business skills to your organization Planning a Successful Business Marketing: It s Just Another Conversation Managing People
Search Engine Optimisation Managed Service
SEO Managed Service Search Engine Optimisation Managed Service Every day over 350 million searches are performed across the internet so it s imperative that your website stands out from the competition
Unit Title: Content Management System Website Creation
Unit Credit Value: 7 Unit Level: Three Unit Guided Learning Hours: 36 Ofqual Unit Reference Number: H/503/9327 Unit Review Date: 31/12/2016 Unit Sector: 15.3 Business Management Unit Summary This unit
Constant Contact Small Business Pulse The Health and Wellness of Small Businesses
Constant Contact Small Business Pulse The Health and Wellness of Small Businesses Based on Research Conducted in May 2012 Copyright 2012 Constant Contact Inc. 1 In This Report What s Keeping SMBs Up at
2IÀFHRI,QVSHFWRU*HQHUDO
2IÀFHRI,QVSHFWRU*HQHUDO Enhancements in Technical Controls and Training Can Improve the Security of CBP s Trusted Traveler Programs OIG-14-139 September 2014 Washington, DC 20528 / www.oig.dhs.gov September
Experience Styling Professionals
ESP Meet the Experience Styling Professionals Katrina Klier Managing Director, Accenture Find out about Accenture: www.accenture.com or @Accenture or on LinkedIn Find out about me: or LinkedIn Blog and
Internet of Things: What is going to change in our lives
Internet of Things: What is going to change in our lives Amrith NAWOOR Technology Manager, SADC & EA - Oracle World Telecommunication and Information Society Day May 18, 2015 Safe Harbor Statement The
Service Level Agreement
Template SDSU-TPL-11085 v1.3 18/1/11 IT Services Service Level Agreement Identity & Access Management System (AccMan) (IDAM) Document Ref: DSLAIDAM Version: 0.4 24/03/2011 Contents 1 INTRODUCTION... 4
Special Education Transportation Task Force Report
Special Education Transportation Task Force Report OCTOBER 2010 www.moecnet. org Massachusetts Organization of Educational Collaboratives Massachusetts Organization of Educational Collaboratives DearColleagues:
Oracle E-Business Suite R11i Business Processes Accounts Receivable (AR)
Oracle E-Business Suite R11i Business Processes Accounts Receivable (AR) < Strictly for preview purpose only > Sales Hotline : 1700 80 0070 (within Malaysia) Telephone : +60 17 337 0027 Fax : +60 3 6730
VMware s)approach)to)compliance))
VMware sapproachtocompliance UpdatedJuly2015 V2.1 VMware sapproachtocompliance TableofContents 1. INTRODUCTION...3 2. SECURITY,COMPLIANCE,ANDGUIDELINES...5 3. AVIEWOFVMWARE SCOMPLIANCESOLUTIONS...7 4.
NIPISSING-PARRY SOUND CATHOLIC DISTRICT SCHOOL BOARD
POLICY: It is the policy of the Nipissing-Parry Sound Catholic District School Board (the Board ) to support the safe, equitable, professional and responsible use of electronic social media via the Internet
New Mexico Broadband Program. Internet Tools for Small Business Success. Module 8 E-Commerce
New Mexico Broadband Program Internet Tools for Small Business Success Module 8 E-Commerce Internet Tools for Small Business Success Class Series 1. Terminology & Planning 2. Communication & Collaboration
SEO Marketing Strategy. Keeping you connected through SEO
SEO Marketing Strategy Keeping you connected through SEO Table of Contents Popularity Keywords Content Uniqueness Marketing Links Traffic Ranking Innovation Optimization Analysis Popularity In order to
Social Media Marketing (Part 1)
Social Media Marketing (Part 1) Student Handbook Syllabus Version 5.0 Copyright All rights reserved worldwide under International copyright agreements. No part of this document can be reproduced, stored
