POLISH TELECOM SECURITY INCIDENT RESPONSE TEAM

Size: px
Start display at page:

Download "POLISH TELECOM SECURITY INCIDENT RESPONSE TEAM"

Transcription

1 POLISH TELECOM SECURITY INCIDENT RESPONSE TEAM Incident handling, statistics and procedures Warsaw, May 2003

2 TABLE OF CONTENTS I. INFORMATION ABOUT TP SECURITY INCIDENT RESPONSE TEAM 3 II. TP NETWORK 4 1. Technologies 4 2. Structure of the network 5 3. Access to the Internet 6 III. INCIDENT HANDLING 7 1. Incident classification 7 2. Incident handling - support computing 8 IV. STATISTICS OF INCIDENTS Total number of registered incidents in Total number of registered incidents - type of events (I-IV.2003) Number attacks profile Percent of recognised categories of the incidents Complaints sender Source of attack 18 V. INCIDENT HANDLING - INCIDENT RESPONSE Cooperation Incident response Cooperation with Polish Police and Public Prosecutor 21 VI. CONCLUSION 23 2

3 I. Information about... I. Information about... TP Security Incident Response Team INFORMATION ABOUT TP SECURITY INCIDENT RESPONSE TEAM TP Security Incident Response Team* History of the team start structure Team s activities registration and classification of incidents localisation of an intruder incident response analysis of new threats others (conferences, working meetings, mass-media) Basic rules of incidents handling gathering information from users, administrators, the police and other institutions about incidents concerning all addresses within Polish Telecom IP range incidents reported by government institutions are handled first 3

4 II. TP Network 1. Technologies Technologies TECHNOLOGIES VSAT X.25, TCP/IP Internet TCP/IP Frame Relay / ATM, X.25, TCP/IP X.25, X.28, X.32 X.400, X.500, EDI 4

5 II. TP Network 2. Structure of the network POLPAK Network POLPAK NETWORK Slupsk Gdansk Elblag Suwalki Koszalin Olsztyn Szczecin Torun Pila Bydgoszcz X2 Ciechanów Ostroleka Lomza Bialystok Gorzów Wlkp. Poznan Wloclawek Plock Warszawa Zielona Góra Leszno Konin Kalisz Skierniewice Lódz Siedlce Biala Podlaska LEGEND: MAN 2,5 Legend: Gb/s 155 Mb/s MAN 2,5Gb/s amount of links 155 Mb/s 34 Mb/s X2 amount of links Legnica Zgorzelec Jelenia Góra Lubin Walbrzych Wroclaw Opole Sieradz Katowice Bielsko Biala Piotrków Trybunalski Czestochowa Kraków X2 Kielce Nowy Sacz Radom Tarnobrzeg Tarnów Krosno Lublin Chelm Zamosc Rzeszów Przemysl Topology of the POLPAK-T (date: ) 5

6 II. TP Network 3. Access to the Internet Access to the Internet ACCESS TO THE INTERNET ISP INTERNET NSP Telia&OpenTransit (FT) 2,5 Gb/s LAN SUBSCRIBER TCP/IP LAN LMDS Terminal abonencki VSAT POLPAK do 2 Mb/s Frame Relay SUBSCRIBER Frame Relay MODEM PPP PSTN CVX-1800 MODEM LAN SUBSCRIBER TCP/IP VIDEO SUBSCRIBER TCP/IP MODEM ISDN PPP ISDN TELEPHON SPLITER do 8 Mb/s ADSL TERMINAL HIS HIS do 115 kb/s do 155 Mb/s ATM SUBSCRIBER ATM MODEM ADSL TELEPHON LAN 6

7 III. Incident handling 1. Incident classification Incident classification POLISH TELECOM CLASSIFICATION OF INCIDENTS H - The most dangerous incidents (hacking, breaking in, modifying, deleting, stealing) P Type of events concerning hacking attempts (scan, probe) T - Copyright and special incidents (requests of the Police, plagiarism, piracy) B - Denial of service incidents (flood, DoS, DDoS, mailbombing) O - Violation of the netiquette (offensive words, pornography) M - Spam incidents (spam to advertise) R - Spam-relay incidents (open relay, open proxy)* STARTING THE 3rd QUARTER OF 2002 TP RESPONSE TEAM USE COMMON LANGUAGE CLASSFICATION IN THEIR PROCEDURES 7

8 III. Incident handling 2. Incident handling... Incident Service System INCIDENT SERVICE SYSTEM (ISS) Incident Service System (ISS): Is a database which allows gathering, registering and classifying of incidents Contains an advanced administration mechanisms and access control Automates incident handling process by: tracking incident handling process quick access to stored incidents Accelerates incident handling 8

9 III. Incident handling 2. Incident handling... ISS function ISS FUNCTION Basic system function : incident importing from web site incident data inputting (from different sources) incident analysing incident searching printing warnings, reports, statistics sending reply intruder history Other system function: contacts and information management incident handling process management task planning 9

10 III. Incident handling 2. Incident handling... ISS structure diagram ISS STRUCTURE DIAGRAM INCIDENTS Phone call, fax Phone call, fax Internet users Letter Letter INTERNET Web browser Web Reporting browser form Reporting form Web browser Web Reporting browser form Reporting form INCIDENT HANDLING System operators ISS operator ISS operator ISS operator ISS LAN or WAN System administration 10

11 III. Incident handling 2. Incident handling... ISS incident handling process diagram ISS INCIDENT HANDLING PROCESS DIAGRAM STAGE 1 Registration, reply, analysis, classification, back up Incidents: - Phone - Fax - Letter Incidents: - - Reporting form Legend: Start states Working states Final states STAGE 2 Introduction, automatic reply, analysis, classification, back up INTRODUCTION STAGE 3 Locating, modification WITHOUT PHONE NUMBER LOCATING LOCATION SUSPENSION STAGE 4 analysis continuation, modification VERIFICATION STAGE 5 Response, information, modification PHONE CALL PRINTING TO ADMIN STAGE 6 Back up, blockade ENDED SUSPENSION CLOSED BLOCKED Process administration 11

12 III. Incident handling 2. Incident handling... ISS incident handling process diagram ISS INCIDENT HANDLING PROCESS DIAGRAM STAGE 1 Registration, reply, analysis, classification, back up Incidents: - Phone - Fax - Letter Incidents: - - Reporting form Legend: Start states Working states Final states STAGE 2 Introduction, automatic reply, analysis, classification, back up INTRODUCTION STAGE 3 Locating, modification WITHOUT PHONE NUMBER LOCATING LOCATION SUSPENSION STAGE 4 analysis continue, modification VERIFICATION STAGE 5 Response, information, modification - incidents: registration, introduction, analysis, modification - incidents : alarm system A - incidents number exceeded PHONE CALL PRINTING TO ADMIN STAGE 6 Back up, blockade - incidents : alarm system B - waiting time exceeded Process administration ENDED SUSPENSION CLOSED BLOCKED 12

13 IV. Statistics of incidents 1. Total number of... Number of incidents TOTAL NUMBER OF REGISTERED INCIDENTS IN Number of incidents Total number of incidents Number of spamrelay incidents* Year Number of other incidents */ Starting 2001 spam-relay events are not counted together with other incidents. 13

14 IV. Statistics of incidents 2. Total number of... Number of incidents - type of events NUMBER OF REGISTERED INCIDENS - TYPE OF EVENTS (I-IV.2003) IV.2003) 0,5% 2,0% 0,3% 0,1% 31,5% T O H M P B 65,7% Spam-relay events were not included 14

15 IV. Statistics of incidents 3. Number attack profile Number attack profile PROFILE OF ATTACKS (I-IV.2003) IV.2003) Number of incidents Scan Probe Internet worms Hacking Denial of Service Virus Mailbombing Spam* Other Attack profile */ Spam-relay events were not included 15

16 IV. Statistics of incidents 4. Percent of recognised... Percent of recognised categories of the incidents PERCENTAGE OF RECOGNISED INCIDENTS CATEGORIES (I-IV.2003) IV.2003) ACCORDING TO THE COMMON LANGUAGE CLASSIFICATION ,0% 81,7% 100,0% 100,0% 79,8,% Number of incidents[%] ,9% ,5% 0 Attackers Tool Vulnerability Action Target Unauthorized Result Objectives Category 16

17 IV. Statistics of incidents 5. Complaints sender Complaints sender SOURCE OF COMPLAINTS (I-IV.2003) IV.2003) 17% 83% Complaints from Poland Complaints from abroad 17

18 IV. Statistics of incidents 6. Source of attack Source of attack SOURCE OF ATTACKS (I-IV.2003) IV.2003) 8% 8% 31% 53% Dial-up ( /24/30) Leased lines (FR) Home Internet Solution (HIS) Asynchronous Digital Subscriber Line (ADSL) 18

19 V. Incident handling Cooperation Cooperation COOPERATION CERT Team (e.g. CERT Polska) The police Public Prosecutors Other government Institutions Other Polish ISPs 19

20 V. Incident handling Incident response Incident response INCIDENT RESPONSE I. Information/Warning 1. Phone Letter II. Blockade - discharge 20

21 V. Incident handling Cooperation with... Number of requests NUMBER OF REQUESTS FROM POLISH POLICE AND PUBLIC PROSECUTOR

22 V. Incident handling Cooperation with... Registered data and information REGISTRATION OF DATA AND INFORMATION SENT THROUGH THE NETWORK According to new regulations operators are obliged to enable selected government institution access to the following: Data subscriber / user identification location and identification connections between nodes in the network type of connection and other data Information sent through the network 22

23 VI. Conclusion Conclusion Conclusion - TP Security Incident Response Team CONCLUSION TP Security Incident Response Team* Operate against network abuse incidents, the additional role is to prevent, educate and inform. Team`s Web site, special line for victims, s, warnings. Trace kinds and ways of network abuse and adapt its procedures to current demands. CERT Cooperation, Security sites in the internet. Take active part in implementing standards of handle and incident classification. Implementing the Common Language classification. Cooperate with security institutions: the police, public prosecutors and network administrators. 23

24 HOW TO CONTACT TP SECURITY INCIDENT RESPONSE TEAM - INCIDENT REPORTING Incidents can be reported by: Web site (On-line Form): Address: - [email protected] - [email protected] - [email protected] TP S.A. - POLPAK Network Security Department ul. Nowogrodzka Warszawa POLAND Phone: +48 /22/ Fax: +48 /22/

25 ADDRESS SHEET PRESENTATION DEVELOPED BY: Division: Department: Phone #: Web site: TP SA - POLPAK Network Security +48 /22/ [email protected] 25

Customs Service Better services in the age of digital lifestyle

Customs Service Better services in the age of digital lifestyle Customs Service Better services in the age of digital lifestyle Editor: Marcin Woźniczko Text: Monika Szewczyk Cover design: Mirosław Wojtowicz DTP: Publishing House C&C Photos. Property of the Customs

More information

PIONIER the national fibre optic network for new generation services Artur Binczewski, Maciej Stroiński Poznań Supercomputing and Networking Center

PIONIER the national fibre optic network for new generation services Artur Binczewski, Maciej Stroiński Poznań Supercomputing and Networking Center PIONIER the national fibre optic network for new generation services Artur Binczewski, Maciej Stroiński Poznań Supercomputing and Networking Center e-irg Workshop October 12-13, 2011; Poznań, Poland 18th

More information

KMD National Data Storage

KMD National Data Storage KMD National Data Storage in the PIONIER network Maciej Brzezniak, Norbert Meyer, Rafał Mikołajczak Maciej Stroiński Location igrid2005, Sept. 27th, 2005 SZCZE KOSZAL P GDAŃSK IN BYD GOSZCZ OZNAŃ TORUŃ

More information

Financing investments supported by EU funds The role of mbank

Financing investments supported by EU funds The role of mbank Financing investments supported by EU funds The role of mbank Jarosław Fordoński Head of European Union Office June 24th, 2015, Zurich mbank in Poland Profile of an innovative universal bank the first

More information

TELEMEDICINE in POLAND

TELEMEDICINE in POLAND TELEMEDICINE in POLAND Antoni Nowakowski Department of Biomedical Engineering Gdansk University of Technology Gdańsk, POLAND Ministry of Science and Higher Education Committee of Information Infrastructure

More information

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE

Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE www.getintegra.com Version 10/10 Integra Telecom, Inc. Thank you for choosing Integra Telecom s DSL High Speed

More information

Remuneration offered to Specialists

Remuneration offered to Specialists Remuneration offered to Specialists Remuneration and Pay Rises by Provinces... 2 Salaries by Sectors... 7 Remuneration at Polish and Foreign Companies... 8 Remuneration at Companies with Varied Staffing

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Poland very heart of Europe

Poland very heart of Europe WELCOME TO POLAND . Poland very heart of Europe 3 The Group The largest hotel operator and leading hotel employer in Poland UP TO OVER 14,000 ROOMS 65 HOTELS HOTELS OPERATE UNDER THE BRANDS SOFITEL, NOVOTEL,

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS

PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS Vol. 36 (2005) ACTA PHYSICA POLONICA B No 5 PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS Julian Sienkiewicz and Janusz

More information

Mariusz-Jan Radło, Ph.D.

Mariusz-Jan Radło, Ph.D. Offshoring and outsourcing of services: Evidence from Poland Mariusz-Jan Radło, Ph.D. ========================= Warsaw School of Economics, associate professor head of the Postgraduate Studies of Business

More information

Advanced Service Platform for e-science. Robert Pękal, Maciej Stroiński, Jan Węglarz (PSNC PL)

Advanced Service Platform for e-science. Robert Pękal, Maciej Stroiński, Jan Węglarz (PSNC PL) Advanced Service Platform for e-science Robert Pękal, Maciej Stroiński, Jan Węglarz (PSNC PL) PLATON Service Platform for e-science Operational Programme: Innovative Economy 2007-2013 Investments in development

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

(For purposes of this Agreement, You,  users, and account holders are used interchangeably, and where applicable). Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..

More information

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.

More information

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers

More information

Coordinating author: Wojciech GREGA (AGH University of Science and Technology, Akademia Górniczo-Hutnicza im. Stanislawa Staszica,

Coordinating author: Wojciech GREGA (AGH University of Science and Technology, Akademia Górniczo-Hutnicza im. Stanislawa Staszica, 21B19. PL: Polska (Pol) Coordinating author: Wojciech GREGA (AGH University of, Akademia Górniczo-Hutnicza im. Stanislawa Staszica, [email protected]) Other contributors: Andrzej Tutaj, Wojciech Kreft,

More information

POSSIBILITIES OF DH SECTOR INVESTMENTS IN POLAND

POSSIBILITIES OF DH SECTOR INVESTMENTS IN POLAND DBDH ANNUAL MEETING 27TH NOV 2014 POSSIBILITIES OF DH SECTOR INVESTMENTS IN POLAND WHAT, WHY, HOW AND WHERE RAMBOLL POLSKA SP. Z O.O. SEATED IN WARSAW In operation on Polish market since 1990 Previous

More information

TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.

TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada. TERMS OF SERVICE IMPORTANT NOTICE: *All Payments to Orbit Cloud Inc are Non-Refundable* Orbit Cloud Inc. ("Orbit Cloud", "The Company") agrees to furnish services to the Subscriber, subject to the following

More information

The ING Foundation for Polish Arts

The ING Foundation for Polish Arts ING COMMERCIAL FINANCE POLAND ANNUAL REPORT 2012 The ING Foundation for Polish Arts All images presented in the Annual Report belong to The ING Foundation for Polish Arts. The ING Foundation for Polish

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Denial of Service (DoS) Technical Primer

Denial of Service (DoS) Technical Primer Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of

More information

COMPANY PRESENTATION KUCHNIE ŚWIATA S.A.

COMPANY PRESENTATION KUCHNIE ŚWIATA S.A. COMPANY PRESENTATION KUCHNIE ŚWIATA S.A. Poland, Łomna ul. Gdańska 34, 05-152 Czosnów, tel. +48 22 785 95 20 e-mail. [email protected], www.kuchnieswiata.com.pl KUCHNIE ŚWIATA ABOUT 1989 2004 2013

More information

COMPETITION IN POLISH URBAN PUBLIC TRANSPORT. Michal Wolanski Warsaw School of Economics

COMPETITION IN POLISH URBAN PUBLIC TRANSPORT. Michal Wolanski Warsaw School of Economics COMPETITION IN POLISH URBAN PUBLIC TRANSPORT 1. GENERAL OVERVIEW Michal Wolanski Warsaw School of Economics A general transformation of Polish urban public transport commenced at the beginning of the 90

More information

In fdi s Polish Cities of the Future REGIONS POLISH CITIES OF THE FUTURE

In fdi s Polish Cities of the Future REGIONS POLISH CITIES OF THE FUTURE S Polish Cities of the Future 2015/16 WARSAW HAS BEEN NAMED fdi S POLISH CITY OF THE FUTURE 2015/16 IN fdi S INAUGURAL RANKING OF CITIES IN THE COUNTRY. KRAKOW AND POZNAN HAVE COME IN SECOND AND THIRD

More information

company profile the system that connects

company profile the system that connects company profile the system that connects 2 the system that connects Table of contents 1. Company Profile 2. Transmission System 3. Investment Projects 4. LNG Terminal 5. Customer Relations 6. GAZ-SYSTEM

More information

Interoperability in Nursing. Implementation of ICNP in Poland.

Interoperability in Nursing. Implementation of ICNP in Poland. Interoperability in Nursing. Implementation of ICNP in Poland. Dorota Kilańska RN, MSc, PhD EHealth Council in Nursing at the Center for Health Information Systems MoH ICN-Accredited Centre For ICNP Research

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

Fusion Acceptable Use Policy. Effective Feb 2, 2015

Fusion Acceptable Use Policy. Effective Feb 2, 2015 Fusion Acceptable Use Policy Effective Feb 2, 2015 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer or Customer s end users) the ability to learn about Fusion and

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Poland. networking, digital divide andgridprojects. M. Pzybylski The Poznan Supercomputing and Networking Center, Poznan, Poland

Poland. networking, digital divide andgridprojects. M. Pzybylski The Poznan Supercomputing and Networking Center, Poznan, Poland Poland networking, digital divide andgridprojects M. Pzybylski The Poznan Supercomputing and Networking Center, Poznan, Poland M. Turala The Henryk Niewodniczanski Instytut of Nuclear Physics PAN and ACK

More information

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224 COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist

More information

Member Directory. The Delegation of Poland to the OSCE PA

Member Directory. The Delegation of Poland to the OSCE PA Mr. Slawomir Nitras Head of Delegation Chancellery of the Senate ul. Wiejska 6 Civic Platform Szczecin Ms. Barbara Bartus Deputy Head of Delegation Law and Justice Nowy Sącz Legislation Committee deputy

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Promoting Network Security (A Service Provider Perspective)

Promoting Network Security (A Service Provider Perspective) Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

CSIRT Description for CERT OPL

CSIRT Description for CERT OPL CSIRT Description for CERT OPL Table of Contents 1. Document Information 2 1.1. Date of Last Update 2 1.2. Distribution List for Notifications 2 1.3. Locations where this Document May Be Found 2 1.4. Authentication

More information

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4

More information

Come to Poland Discover Europe

Come to Poland Discover Europe Studying in Poland Come to Poland Discover Europe Welcome to Poland, a modern and dynamic member of the European Union where education really counts. If you wish to learn more about our long and rich tradition

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.

More information

ADVERTISEMENT PRICE LIST

ADVERTISEMENT PRICE LIST ADVERTISEMENT PRICE LIST THIS PRICE LIST REMAINS VALID FROM 21 DECEMBER 2015 This price list is addressed to businesses and does not constitute information addressed to persons wishing to purchase the

More information

MEDICAL EDUCATION in ENGLISH. Marek Krawczyk Rector Magnificus Medical University of Warsaw

MEDICAL EDUCATION in ENGLISH. Marek Krawczyk Rector Magnificus Medical University of Warsaw MEDICAL EDUCATION in ENGLISH Marek Krawczyk Rector Magnificus Medical University of Warsaw INTERNATIONAL EDUCATION in POLAND 29 172 foreign students in Poland from 142 countries foreign students represent

More information

PGF - financial results 2Q2006 Łódź, August 2006 r.

PGF - financial results 2Q2006 Łódź, August 2006 r. PGF - financial results 2Q2006 Łódź, August 2006 r. Polska Grupa Farmaceutyczna S.A. Warszawa, 22 sierpnia 2006 r. 1 Almost 1500 pharmacies operating under one brand APTEKI dbam o zdrowie The biggest pharmaceutical

More information

Network Service, Systems and Data Communications Monitoring Policy

Network Service, Systems and Data Communications Monitoring Policy Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring

More information

Cyber Security ( Lao PDR )

Cyber Security ( Lao PDR ) ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Strategies to Protect Against Distributed Denial of Service (DD

Strategies to Protect Against Distributed Denial of Service (DD Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics

More information

Multi-Homing Gateway. User s Manual

Multi-Homing Gateway. User s Manual Multi-Homing Gateway User s Manual Contents System 5 Admin Setting Date/Time Multiple Subnet Hack Alert Route Table DHCP DNS Proxy Dynamic DNS Language Permitted IPs Logout Software Update 8 12 21 22 33

More information

Acceptable Use Policy of UNWIRED Ltd.

Acceptable Use Policy of UNWIRED Ltd. Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network

More information

ACCEPTABLE USE AND TAKEDOWN POLICY

ACCEPTABLE USE AND TAKEDOWN POLICY ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words

More information

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers Introduction to Ethical Hacking and Network Defense January 14, 2010 MIS 4600 - Abdou Illia Objectives Describe the role of an ethical hacker Describe what can an ethical hacker legally do Describe what

More information

Resolutions adopted by the Extraordinary General Meeting of PGNiG SA convened for April 24th 2014

Resolutions adopted by the Extraordinary General Meeting of PGNiG SA convened for April 24th 2014 Warsaw, April 24th 2014 Resolutions adopted by the Extraordinary General Meeting of PGNiG SA convened for April 24th 2014 Current Report no. 59/2014 The Management Board of Polskie Górnictwo Naftowe i

More information

Status of the digital radio implementation in Poland. Pawel Mathia [email protected] Geneva, 11 February 2015

Status of the digital radio implementation in Poland. Pawel Mathia pawel.mathia@polskieradio.pl Geneva, 11 February 2015 Status of the digital radio implementation in Poland Pawel Mathia [email protected] Geneva, 11 February 2015 Digital Radio in Poland 1996.04.28 Starting experimental broadcasting of four programs

More information

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012

Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012 Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use

More information

Acceptable Use Policy ("AUP")

Acceptable Use Policy (AUP) Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while

More information

1 Introduction. Agenda Item: 7.23. Work Item:

1 Introduction. Agenda Item: 7.23. Work Item: 3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:

More information

Session 4.1. Network Planning Strategy for evolving Network Architectures Session 4.1-1. Service matrix forecasting. Broadband

Session 4.1. Network Planning Strategy for evolving Network Architectures Session 4.1-1. Service matrix forecasting. Broadband ITU Seminar Warsaw, Poland, 6-10 October 2003 Session 4.1 Service and applications matrix forecasting Network Planning Strategy for evolving Network Architectures Session 4.1-1 Service matrix forecasting

More information

1 Introduction. Agenda Item: 7.23. Work Item:

1 Introduction. Agenda Item: 7.23. Work Item: 3GPP TSG SA WG3 Security S3#34 S3-040682 6-9 Jul 2004 updated S3-040632 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040583 based on the comments in SA3#34 meeting Source:

More information

POLISH INFORMATION AND FOREIGN INVESTMENT AGENCY. Automotive industry in Poland

POLISH INFORMATION AND FOREIGN INVESTMENT AGENCY. Automotive industry in Poland POLISH INFORMATION AND FOREIGN INVESTMENT AGENCY Automotive industry in Poland Automotive industry in Poland in 2010 892 companies (of which 270 with foreign shareholding) motor vehicle production: 887

More information