System Aware Cyber Security Architecture
|
|
|
- Annice Daniels
- 10 years ago
- Views:
Transcription
1 System Aware Cyber Security Architecture Rick A. Jones October, 2011
2 Research Topic DescripAon System Aware Cyber Security Architecture Addresses supply chain and insider threats Embedded into the system to be protected Includes physical systems as well as informaaon systems Requires system engineering support tools for evaluaang architectures factors To facilitate reusability requires establishment of candidate Design PaMern Templates and iniaaaon of a design library Security Design System Impact Analyses ASRR 10/11 October
3 IncorporaAng Recognized Security FuncAons into an Integrated System Aware Security SoluAon Fault Tolerance Diverse ImplementaAons of Common FuncAons Data ConAnuity Checking via VoAng Cyber Security Moving Target with Diversity Physical ConfiguraAon Hopping Virtual ConfiguraAon Hopping Adversary SensiAve System ReconstrucAon AutomaAc Control Systems Data ConAnuity Checking via State EsAmaAon System IdenAficaAon TacAcal Forensics ASRR 10/11 October
4 System Aware Security Architecture Internal Controls Inputs System to be Protected Outputs Internal Measurements System-Aware Security Sub-System ASRR 10/11 October
5 System Aware Cyber Security Subsystem System-Aware Security Sub- System Measurements Measurement Analysis System to be Protected Hopping & Restoral Control System Control Signaling Security Control Decisions ASRR 10/11 October
6 System Aware Security Analysis Selected set for hopping Mission-Risk Ranked System Functions (1) (2) (3) (4) Number of hopped functions (N) System Latency Delay in compromise detection Rate of hopping Mission Risk System Latency ASRR 10/11 October
7 System Aware Security for Facility Defense ASRR 10/11 October
8 Facility Defense System to be Secured We consider a facility defense system consisang of: Streaming sensors conanuously monitoring discrete areas Streaming Servers distribuang sensor data, received over a wired network, to mobile users over a wireless broadcast network Mobile users receiving alerts and streaming data regarding potenaal problems ASRR 10/11 October
9 IllustraAve Architectural Diagram for Candidate Facility Defense System for System Aware Security 9
10 PotenAal Cyber AMacks Replay amacks masking malicious acavity iniaated through Sensor system Streaming servers User devices DoS amacks addressed through redundancy Sensor system Streaming servers OperaAonal procedures and redundancy regarding user devices ASRR 10/11 October
11 System Aware SoluAon for Securing the Facility Defense System Replay amack defense Diversely Redundant Streaming Sensors, with VoAng (Data ConAnuity Checking) Diversely Redundant, Virtually Hopped Streaming Servers Diverse User Devices, with RotaAng User Surveillance Assignments and Device Use Mobile User based Data ConAnuity Checking DoS defense Redundancy at the Sensor and Streaming server levels Streaming servers / User feed back loops to enable redistribuaon of data and job responsibiliaes ASRR 10/11 October
12 IllustraAve System Aware SoluAon Architecture 12
13 Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng Max Possible # of Observable Regions No VoAng/Single Stream ConAnuous 3 Stream VoAng Stream Fidelity (Kbps) 13
14 Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng Max Possible # of Observable Regions Loss in User PresentaAon Fidelity No VoAng/Single Stream ConAnuous 3 Stream VoAng Stream Fidelity (Kbps) 14
15 Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng Max Possible # of Observable Regions ReducAon in Maximum Observable Regions No VoAng/Single Stream ConAnuous 3 Stream VoAng Stream Fidelity (Kbps) 15
16 Duty Cycle VoAng for Increasing the Possible Number of Observable Regions Concept Use of Ame division for voang permits an increase in the number of possible surveillance points User compares streams concurrently received from mulaple diversely redundant servers to discover disconanuiaes 3 parameters can be ualized to govern voang Number of Observed Regions Deemed acceptable VoAng Interval for data conanuity checking across all regions Streaming period Ame allomed for conanuity checking (VoAng Time), which can be less than the VoAng Interval Given the VoAng Time can be a subset of the VoAng Interval, the use of Ame division can be ualized to manage informaaon distribuaon over the broadcast network, interleaving mulaple streams for voang users with single streams for other users who are not voang ASRR 10/11 October
17 IllustraAve System Aware SoluAon Architecture with Duty Cycle VoAng 17
18 IllustraAve System Aware SoluAon Architecture with Duty Cycle VoAng 18
19 IllustraAve System Aware SoluAon Architecture with Duty Cycle VoAng 19
20 Duty Cycle VoAng for Increasing the Possible Number of Observable Regions User 1 User 2 Time Time User 3 Time Wireless Network Time Column Heights = Data / Time Interval 20
21 Observable Regions / User Fidelity Impacts of 3 Stream ConAnuous VoAng Max Possible # of Observable Regions No VoAng/Single Stream ConAnuous 3 Stream VoAng Duty Cycle VoAng Stream Fidelity (Kbps) 21
22 AddiAonal Collateral System Impacts Common Cause Failures are reduced MTBF increases in relaaonship to the individual diverse component reliabiliaes Development cost increases based on the cost to develop voang and duty cycle management components, as well as to resolve lower level technical issues that may arise SynchronizaAon needs Sohware integraaon Performance impact measurements and enhancement needs (e.g. CPU ualizaaon, memory, and energy usage) One Ame and life cycle cost increase in relaaonship to the increased complexity 22
23 Scoring Framework 23
24 Need: Methodology for EvaluaAng AlternaAve Security SoluAons for a ParAcular System A methodology is required in order to clarify reasoning and prioriazaaons regarding unavoidable cyber security vagaries: RelaAonships between soluaons and adversarial responses MulAdimensional contribuaons of individual security services to complex amributes, such as deterrence Scores can be derived in many different forms Single scalar value where bigger is bemer 2 scalar values: (1) security value added, (2) system level disvalues MulA objecave component scores providing more transparency ASRR 10/11 October
25 Metrics AMack phase based security value factors: Pre AMack (Deterrence) Trans AMack (Defense) Post AMack (RestoraAon) Would include collateral system impact metrics for the security architecture: Performance Reliability, Safety Complexity, Costs ASRR 10/11 October
26 System Aware Security System Scoring Matrix RelaDve Value Weights k 1 k 2 k 3 k 4 k 5 k 6 k j Value Factors Security Services Diversity (s 1 ) Hopping (s 2 ) Data ConAnuity Checking (s 3 ) TacAcal Forensics (s 4 ) Deterrence Real Time Defense Collateral System Impacts RestoraDon ImplementaDon Cost Life Cycle Cost s 11 s 12 s 1j s 21 s 22 s 2j s 31 s 32 s 3j s 41 s 42 s 4j Other (s i ) s i1 s i2 s ij Other ASRR 10/11 October
27 System Aware Security System Scoring Matrix RelaDve Value Weights k 1 k 2 k 3 k 4 k 5 k 6 k j Value Factors Security Services Diversity (s 1 ) Hopping (s 2 ) Data ConAnuity Checking (s 3 ) TacAcal Forensics (s 4 ) Deterrence Real Time Defense Collateral System Impacts RestoraDon ImplementaDon Cost Life Cycle Cost s 11 s 12 s 1j s 21 s 22 j= 1 s 2j s ij = Assurance Level of s 31 s 32 the ith service as s 3j related to the jth value factor s ij = QuanAzed Assurance Level = 0 M s 41 s p n 42 s 4j Security = k j s ij Score j= 1 i= 1 Other (s i ) s i1 s i2 Max Possible Score = n x M s ij p k j = 1 Other ASRR 10/11 October
28 Example Facility Defense Scoring Matrix RelaDve Value Weights K 1 =0.30 K 2 = 0.20 k 3 =0.10 K 4 = 0.20 K 5 = 0.05 K 6 = 0.15 Value Factors Security Services Diversity (s 1 ) Hopping (s 2 ) Data ConAnuity Checking (s 3 ) TacAcal Forensics (s 4 ) Deterrence Real Time Defense Collateral System Impacts RestoraDon ImplementaDon Cost Max Possible Score = 20 Facility Defense Score = 11.5 Life Cycle Cost Strongest Area is RestoraAon Weakest Area is Life Cycle Cost 28
29 On Going ExploraAon A pracacal methodology for determining Assurance Level Values Methodology for addressing uncertainty in assigning Assurance Level Values Methodology for ualizing RelaAve Value Weights Tradeoffs between scoring simplicity and transparency of results ASRR 10/11 October
30 Structured Arguments for System Scoring Builds upon the legacy of work developed for safety and informaaon assurance case evaluaaons UAlizes Goal Structuring NotaAon (GSN) for communicaang arguments to support assigned scores in a repeatable and clear manner System Aware security scoring arguments for a paracular system architecture include: Context supplied by the system owner and includes an available risk analysis for the system being protected and scoring guidelines System supplier provides the list of security services to be applied and characterizes the purposes expected of security services that are deemed as most peranent to reducing risk Specific claims about value factors and the anacipated effects of security services on these factors ExplanaAons of how each security service is anacipated to impact specific value factor claims, including explicitly dividing each service into policy, process, and technology components with corresponding explanaaons of value 30
31 Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (1) Architectural Deterrence Claim Assigned suitable scores for deterrence Service SelecDon Strategy Decompose the Architecture to isolate, for the purposes of scoring, security services that address deterrence Data ConDnuity Service Claim Improves deterrence Diversity Service Claim See later slide Context Risk analysis and scoring guidelines Scoring Assignment Strategy UAlize experts to score service claims with accompanying raaonale Forensics Service Claim Hopping Service Claim 31
32 Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (2) Data ConDnuity Service Claim (1) ExploitaAon design requires distributed exploit designers Data ConDnuity Service Claim Improves deterrence Data ConDnuity Service Claim (2) ExploitaAon design requires designers with deep systems knowledge.. Data ConDnuity Service Claim (n) 32
33 Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (3) Data ConDnuity Service Claim (1) ExploitaAon design requires distributed exploit designers Red Team Evidence Document Data ConDnuity Service Claim Improves deterrence System Design Team Evidence Document Intelligence Analysis Evidence Document 33
34 Simplified DiagrammaAc RepresentaAon of a Structured Argument for Deterrence Scoring (4) Data ConDnuity Service Claim Improves deterrence Data ConDnuity Service Claim (2) ExploitaAon design requires designers with deep systems knowledge System Design Team Evidence Document 34
System Aware Cyber Security
System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012
How To Design A Cyber Security Architecture
A System-Aware Cyber Security Architecture Rick A. Jones and Barry Horowitz* Regular Paper Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 A SYSTEM-AWARE CYBER SECURITY
IOmark Suite. Benchmarking Storage with Applica4on Workloads August, 2013. 2013 Evaluator Group, Inc.
IOmark Suite Benchmarking Storage with Applica4on Workloads August, 2013 1 What is IOmark Suite?! A storage specific benchmark for applicaaon workloads Tests storage only Supports VDI and Virtual Machine
How to Develop a Funding Model
How to Develop a Funding Model Seri Renkin CEO, ten20 Foundation Caroline Chernov Executive Director, ten20 Foundation Greg Peel CEO & Managing Director, Bendigo Bank Community Sector Banking Jane Vadiveloo
BBM467 Data Intensive ApplicaAons
Hace7epe Üniversitesi Bilgisayar Mühendisliği Bölümü BBM467 Data Intensive ApplicaAons Dr. Fuat Akal [email protected] FoundaAons of Data[base] Clusters Database Clusters Hardware Architectures Data
TL 9000 Measurements Handbook, Release 5.0
Logo or heading here TL 9000 Measurements Handbook, Release 5.0 Changes from Release 4.5 Overview Measurements Handbook Changes R4.5 to R 5.0 Input from Sub- teams and IniAaAves tasked with developing
SERC Security. By Jennifer Bayuk
SERC Security By Jennifer Bayuk Annual SERC Research Review October 5 6, 2011 University of Maryland MarrioF Inn and ConvenHon Center HyaFsville, MD www.sercuarc.org Annual SERC Research Review, October
Scality RING High performance Storage So7ware for Email pla:orms, StaaS and Cloud ApplicaAons
Scality RING High performance Storage So7ware for Email pla:orms, StaaS and Cloud ApplicaAons Friday, March 18, 2011 MARKET ExponenAal Storage Demand The Digital Universe: Growing by a factor of 44 in
BBM467 Data Intensive ApplicaAons
Hace7epe Üniversitesi Bilgisayar Mühendisliği Bölümü BBM467 Data Intensive ApplicaAons Dr. Fuat Akal [email protected] Problem How do you scale up applicaaons? Run jobs processing 100 s of terabytes
Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham
Copyright 2014 Splunk Inc. Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham Head of Grid CompuAng OperaAons & Support Credit Suisse Disclaimer During the course of this presentaaon, we may make forward-
BBM467 Data Intensive ApplicaAons
Hace7epe Üniversitesi Bilgisayar Mühendisliği Bölümü BBM467 Data Intensive ApplicaAons Dr. Fuat Akal [email protected] Overview What is Cloud CompuAng? VirtualizaAon Service Oriented CompuAng What is
IBM's Strategic Approach to System- Centric MFT with Sterling Connect:Direct and WebSphere MQ Advanced
IBM's Strategic Approach to System- Centric MFT with Sterling Connect:Direct and WebSphere MQ Advanced Dirk A. Maney Product Line Manager Managed File Transfer and Aspera Please Note IBM s statements regarding
Business Case Development for Credit and Debit Card Fraud Re- Scoring Models
Business Case Development for Credit and Debit Card Fraud Re- Scoring Models Kurt Gutzmann Managing Director & Chief ScienAst GCX Advanced Analy.cs LLC www.gcxanalyacs.com October 20, 2011 www.gcxanalyacs.com
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
Informa4on Security Management at Cer4ficate Authori4es
Informa4on Security Management at Cer4ficate Authori4es István Zsolt BERTA [email protected] Public Key Cryptographic Primi4ves 1 PKI lectures 1. Public key cryptography primiaves 2. CerAficates, CerAficate
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
Recruitment Process Outsourcing
Recruitment Process Outsourcing What, When and Why Some ideas to get you thinking about RPO What is Recruitment Process Outsourcing (RPO)? 2 What is Recruitment Process Outsourcing (RPO)? A client- centric
evm Virtualization Platform for Windows
B A C K G R O U N D E R evm Virtualization Platform for Windows Host your Embedded OS and Windows on a Single Hardware Platform using Intel Virtualization Technology April, 2008 TenAsys Corporation 1400
Agile Contracts The Foundation of Successful Partnering
Agile Contracts The Foundation of Successful Partnering Hosts: Alex Brown Christine Hegarty 2011 Scrum Inc. Who We Are Scrum Inc. is the Agile leadership company of Dr. Jeff Sutherland, co-creator of Scrum.
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Cybersecurity Capacity Assessment of the Republic of Kosovo. Lara Pace Kosovo June 2015
Cybersecurity Capacity Assessment of the Republic of Kosovo Lara Pace Kosovo June 2015 CMM - Five Dimensions Levels of Maturity Start- up: At this level either nothing exists, or it is very embryonic in
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
Understand Your SAP HR and Payroll Reporting Options In A Cloud, On-Premise and Hybrid World
Understand Your SAP HR and Payroll Reporting Options In A Cloud, On-Premise and Hybrid World SpinifexIT Webinar Danielle Larocca, SpinifexIT Copyright 2014 SpinifexIT Pty Ltd. Questions How to submit a
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
On Reliability of COTS Hardware
On Reliability of COTS Hardware Dr. Li Mo Chief Architect, CTO Group Agenda Differences between Telecom Hardware and COTS Hardware Analysis Framework Enhancing ApplicaAon Reliability via Backups TheoreAcal
Innova&ve IT Solu&ons. Oracle ACFS / Cloud File System. Unleash your Business- criacal ApplicaAons. Ma#hias Pölzinger Senior Consultant
Oracle ACFS / Cloud File System Unleash your Business- criacal ApplicaAons Ma#hias Pölzinger Senior Consultant Speaker Ma#hias Pölzinger ma#[email protected] h#p://kb.initso.at Senior Consultant
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
A distributed data processing architecture for real time intelligent transport systems
A distributed data processing architecture for real time intelligent transport systems K. Nesenbergs ([email protected]) L. Selavo ([email protected]) Institute of Electronics and Computer Science
A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
Execu&ve Coaching Program Design Checklist
Execu&ve Coaching Program Design Checklist Anyone responsible for execu1ve coaching in his/her organiza1on will benefit from this checklist. We have compiled all the key ques1ons that must be asked for
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
University of Greenwich Graduate Internship Programme. Welcome Jerry Allen
University of Greenwich Graduate Internship Programme Welcome Jerry Allen th Monday 5 November AdministraAon IntroducAon unal 12.30 12.30-1.30 lunch 1.30-4.30 CompeAtor Analysis AdministraAon Passport/ID
Identity & Access Management: Strategic Roadmap. April 2013
Identity & Access Management: Strategic Roadmap April 2013 What is IAM? Identity & Access Management is the set of policies, process, and technologies used to manage digital identities and their access
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Process Solutions. Mitigating Cyber Security Risks in Legacy Process Control Systems. White Paper
Process Solutions White Paper Mitigating Cyber Security Risks in Legacy Process Control Executive Summary The term legacy process control system has different connotations for different people. To many,
CSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
GETTING STARTED WITH LABVIEW POINT-BY-POINT VIS
USER GUIDE GETTING STARTED WITH LABVIEW POINT-BY-POINT VIS Contents Using the LabVIEW Point-By-Point VI Libraries... 2 Initializing Point-By-Point VIs... 3 Frequently Asked Questions... 5 What Are the
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
4.1 CD 301 - BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time)
4.1 CD 301 - BSc (Hons) Information Technology (Diploma to Degree Upgrade 1.5 Years Part Time) 1. OBJECTIVES This Programme is geared towards producing computer professionals, with a thorough understanding
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
Audit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
Combating Cyber Risk in the Supply Chain
SESSION ID: CRWD-W01 Combating Cyber Risk in the Supply Chain Joshua C. Douglas CTO Raytheon Cyber Products @RaytheonCyber Did You Know? 76% of all data breaches result from a third-party which introduced
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Software Development around a Millisecond
Introduction Software Development around a Millisecond Geoffrey Fox In this column we consider software development methodologies with some emphasis on those relevant for large scale scientific computing.
SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS
SERVICE SCHEDULE MANAGED HOSTED APPLICATIONS This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
70-646 R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day
70-646 R3: Windows Server 2008 Administration Course Length: 4 Day Course Overview This course will prepare the student for Exam 70-646: Pro: Windows Server 2008, Server Administrator. Topics covered include
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Strategic Plan FY 2014-2016
Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION
Proactive Network Performance Monitoring
Proactive Network Performance Monitoring No other tool is as flexible and robust as Goliath Performance Monitor We have been using Goliath Performance Monitor for many years. We have looked at other tools
Smart Manufacturing as a Real-Time Networked Enterprise and a Market-Driven Innovation Platform
Smart Manufacturing as a Real-Time Networked Enterprise and a Market-Driven Innovation Platform Jim Davis Vice Provost IT & CTO at UCLA and SMLC Board Director Technology Denise Swink CEO SMLC Role/Viewpoint
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Federal CIO: Cloud Selection Toolkit. Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald
Federal CIO: Cloud Selection Toolkit Georgetown University: Chris Radich Dana Christiansen Doyle Zhang India Donald Agenda Project Introduction Agency Cloud Challenges Toolkit Solution Overview Step 1:
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
A Robust Dynamic Load-balancing Scheme for Data Parallel Application on Message Passing Architecture
A Robust Dynamic Load-balancing Scheme for Data Parallel Application on Message Passing Architecture Yangsuk Kee Department of Computer Engineering Seoul National University Seoul, 151-742, Korea Soonhoi
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
POLIWALL: AHEAD OF THE FIREWALL
POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Open Source Software for Cyber Operations:
W H I T E P A P E R Open Source Software for Cyber Operations: Delivering Network Security, Flexibility and Interoperability Introduction For the last decade, the use of open source software (OSS) in corporate
Adaptive Sampling and the Autonomous Ocean Sampling Network: Bringing Data Together With Skill
Adaptive Sampling and the Autonomous Ocean Sampling Network: Bringing Data Together With Skill Lev Shulman, University of New Orleans Mentors: Paul Chandler, Jim Bellingham, Hans Thomas Summer 2003 Keywords:
SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network
u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
INTERMEDIATE QUALIFICATION
PROFESSIONAL QUALIFICATION SCHEME INTERMEDIATE QUALIFICATION SERVICE CAPABILITY PLANNING, PROTECTION AND OPTIMIZATION CERTIFICATE SYLLABUS The Swirl logo is a trade mark of the Cabinet Office ITIL is a
