POLISH TELECOM SECURITY INCIDENT RESPONSE TEAM
|
|
|
- Andra Andrews
- 10 years ago
- Views:
Transcription
1 POLISH TELECOM SECURITY INCIDENT RESPONSE TEAM Incident handling, statistics and procedures Warsaw, May 2003
2 TABLE OF CONTENTS I. INFORMATION ABOUT TP SECURITY INCIDENT RESPONSE TEAM 3 II. TP NETWORK 4 1. Technologies 4 2. Structure of the network 5 3. Access to the Internet 6 III. INCIDENT HANDLING 7 1. Incident classification 7 2. Incident handling - support computing 8 IV. STATISTICS OF INCIDENTS Total number of registered incidents in Total number of registered incidents - type of events (I-IV.2003) Number attacks profile Percent of recognised categories of the incidents Complaints sender Source of attack 18 V. INCIDENT HANDLING - INCIDENT RESPONSE Cooperation Incident response Cooperation with Polish Police and Public Prosecutor 21 VI. CONCLUSION 23 2
3 I. Information about... I. Information about... TP Security Incident Response Team INFORMATION ABOUT TP SECURITY INCIDENT RESPONSE TEAM TP Security Incident Response Team* History of the team start structure Team s activities registration and classification of incidents localisation of an intruder incident response analysis of new threats others (conferences, working meetings, mass-media) Basic rules of incidents handling gathering information from users, administrators, the police and other institutions about incidents concerning all addresses within Polish Telecom IP range incidents reported by government institutions are handled first 3
4 II. TP Network 1. Technologies Technologies TECHNOLOGIES VSAT X.25, TCP/IP Internet TCP/IP Frame Relay / ATM, X.25, TCP/IP X.25, X.28, X.32 X.400, X.500, EDI 4
5 II. TP Network 2. Structure of the network POLPAK Network POLPAK NETWORK Slupsk Gdansk Elblag Suwalki Koszalin Olsztyn Szczecin Torun Pila Bydgoszcz X2 Ciechanów Ostroleka Lomza Bialystok Gorzów Wlkp. Poznan Wloclawek Plock Warszawa Zielona Góra Leszno Konin Kalisz Skierniewice Lódz Siedlce Biala Podlaska LEGEND: MAN 2,5 Legend: Gb/s 155 Mb/s MAN 2,5Gb/s amount of links 155 Mb/s 34 Mb/s X2 amount of links Legnica Zgorzelec Jelenia Góra Lubin Walbrzych Wroclaw Opole Sieradz Katowice Bielsko Biala Piotrków Trybunalski Czestochowa Kraków X2 Kielce Nowy Sacz Radom Tarnobrzeg Tarnów Krosno Lublin Chelm Zamosc Rzeszów Przemysl Topology of the POLPAK-T (date: ) 5
6 II. TP Network 3. Access to the Internet Access to the Internet ACCESS TO THE INTERNET ISP INTERNET NSP Telia&OpenTransit (FT) 2,5 Gb/s LAN SUBSCRIBER TCP/IP LAN LMDS Terminal abonencki VSAT POLPAK do 2 Mb/s Frame Relay SUBSCRIBER Frame Relay MODEM PPP PSTN CVX-1800 MODEM LAN SUBSCRIBER TCP/IP VIDEO SUBSCRIBER TCP/IP MODEM ISDN PPP ISDN TELEPHON SPLITER do 8 Mb/s ADSL TERMINAL HIS HIS do 115 kb/s do 155 Mb/s ATM SUBSCRIBER ATM MODEM ADSL TELEPHON LAN 6
7 III. Incident handling 1. Incident classification Incident classification POLISH TELECOM CLASSIFICATION OF INCIDENTS H - The most dangerous incidents (hacking, breaking in, modifying, deleting, stealing) P Type of events concerning hacking attempts (scan, probe) T - Copyright and special incidents (requests of the Police, plagiarism, piracy) B - Denial of service incidents (flood, DoS, DDoS, mailbombing) O - Violation of the netiquette (offensive words, pornography) M - Spam incidents (spam to advertise) R - Spam-relay incidents (open relay, open proxy)* STARTING THE 3rd QUARTER OF 2002 TP RESPONSE TEAM USE COMMON LANGUAGE CLASSFICATION IN THEIR PROCEDURES 7
8 III. Incident handling 2. Incident handling... Incident Service System INCIDENT SERVICE SYSTEM (ISS) Incident Service System (ISS): Is a database which allows gathering, registering and classifying of incidents Contains an advanced administration mechanisms and access control Automates incident handling process by: tracking incident handling process quick access to stored incidents Accelerates incident handling 8
9 III. Incident handling 2. Incident handling... ISS function ISS FUNCTION Basic system function : incident importing from web site incident data inputting (from different sources) incident analysing incident searching printing warnings, reports, statistics sending reply intruder history Other system function: contacts and information management incident handling process management task planning 9
10 III. Incident handling 2. Incident handling... ISS structure diagram ISS STRUCTURE DIAGRAM INCIDENTS Phone call, fax Phone call, fax Internet users Letter Letter INTERNET Web browser Web Reporting browser form Reporting form Web browser Web Reporting browser form Reporting form INCIDENT HANDLING System operators ISS operator ISS operator ISS operator ISS LAN or WAN System administration 10
11 III. Incident handling 2. Incident handling... ISS incident handling process diagram ISS INCIDENT HANDLING PROCESS DIAGRAM STAGE 1 Registration, reply, analysis, classification, back up Incidents: - Phone - Fax - Letter Incidents: - - Reporting form Legend: Start states Working states Final states STAGE 2 Introduction, automatic reply, analysis, classification, back up INTRODUCTION STAGE 3 Locating, modification WITHOUT PHONE NUMBER LOCATING LOCATION SUSPENSION STAGE 4 analysis continuation, modification VERIFICATION STAGE 5 Response, information, modification PHONE CALL PRINTING TO ADMIN STAGE 6 Back up, blockade ENDED SUSPENSION CLOSED BLOCKED Process administration 11
12 III. Incident handling 2. Incident handling... ISS incident handling process diagram ISS INCIDENT HANDLING PROCESS DIAGRAM STAGE 1 Registration, reply, analysis, classification, back up Incidents: - Phone - Fax - Letter Incidents: - - Reporting form Legend: Start states Working states Final states STAGE 2 Introduction, automatic reply, analysis, classification, back up INTRODUCTION STAGE 3 Locating, modification WITHOUT PHONE NUMBER LOCATING LOCATION SUSPENSION STAGE 4 analysis continue, modification VERIFICATION STAGE 5 Response, information, modification - incidents: registration, introduction, analysis, modification - incidents : alarm system A - incidents number exceeded PHONE CALL PRINTING TO ADMIN STAGE 6 Back up, blockade - incidents : alarm system B - waiting time exceeded Process administration ENDED SUSPENSION CLOSED BLOCKED 12
13 IV. Statistics of incidents 1. Total number of... Number of incidents TOTAL NUMBER OF REGISTERED INCIDENTS IN Number of incidents Total number of incidents Number of spamrelay incidents* Year Number of other incidents */ Starting 2001 spam-relay events are not counted together with other incidents. 13
14 IV. Statistics of incidents 2. Total number of... Number of incidents - type of events NUMBER OF REGISTERED INCIDENS - TYPE OF EVENTS (I-IV.2003) IV.2003) 0,5% 2,0% 0,3% 0,1% 31,5% T O H M P B 65,7% Spam-relay events were not included 14
15 IV. Statistics of incidents 3. Number attack profile Number attack profile PROFILE OF ATTACKS (I-IV.2003) IV.2003) Number of incidents Scan Probe Internet worms Hacking Denial of Service Virus Mailbombing Spam* Other Attack profile */ Spam-relay events were not included 15
16 IV. Statistics of incidents 4. Percent of recognised... Percent of recognised categories of the incidents PERCENTAGE OF RECOGNISED INCIDENTS CATEGORIES (I-IV.2003) IV.2003) ACCORDING TO THE COMMON LANGUAGE CLASSIFICATION ,0% 81,7% 100,0% 100,0% 79,8,% Number of incidents[%] ,9% ,5% 0 Attackers Tool Vulnerability Action Target Unauthorized Result Objectives Category 16
17 IV. Statistics of incidents 5. Complaints sender Complaints sender SOURCE OF COMPLAINTS (I-IV.2003) IV.2003) 17% 83% Complaints from Poland Complaints from abroad 17
18 IV. Statistics of incidents 6. Source of attack Source of attack SOURCE OF ATTACKS (I-IV.2003) IV.2003) 8% 8% 31% 53% Dial-up ( /24/30) Leased lines (FR) Home Internet Solution (HIS) Asynchronous Digital Subscriber Line (ADSL) 18
19 V. Incident handling Cooperation Cooperation COOPERATION CERT Team (e.g. CERT Polska) The police Public Prosecutors Other government Institutions Other Polish ISPs 19
20 V. Incident handling Incident response Incident response INCIDENT RESPONSE I. Information/Warning 1. Phone Letter II. Blockade - discharge 20
21 V. Incident handling Cooperation with... Number of requests NUMBER OF REQUESTS FROM POLISH POLICE AND PUBLIC PROSECUTOR
22 V. Incident handling Cooperation with... Registered data and information REGISTRATION OF DATA AND INFORMATION SENT THROUGH THE NETWORK According to new regulations operators are obliged to enable selected government institution access to the following: Data subscriber / user identification location and identification connections between nodes in the network type of connection and other data Information sent through the network 22
23 VI. Conclusion Conclusion Conclusion - TP Security Incident Response Team CONCLUSION TP Security Incident Response Team* Operate against network abuse incidents, the additional role is to prevent, educate and inform. Team`s Web site, special line for victims, s, warnings. Trace kinds and ways of network abuse and adapt its procedures to current demands. CERT Cooperation, Security sites in the internet. Take active part in implementing standards of handle and incident classification. Implementing the Common Language classification. Cooperate with security institutions: the police, public prosecutors and network administrators. 23
24 HOW TO CONTACT TP SECURITY INCIDENT RESPONSE TEAM - INCIDENT REPORTING Incidents can be reported by: Web site (On-line Form): Address: - [email protected] - [email protected] - [email protected] TP S.A. - POLPAK Network Security Department ul. Nowogrodzka Warszawa POLAND Phone: +48 /22/ Fax: +48 /22/
25 ADDRESS SHEET PRESENTATION DEVELOPED BY: Division: Department: Phone #: Web site: TP SA - POLPAK Network Security +48 /22/ [email protected] 25
Customs Service Better services in the age of digital lifestyle
Customs Service Better services in the age of digital lifestyle Editor: Marcin Woźniczko Text: Monika Szewczyk Cover design: Mirosław Wojtowicz DTP: Publishing House C&C Photos. Property of the Customs
PIONIER the national fibre optic network for new generation services Artur Binczewski, Maciej Stroiński Poznań Supercomputing and Networking Center
PIONIER the national fibre optic network for new generation services Artur Binczewski, Maciej Stroiński Poznań Supercomputing and Networking Center e-irg Workshop October 12-13, 2011; Poznań, Poland 18th
KMD National Data Storage
KMD National Data Storage in the PIONIER network Maciej Brzezniak, Norbert Meyer, Rafał Mikołajczak Maciej Stroiński Location igrid2005, Sept. 27th, 2005 SZCZE KOSZAL P GDAŃSK IN BYD GOSZCZ OZNAŃ TORUŃ
Financing investments supported by EU funds The role of mbank
Financing investments supported by EU funds The role of mbank Jarosław Fordoński Head of European Union Office June 24th, 2015, Zurich mbank in Poland Profile of an innovative universal bank the first
TELEMEDICINE in POLAND
TELEMEDICINE in POLAND Antoni Nowakowski Department of Biomedical Engineering Gdansk University of Technology Gdańsk, POLAND Ministry of Science and Higher Education Committee of Information Infrastructure
Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE
Integra Telecom 4690 Colorado St. SE Prior Lake, Mn 55372 952.226.7097 DSL INSTALLATION GUIDE www.getintegra.com Version 10/10 Integra Telecom, Inc. Thank you for choosing Integra Telecom s DSL High Speed
Remuneration offered to Specialists
Remuneration offered to Specialists Remuneration and Pay Rises by Provinces... 2 Salaries by Sectors... 7 Remuneration at Polish and Foreign Companies... 8 Remuneration at Companies with Varied Staffing
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Poland very heart of Europe
WELCOME TO POLAND . Poland very heart of Europe 3 The Group The largest hotel operator and leading hotel employer in Poland UP TO OVER 14,000 ROOMS 65 HOTELS HOTELS OPERATE UNDER THE BRANDS SOFITEL, NOVOTEL,
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS
Vol. 36 (2005) ACTA PHYSICA POLONICA B No 5 PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS Julian Sienkiewicz and Janusz
Mariusz-Jan Radło, Ph.D.
Offshoring and outsourcing of services: Evidence from Poland Mariusz-Jan Radło, Ph.D. ========================= Warsaw School of Economics, associate professor head of the Postgraduate Studies of Business
Advanced Service Platform for e-science. Robert Pękal, Maciej Stroiński, Jan Węglarz (PSNC PL)
Advanced Service Platform for e-science Robert Pękal, Maciej Stroiński, Jan Węglarz (PSNC PL) PLATON Service Platform for e-science Operational Programme: Innovative Economy 2007-2013 Investments in development
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).
Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
Coordinating author: Wojciech GREGA (AGH University of Science and Technology, Akademia Górniczo-Hutnicza im. Stanislawa Staszica,
21B19. PL: Polska (Pol) Coordinating author: Wojciech GREGA (AGH University of, Akademia Górniczo-Hutnicza im. Stanislawa Staszica, [email protected]) Other contributors: Andrzej Tutaj, Wojciech Kreft,
POSSIBILITIES OF DH SECTOR INVESTMENTS IN POLAND
DBDH ANNUAL MEETING 27TH NOV 2014 POSSIBILITIES OF DH SECTOR INVESTMENTS IN POLAND WHAT, WHY, HOW AND WHERE RAMBOLL POLSKA SP. Z O.O. SEATED IN WARSAW In operation on Polish market since 1990 Previous
TERMS OF SERVICE. This Agreement shall be construed in all respects in accordance with the laws of the province of Ontario and Canada.
TERMS OF SERVICE IMPORTANT NOTICE: *All Payments to Orbit Cloud Inc are Non-Refundable* Orbit Cloud Inc. ("Orbit Cloud", "The Company") agrees to furnish services to the Subscriber, subject to the following
The ING Foundation for Polish Arts
ING COMMERCIAL FINANCE POLAND ANNUAL REPORT 2012 The ING Foundation for Polish Arts All images presented in the Annual Report belong to The ING Foundation for Polish Arts. The ING Foundation for Polish
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
COMPANY PRESENTATION KUCHNIE ŚWIATA S.A.
COMPANY PRESENTATION KUCHNIE ŚWIATA S.A. Poland, Łomna ul. Gdańska 34, 05-152 Czosnów, tel. +48 22 785 95 20 e-mail. [email protected], www.kuchnieswiata.com.pl KUCHNIE ŚWIATA ABOUT 1989 2004 2013
COMPETITION IN POLISH URBAN PUBLIC TRANSPORT. Michal Wolanski Warsaw School of Economics
COMPETITION IN POLISH URBAN PUBLIC TRANSPORT 1. GENERAL OVERVIEW Michal Wolanski Warsaw School of Economics A general transformation of Polish urban public transport commenced at the beginning of the 90
In fdi s Polish Cities of the Future REGIONS POLISH CITIES OF THE FUTURE
S Polish Cities of the Future 2015/16 WARSAW HAS BEEN NAMED fdi S POLISH CITY OF THE FUTURE 2015/16 IN fdi S INAUGURAL RANKING OF CITIES IN THE COUNTRY. KRAKOW AND POZNAN HAVE COME IN SECOND AND THIRD
company profile the system that connects
company profile the system that connects 2 the system that connects Table of contents 1. Company Profile 2. Transmission System 3. Investment Projects 4. LNG Terminal 5. Customer Relations 6. GAZ-SYSTEM
Interoperability in Nursing. Implementation of ICNP in Poland.
Interoperability in Nursing. Implementation of ICNP in Poland. Dorota Kilańska RN, MSc, PhD EHealth Council in Nursing at the Center for Health Information Systems MoH ICN-Accredited Centre For ICNP Research
This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
Fusion Acceptable Use Policy. Effective Feb 2, 2015
Fusion Acceptable Use Policy Effective Feb 2, 2015 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer or Customer s end users) the ability to learn about Fusion and
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Poland. networking, digital divide andgridprojects. M. Pzybylski The Poznan Supercomputing and Networking Center, Poznan, Poland
Poland networking, digital divide andgridprojects M. Pzybylski The Poznan Supercomputing and Networking Center, Poznan, Poland M. Turala The Henryk Niewodniczanski Instytut of Nuclear Physics PAN and ACK
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
Member Directory. The Delegation of Poland to the OSCE PA
Mr. Slawomir Nitras Head of Delegation Chancellery of the Senate ul. Wiejska 6 Civic Platform Szczecin Ms. Barbara Bartus Deputy Head of Delegation Law and Justice Nowy Sącz Legislation Committee deputy
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
CSIRT Description for CERT OPL
CSIRT Description for CERT OPL Table of Contents 1. Document Information 2 1.1. Date of Last Update 2 1.2. Distribution List for Notifications 2 1.3. Locations where this Document May Be Found 2 1.4. Authentication
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
Come to Poland Discover Europe
Studying in Poland Come to Poland Discover Europe Welcome to Poland, a modern and dynamic member of the European Union where education really counts. If you wish to learn more about our long and rich tradition
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.
ADVERTISEMENT PRICE LIST
ADVERTISEMENT PRICE LIST THIS PRICE LIST REMAINS VALID FROM 21 DECEMBER 2015 This price list is addressed to businesses and does not constitute information addressed to persons wishing to purchase the
MEDICAL EDUCATION in ENGLISH. Marek Krawczyk Rector Magnificus Medical University of Warsaw
MEDICAL EDUCATION in ENGLISH Marek Krawczyk Rector Magnificus Medical University of Warsaw INTERNATIONAL EDUCATION in POLAND 29 172 foreign students in Poland from 142 countries foreign students represent
PGF - financial results 2Q2006 Łódź, August 2006 r.
PGF - financial results 2Q2006 Łódź, August 2006 r. Polska Grupa Farmaceutyczna S.A. Warszawa, 22 sierpnia 2006 r. 1 Almost 1500 pharmacies operating under one brand APTEKI dbam o zdrowie The biggest pharmaceutical
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
Cyber Security ( Lao PDR )
ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Multi-Homing Gateway. User s Manual
Multi-Homing Gateway User s Manual Contents System 5 Admin Setting Date/Time Multiple Subnet Hack Alert Route Table DHCP DNS Proxy Dynamic DNS Language Permitted IPs Logout Software Update 8 12 21 22 33
Acceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
Introduction to Ethical Hacking and Network Defense. Objectives. Hackers
Introduction to Ethical Hacking and Network Defense January 14, 2010 MIS 4600 - Abdou Illia Objectives Describe the role of an ethical hacker Describe what can an ethical hacker legally do Describe what
Resolutions adopted by the Extraordinary General Meeting of PGNiG SA convened for April 24th 2014
Warsaw, April 24th 2014 Resolutions adopted by the Extraordinary General Meeting of PGNiG SA convened for April 24th 2014 Current Report no. 59/2014 The Management Board of Polskie Górnictwo Naftowe i
Status of the digital radio implementation in Poland. Pawel Mathia [email protected] Geneva, 11 February 2015
Status of the digital radio implementation in Poland Pawel Mathia [email protected] Geneva, 11 February 2015 Digital Radio in Poland 1996.04.28 Starting experimental broadcasting of four programs
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
1 Introduction. Agenda Item: 7.23. Work Item:
3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:
Session 4.1. Network Planning Strategy for evolving Network Architectures Session 4.1-1. Service matrix forecasting. Broadband
ITU Seminar Warsaw, Poland, 6-10 October 2003 Session 4.1 Service and applications matrix forecasting Network Planning Strategy for evolving Network Architectures Session 4.1-1 Service matrix forecasting
1 Introduction. Agenda Item: 7.23. Work Item:
3GPP TSG SA WG3 Security S3#34 S3-040682 6-9 Jul 2004 updated S3-040632 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040583 based on the comments in SA3#34 meeting Source:
POLISH INFORMATION AND FOREIGN INVESTMENT AGENCY. Automotive industry in Poland
POLISH INFORMATION AND FOREIGN INVESTMENT AGENCY Automotive industry in Poland Automotive industry in Poland in 2010 892 companies (of which 270 with foreign shareholding) motor vehicle production: 887
