ETRAC Presentation ECCN 4E001.c intrusion software technology. Jim O Gorman, President October 15, 2015
|
|
|
- Gillian Russell
- 9 years ago
- Views:
Transcription
1 ETRAC Presentation ECCN 4E001.c intrusion software technology Jim O Gorman, President October 15, 2015
2 Offensive Security - Projects Kali Linux (previously BackTrack Linux) Industry Standard Open source penetration testing platform Exploit DB Comprehensive archive of exploits, shellcode, and security papers comprising over 34,000 open source exploits CVE compliant Page: 2
3 Offensive Security - About Founded in 2007 Based on the belief that the only way to achieve sound defensive security is through an offensive approach Trainings and Certifications OSCP, OSCE, OSWP, OSWE, OSEE PWK, CTP, WiFu, AWE, AWAE Page: 3
4 Offensive Security - Services Provides highly advanced, team-based security assessments Clients include Fortune 100, Financial, Military, Law enforcement, and Healthcare Organizations Real world, maximum impact, extremely skilled and targeted hacker simulation Actively discovering and exploiting vulnerabilities in software such as Symantec, CA, HP, Microsoft Office, etc. Page: 4
5 Offensive Security - Overall Speaking strictly on behalf of Offensive Security Have engaged with various other organizations and individuals from the hacking community for input not enough input has been solicited from the hacking/information security community Page: 5
6 Proposed Technology Controls Proposed ECCN 4E001.c Technology required for the development of intrusion software Technology : Specific information necessary for the development, production, or use of a product. The information takes the form of technical data or technical assistance. 15 C.F.R Note 1: Technology is also specific information necessary for any of the following: operation, installation (including on-site installation), maintenance (checking), repair, overhaul, refurbishing, or other terms specified in ECCNs on the CCL that control technology. 15 C.F.R Technical data may take forms such as blueprints, plans, diagrams, models, formulae, tables, engineering designs and specifications, manuals and instructions written or recorded on other media or devices such as disk, tape, read only memories. 15 C.F.R. 772 (Technical Note). Technical assistance may take forms such as instructions, skills, training, working knowledge, consulting services. Technical assistance may involve transfer of technical data. 15 C.F.R. 772 (Technical Note). Page: 6
7 Intrusion Software Proposed ECCN 4D004 Software specially designed or modified for the generation, operation or delivery of, or communication with intrusion software. Intrusion software. (Cat 4) Software specially designed or modified to avoid detection by monitoring tools, or to defeat protective countermeasures, of a computer or network-capable device, and performing any of the following: (a) The extraction of data or information, from a computer or network-capable device, or the modification of system or user data; or (b) The modification of the standard execution path of a program or process in order to allow the executions of externally provided instructions. Page: 7
8 What is the Policy rationale? Identity Theft Enforcement and The bad conduct is already unlawful: Restitution Act Computer Fraud and Abuse Act Electronic Communications Privacy Economic Espionage Act IP infringement Trespass, theft, etc Act Digital Millennium Copyright Act Cyber Security Enhancement Act Page: 8
9 ETRAC Question #1 Is it possible to interpret proposed ECCN 4E001.c and the definition of intrusion software in such a way that legitimate cybersecurity research would not be affected? : No The fundamental problem is that the definition of intrusion software begins too broadly, and then tries to except what is considered to be legitimate items The regulate broadly and then make exceptions framework is unworkable in a dynamic technology area Page: 9
10 ETRAC Question #1 Items explicitly not covered: Hypervisors (Note 1) Debuggers (Note 1) Software Reverse Engineering (SRE) tools (Note 1) Digital Rights Management (DRM) Software (Note 1) Software designed to be installed by manufacturers, administrators, or users, for the purpose of asset tracking or recovery (Note 1) Exploit samples (FAQ #1) Exploit proof of concepts (FAQ #1) Other forms of malware (FAQ#1) Information on how to search for, discover or identify a vulnerability in a system, including vulnerability scanning (FAQ #4) Information about a vulnerability, including the causes of a vulnerability (FAQ #4) Information on testing the vulnerability, including fuzzing or otherwise trying different inputs to determine what happens (FAQ #4) Information on analyzing the execution or functionality of programs and processes running on a computer, including decompiling or disassembling code and dumping memory (FAQ #4) Published information (License Exception TSU; FAQ #4) Software that permits automatic updates and antivirus tools (FAQ #8) Software that only leaves evidence of a successful security breach without further compromising or controll[ing] the system (FAQ #11) Software that is designed to destroy data or systems (FAQ #11) Port scanners, packet sniffers, and protocol analyzers (FAQ #12) Vulnerability scanner which just finds vulnerabilities in a system without actually exploiting them and extracting data (FAQ #12) Zero day exploits (FAQ #15) Open source security tools (e.g., Metaspolit, Kali Linux) (FAQ #21) General purpose tools, such as IDEs (FAQ #29) Page: 10
11 ETRAC Question #1 Information for the development of intrusion software Items expressly covered: that may accompany the disclosure of an exploit (FAQ #24) Information required for developing, testing, refining, and Jailbreaking technology for software that meets the evaluating intrusion software, in order, for example, [] to create a controllable exploit that can reliably and predictably defeat protective countermeasures and extract information (FAQ #4) definition of 4D004 (FAQ #26) Everything else required for the development of intrusion software Information on how to prepare the exploit for delivery or Required is met so long as the information is directed to integrate it into a command and delivery platform (FAQ #4) the intrusion aspects of the software and not just generic information that is not responsible for the controlled item. 15 C.F.R The development or production of the command and delivery platform itself (FAQ #4) Technical data sent to an anti-virus company or software Development is met so long as the information is related manufacturer if the data will not be made publicly available (FAQ #10) to design, design research, design analyses, design concepts, etc. 15 C.F.R Page: 11
12 ETRAC Question #1 Legitimate example of what is prohibited: Proprietary training course materials provided outside of the U.S. or to non-u.s. persons (i.e., information on how to prepare an exploit for delivery or integrate it into a command and delivery platform) (FAQ #4) Page: 12
13 ETRAC Question #1 Presumption of denial for exports there is a policy of presumptive denial for items that have or support rootkit or zero-day exploit capabilities Many legitimate uses for rootkit and zero-day exploit capabilities Page: 13
14 ETRAC Question #1 Legitimate example of what is prohibited: Delivery of a security report to non-u.s. companies, U.S. subsidiaries located abroad, or non-u.s. persons at a U.S. company Page: 14
15 ETRAC Question #1 Legitimate example of what is prohibited: Provision of security consulting services outside of the U.S. and to nonu.s. companies (assuming that performance of the services requires the export of 4D004 software modified for the generation, operation or delivery of, or communication with intrusion software ) Page: 15
16 ETRAC Question #1 Legitimate example of what is prohibited: Security researcher s communications beyond an exploit with non-u.s. companies, U.S. subsidiaries located abroad, or non-u.s. persons at a U.S. company Page: 16
17 ETRAC Question #2 Is it possible to develop a license exception, including but not limited to deemed exports and intra-corporate transfers, that will allow legitimate cybersecurity research to proceed without licensing delays and compliance burden? If so, what are the provisions of such a license exception? Page: 17
18 ETRAC Question #2 Best Approach: Remove technology controls altogether The proposed rule does not control exploits because we recognize they are necessary for research and legitimate end use Why then would we control the information required to develop an exploit when we do not even control the exploit itself? This makes no sense. This would be like controlling the instructions on how to develop a missile, but not controlling the missile itself. Page: 18
19 ETRAC Question #2 Alternative Approaches (All would be needed, not just some): LICENSE EXCEPTION FOR EDUCATION AND TRAINING LICENSE EXCEPTION FOR INTRA-COMPANY TRANSFERS LICENSE EXCEPTION FOR EXPORTS TO U.S. SUBSIDIARIES LICENSE EXCEPTION FOR EXPORTS TO CERTAIN FRIENDLY COUNTRIES LICENSE EXCEPTION FOR TECHNOLOGY EXCHANGES RELATED TO SECURITY RESEARCH AND DEVELOPMENT Page: 19
20 ETRAC Question #2 Education and Training Exception exports or reexports of educational and training technology and related items provided as part of a course or offering made generally available to the public Page: 20
21 ETRAC Question #2 Intra-Company Transfers exports or reexports of technology and related items by a U.S. company and its subsidiaries to foreign nationals who are employees, contractors, or interns of a foreign company that is a parent, subsidiary, or affiliate of the U.S. company Page: 21
22 ETRAC Question #2 Exports to U.S. Subsidiaries exports or reexports of technology and related items to any U.S. subsidiary, wherever located, provided that such item is for internal company use of the item Page: 22
23 ETRAC Question #2 Exports to Certain Friendly Countries exports or reexports of technology and related items to private sector end-users that are located in a country listed in Supplement No. 3 for internal company use of the item Page:23
24 ETRAC Question #2 Technology Exchanges Related to Security Research and Development exports or reexports of technology and related items within and across computer security research and development teams for discovering, evaluating, and countering threats, vulnerabilities, and exploits to computer or networks, provided that such threats, vulnerabilities, or exploits are made known or will be made known to the software vendor or publisher covers Bug Bounty Programs covers capture the flag programs Page: 24
25 ETRAC Question #3 Is there a license requirement (combination of destination/end user/end use) and regulatory interpretation that would address the exchanges of technology that are of concern (i.e., those not intended to ultimately improve cybersecurity) that would result in no licensing burden on legitimate technology exchanges? Page: 25
26 ETRAC Question #3 KEY CONCEPTS: BROAD EDUCATIONAL AND TRAINING EXCEPTION BROAD EXCEPTION FOR R&D WHERE VULNERABILITY WILL BE MADE KNOWN TO THE VENDOR BROAD EXCEPTION FOR EXPORTS TO FRIENDLY COUNTRIES AND U.S. SUBSIDIARIES WHERE SUCH ITEMS ARE FOR INTERNAL COMPANY USE Page:26
27 ETRAC Question #4 If none of the measures above would be adequate, what changes to the control text, including the definition of intrusion software, would be required to ensure that legitimate cybersecurity research will not be affected? Page:27
28 ETRAC Question #4 Focus on intrusion is misguided; its what happens after the intrusion occurs that matters Surveillance software is often the payload of the malicious intrusion; these payloads can be delivered many other ways Page: 28
29 Questions? 2015 Assessment Overview
Export Controls on Intrusion Software. Collin Anderson (@CDA) Tom Cross (@_decius_)
Export Controls on Intrusion Software Collin Anderson (@CDA) Tom Cross (@_decius_) Do Export Controls on Intrusion Software Threaten Security Research? Truth is we don t know. (We re not lawyers and this
I. The Proposed Interpretation of Intrusion Software Inappropriately Fails to Exclude Software for Defensive Activities
July 20, 2015 Ms. Hillary Hess Director, Regulatory Policy Division Room 2099B Bureau of Industry and Security U.S. Department of Commerce 14th Street & Pennsylvania Ave., N.W. Washington, D.C. 20230 Re:
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Acceptable Use Policy
Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT
ASL IT SECURITY XTREME XPLOIT DEVELOPMENT V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: The most dangerous threat is the one which do not have a CVE. Until now developing reliable exploits
In-House Vs. Hosted Email Security. 10 Reasons Why Your Email is More Secure in a Hosted Environment
In-House Vs. Hosted Email Security 10 Reasons Why Your Email is More Secure in a Hosted Environment Introduction Software as a Service (SaaS) has quickly become the standard delivery model for critical
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Intrusion Software Tools and Export Control Introduction. Export Control in Context
Intrusion Software Tools and Export Control Introduction The purpose of this Note is to explain the controls on export of intrusion software tools that were agreed by the Wassenaar Arrangement in December
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware A White Paper presented by: Torsten Rössel Director of Business Development Innominate Security Technologies
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
ELECTRONIC INFORMATION SECURITY A.R.
A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
What s New with HIPAA? Policy and Enforcement Update
What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:
IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT
CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
InnoCaption TM Service Terms of Use
PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Student Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS
BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS IMPORTANT: READ THIS CAREFULLY BEFORE INSTALLING, USING OR ELECTRONICALLY
Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Acceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015 TODAY S PRESENTER Viviana Campanaro, CISSP Director, Security and
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
Page 1 of 15. VISC Third Party Guideline
Page 1 of 15 VISC Third Party Guideline REVISION CONTROL Document Title: Author: File Reference: VISC Third Party Guidelines Andru Luvisi CSU Information Security Managing Third Parties policy Revision
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360
SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT ( LICENSE AGREEMENT ) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW).
Peer to Peer File Sharing and Copyright Infringement Policy
Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
Course Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Security Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SECURITY ESSENTIALS 1.0
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SECURITY ESSENTIALS 1.0 These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Virtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Information Security Engineering
Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information
