Designing a Secure DNS Architecture
|
|
|
- Lionel Sullivan
- 10 years ago
- Views:
Transcription
1 WHITE PAPER Dsigning a Scur DNS Architctur In today s ntworking landscap, it is no longr adquat to hav a DNS infrastructur that simply rsponds to quris. What is ndd is an intgratd scur DNS architctur that also nabls smart growth.
2 Introduction DNS is an ssntial part of any modrn-day organization. DNS, or Domain Nam Systm, is th protocol usd for convrting fully qualifid domain nams (FQDNs) lik into machin-usabl IP addrsss that computrs us to communicat with ach othr. Without a working DNS protocol, it would b almost impossibl to hav an Intrnt of Things that communicat with ach othr. Whil thr ar multipl ways to classify a DNS srvr, on that is spcially rlvant to this papr is th diffrnc btwn primary and scondary DNS srvrs. A primary DNS srvr can b dfind as on that holds th mastr copy of a DNS zon; whil a scondary srvr stors copis of th zon that it rcivs from th primary srvr. Thr could b many rasons for having a scondary DNS srvr, such as prformanc or a dsir to hid your primary srvr. Your customrs us your DNS systm to rach your wbsit. Without a propr DNS infrastructur, your organization would not hav a prsnc in cybrspac. Commrc companis would not b abl to sll thir srvics. Evn brick-andmortar companis nd DNS srvrs to advrtis thir products. In short, th Intrnt as w know it would not xist without DNS protocol. Architcting Your DNS As th dmand for an organization s srvics grows, so dos th load on its DNS srvrs. At som point, whthr it is du to lgitimat traffic or a malicious distributd dnial of srvic (DDoS) attack, th load on th DNS srvr xcds th capacity of th srvr. At this point vry organization looks for ways to incras DNS quris-pr-scond (QPS) capacity. On approach to this problm is to augmnt th primary DNS srvr with a fastr, scondary DNS srvr. This approach works mor fficintly if th two srvrs ar intgratd and us th sam databas and intrfacs. Using two sparat DNS srvrs hr can introduc som introprability issus in basic faturs lik backup and rstor, rporting, and managmnt in gnral. A unifid intrfac is also an important considration hr and can nsur prsrvation of your invstmnt, and lowr total cost of ownrship (TCO). Anothr solution hr is to dploy svral DNS srvrs bhind a load balancr. This approach works bst if th DNS srvrs ar unifid to nsur as of managmnt and dploymnt consistncy to all srvrs. Whn dsigning a DNS infrastructur, it is important to build an nvironmnt that is not only sufficint for currnt nds, but also provids room for futur growth. In addition, whil architcting your DNS, it is also important to undrstand th scurity thrats th DNS might b vulnrabl to. W will discuss ths nxt. 1 WHITE PAPER Dsigning a Scur DNS Architctur
3 Scuring th DNS Platform Hacking of DNS srvrs is bcoming mor prvalnt vry day. Convntional DNS srvrs hav multipl attack surfacs and xtranous ports such as port 80 and port 25 that ar opn for attack. Hackrs can us ths ports to accss th oprating systm (OS) and hack your srvrs. If your DNS srvrs don t support tird scurity privilgs, any usr could potntially gain accss to OS-lvl account privilgs and caus configuration changs that could mak your srvrs vulnrabl to hacks. Morovr, updats to convntional DNS srvrs oftn rquir tim-consuming manual procsss. Dfnding against DNS Attacks Anothr considration is protction of your DNS infrastructur from xtrnal attacks. Authoritativ DNS srvrs ar rachabl from th Intrnt. This maks thm potntially vulnrabl to attacks such as DNS flood and amplification, which can ffctivly stop your DNS srvr from rsponding. It is also important to prvnt ths srvrs from bcoming a tool to attack othr srvrs (DNS rflction attack). Rflction attacks can damag your company s rputation and cost mony in th long run. Evn though your authoritativ srvr sits bhind a firwall, most of ths attacks cannot b mitigatd by typical firwalls. Firwalls ar ill-prpard to protct you against application-layr attacks. Th ons that do, th so-calld NxtGn firwalls, tnd to hav vry littl covrag for DNS protocols. Ths solutions typically sprad thir scurity policis across a larg numbr of protocols and sacrific dpth for bradth of covrag. Load balancrs offr som basic lvl of protction against DNS floods lik NXDOMAIN DDoS attacks. Howvr, thr is a whol suit of DNS-basd attacks that can targt your xtrnal authoritativ DNS srvrs, and th mitigation capabilitis of load balancrs fall short whn it coms to addrssing all of thm. For xampl, load balancrs cannot protct against bad or malformd DNS quris. Load balancrs rspond to DDoS attacks at th DNS scurity primtr by scaling prformanc and sprading th load across multipl dvics using IP Anycast. Mrly adding mor load balancrs to th nvironmnt can prov to b an infficint and costly mthod of handling attacks. Rgardlss of th protction tchniqu that you us, it is important to stay on stp ahad of th attackrs. Kping protction up-to-dat is ky as th DNS thrat landscap continuously volvs, and attacks chang form. It is also ssntial to nsur that th updat of protction ruls is don automatically. With th nw lvl of sophistication that w ar sing in modrn-day attacks, it is not possibl to manually crat and add dtction ruls to your DNS. Entrpriss nd spcializd and automatd DNS protction. Your DNS infrastructur should protct itslf against invitabl DNS attacks on your organization. Ths attacks can tak on of two major forms: volumtric and DNS-spcific attacks. 2
4 Volumtric Attacks Ths attacks, somtims rfrrd to as DoS or DDoS, rly on xhausting a dvic s rsourcs. A typical DNS DDoS snds 10s or 100s of thousands of quris pr scond to a DNS srvr in ordr to xhaust th rsourcs on th DNS srvr and caus a srvic outag. Th historical approach to a DNS DDoS attack has bn to incras your capacity by ithr placing your DNS infrastructur bhind a load balancr or to us a fastr scondary DNS srvr to augmnt your primary srvr. Th problm with this approach is that it is a tmporary patch. According to Arbor Ntworks, 2013 includd svral DNS DDoS attacks of 100 Gbps or mor. With DNS-basd volumtric attacks making 10% of ovrall volumtric attacks and growing, w can only xpct this numbr to grow. Putting a load balancr or a fastr scondary srvr in front of th DNS srvr is not a cost-ffctiv approach to DDoS protction. This amounts to a tmporary patch and rquirs th organization to ramp up its infrastructur vry tim th bad guys catch up to thm. You nd intllignt DNS DDoS protction that dos not rspond to quris indiscriminatly but distinguishs lgitimat traffic from attack traffic. DNS-spcific Attacks Anothr soft spot for a DNS infrastructur is th actual protocol. Whn DNS protocol was dvlopd, fw could hav nvisiond a world whr malicious agnts or disgruntld workrs could xploit or bring down your DNS srvr. Today w raliz that any DNS srvr can b th targt of DNS-spcific attacks. Ths tak many forms: DNS rflction DNS amplification DNS xploits DNS protocol anomalis DNS tunnling Cach poisoning Th various intntions of ths typs of attacks ar to: Congst outbound srvr bandwidth (in th cas of amplification attacks), ovrwhlming ntwork componnts lik firwalls in th path Flood th DNS srvr with traffic to slow it down and prvnt it from rsponding to lgitimat quris Caus th DNS srvr to crash by xploiting its vulnrabilitis A propr DNS infrastructur should protct your DNS srvr against ths businssimpacting attacks. Prvnting Malwar and APTs from Using DNS Data brachs ar growing at a staggring pac, and ovr 100,000 nw Malwar sampls ar bing catalogud vry day. In 2013, thr wr 3,000 scurity incidnts with a total of 822 million rcords xposd worldwid. Many of th brachs wr drivn by Malwar and advancd prsistnt thrats (APTs). Invsting in nxt-gnration firwalls or intrusion prvntion systms (IPSs) can stop som Malwar from ntring th ntwork, but not all. Trnds lik bring your own dvic (BYOD) complicat th situation furthr and provid nw avnus for Malwar to ntr and go undtctd for longr priods of tim. 3 WHITE PAPER Dsigning a Scur DNS Architctur
5 Malwar and APTs vad traditional scurity dfnss by using DNS to find and communicat with botnts and command-and-control srvrs. Botnts and command-and-control srvrs hid bhind constantly changing combinations of domains and IP addrsss. Onc intrnal machins connct to ths dvics, additional malicious softwar is downloadd or snsitiv company data is xfiltratd. Somtims Malwar and APT attacks ar hiddn or disguisd by xtrnal attacks on ntworks. During an xtrnal attack, IT staff ar distractd in protcting th ntwork, and might miss alrts or warning logs about Malwar and APT activity within th ntwork. By having a singl intgratd and cntrally managd DNS infrastructur (xtrnal and intrnal) with visibility into both xtrnal attacks and Malwar and APT activity, IT will b abl to comprhnd th totality of vnts and tak appropriat action. Infoblox Scur DNS Infoblox Purpos-built Applianc and OS Infoblox provids hardnd, purpos-built DNS appliancs with minimizd attack surfacs with: No xtra or unusd ports opn to accss th srvrs No root login accss with th OS Rol-basd accss to maintain ovrall control All accss mthods ar scurd: Two-factor authntication for login accss Wb accss using HTTPS for ncryption SSL ncryption for applianc intraction via API Th DNS appliancs ar Common Critria EAL2 crtifid, which covrs vrification of hardwar, softwar, and manufacturing procsss. In addition, OS and application updats happn through a singl cntralizd procss, allowing for simpl and cntralizd managmnt and control. All of th abov scurs th DNS platform and hlps protct DNS srvics from various hacks. Infoblox Advancd DNS Protction Infoblox s Advancd DNS Protction solvs th problms of xtrnal attacks that targt your DNS. Advancd DNS Protction provids built-in, intllignt attack protction that kps track of sourc IPs of th DNS rqusts as wll as th DNS rcords rqustd. It can b usd to intlligntly drop xcssiv DNS DDoS rqusts from th sam IP, thrfor saving rsourcs to rspond to lgitimat rqusts. Th figur blow shows Advancd DNS Protction undr attack, and its rspons to good DNS quris. Whil th attacks wr bing launchd (rd lin graph), Advancd DNS Protction also rcivd 50k good DNS quris pr scond, all of which it rspondd to (blu lin graph), vn as th attacks pakd. Th tst was don using an indpndnt third-party scurity and prformanc-tsting platform. 4
6 DNS Quris pr Scond Attacks Rspons to good quris Timstamp (Sconds) Figur 1: Advancd DNS Protction rspons rat undr attack It is important to undrstand th diffrnc btwn this tchnology and BIND s rspons rat limiting (RRL). With BIND, rqusts ar rcivd and procssd, and only rsponss ar rat limitd. This is not an fficint approach sinc it uss valuabl CPU and mmory rsourcs to procss rqusts that th DNS srvr should nvr rspond to. This maks it mor likly for th DNS srvr to xhaust its rsourcs and crash which is th aim of a DDoS attack to bgin with. With Infoblox s tchnology, bad rqusts ar droppd bfor thy rach th cntral procssing unit. Hnc, it is a much mor fficint approach. This tchnology is availabl out of th box. Of cours, an attack on a mid-sizd organization would not hav th sam charactristic of on against a larg ntrpris. Whil Infoblox is rsponsibl for crating and maintaining protction ruls with Advancd DNS Protction, usrs can tun th paramtrs associatd with ach rul and customiz thm for thir nvironmnts. Ths nw adjustmnts ar ntrd through a graphical usr intrfac (GUI) but vrifid bfor thy ar applid to th rul ngin, nsuring that th systm oprats at pak prformanc. A typical load balancr dos not provid this lvl of customization. Som vndors might provid a scripting languag that nabls usrs and consultants to crat thir own ruls. Ths vndors do not maintain ths ruls, and usrs ar ultimatly applying thm at thir own risk. This can caus confusion and compatibility problms vry tim that a chang is mad in th product lin. As mntiond arlir, anothr attack vctor that could b usd against a DNS srvr is protocol-basd attacks. Ths includ DNS amplification, rflction, and cach poisoning. Advancd DNS Protction provids prbuilt ruls to protct DNS srvrs against ths and similar attacks. Infoblox activly monitors th latst DNS-basd vulnrabilitis and nsurs that it provids protction against ths attacks out of th box. Anothr advantag of Advancd DNS Protction s rul st is that it is automatically applid to DNS srvrs. It dos not rquir manual intrvntion, ithr through writing scripts or applying thm. This automatic dploymnt of protction ruls can sav prcious tim during an attack. 5 WHITE PAPER Dsigning a Scur DNS Architctur
7 Infoblox DNS Firwall Infoblox DNS Firwall addrsss th problm of Malwar and APTs using DNS to communicat with botnts and command-and-control srvrs to xfiltrat data. It dtcts and mitigats communication attmpts by Malwar to malicious domains and ntworks by: Enforcing rspons policis on traffic to suspicious domains, such as blocking it, r-dircting usrs, or allowing th traffic to pass through, so that administrators can dcid what to do whn a clint tris to connct with a suspicious domain Lvraging up-to-dat thrat data both on known malicious domains and zro-day APTs Extrnal attacks L R c gi on tim na at is sa nc Tr af fic ts Ex L R fl c gi tio n/ tim pl at oi ca Am pl ifi Automatd Thrat Updat Srvic Rul updats for DNS-basd attacks Tr af fic tio n Providing timly rporting on malicious DNS quris and pinpointing infctd dvics that ar making th quris INTERNET Block DNS attacks Infoblox Advancd DNS Protction Infoblox DNS Caching Srvr Snd data for rports DMZ Infoblox Rporting Srvr Infoblox Advancd DNS Protction with DNS Firwall Malwar/APT n lin g Tr af fic Intrnal attacks D N S Tu n at tim gi L Po i h Ca c L gi tim at so ni Tr af fic T AP al w ar / ng Snd data for rports M INTRANET DNS Qury Updats for DNS-basd attacks and Malwar/APT Endpoints Figur 2: Scur DNS Dploymnt 6
8 Flxibility and Eas of Us Rgardlss of what tchnology is usd to protct an organization against xtrnal attacks, it is important to considr soft bnfits of th tchnology. Aftr all, th bst tchnical solution might bcom shlfwar if it is unralistically difficult and cumbrsom to implmnt. Most of today s tchnologis rly havily on command-lin intrfacs (CLIs) and scripting languags. Whil ths tchnologis look promising in architctur diagrams, th implmntation phas for thm is too xpnsiv and thy ar too hard to maintain, rsulting in ntrpriss nvr implmnting th full solution. Infoblox offrs its patntd Infoblox Grid tchnology. Important faturs lik highavailability, disastr rcovry, maintnanc and configuration, and backup and rcovry hav bn built into th Grid. A ntwork administrator can manag and configur just about vrything rlatd to DNS from th GUI, without having to gt into a CLI or having to script. This significantly rducs th possibility of mistyping commands and configurations and nabls th routin day-to-day activitis to b dlgatd to junior admins. Ultimatly, this hlps sav organizations mony and nabls thm to provid bttr srvic to thir customrs. Rporting An oftn-ovrlookd aspct of DNS architctur is rporting. A modrn DNS architctur should includ a rporting tchnology that provids cntralizd visibility and allows usrs to valuat th load on th systm, diagnos problms, and b alrtd whn th systm is undr attack. Conclusion Figur 3: Infoblox Rporting Dsigning a scalabl and scur DNS architctur rquirs mor than incrasd bandwidth and QPS. What looks simpl in a small tst lab tnds to bcom vry complx in a largr dploymnt. Infoblox Scur DNS Architctur, combind with Infoblox Grid tchnology, provids a comprhnsiv, scur, and scalabl DNS solution that not only provids low latncy and high throughput, but also nsurs availability of ssntial infrastructur to nabl your organization to both grow and stay protctd without th nd for frqunt infrastructur upgrads. 7 WHITE PAPER Dsigning a Scur DNS Architctur
9 Corporat Hadquartrs: (toll-fr, U.S. and Canada) EMEA Hadquartrs: APAC Hadquartrs: Infoblox Inc. All rights rsrvd. infoblox-whitpapr-dsigning-scur-dns-architctur-april2014
Continuity Cloud Virtual Firewall Guide
Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY
ITIL & Service Predictability/Modeling. 2006 Plexent
ITIL & Srvic Prdictability/Modling 1 2 Plxnt Th Company 2001 Foundd Plxnt basd on an Expandd ITIL Architctur, CMMI, ISO, and BS15000 - itdna 2003 Launchd itdna Srvic Offring 2003 John Groom, past Dirctor
Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg
Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly
WHITEPAPER. Designing a Secure DNS Architecture
WHITEPAPER Designing a Secure DNS Architecture Designing a Secure DNS Architecture In today s networking landscape, it is no longer adequate to have a DNS infrastructure that simply responds to queries.
REPORT' Meeting Date: April 19,201 2 Audit Committee
REPORT' Mting Dat: April 19,201 2 Audit Committ For Information DATE: March 21,2012 REPORT TITLE: FROM: Paul Wallis, CMA, CIA, CISA, Dirctor, Intrnal Audit OBJECTIVE To inform Audit Committ of th rsults
A Project Management framework for Software Implementation Planning and Management
PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis [email protected] Th goal of introducing nw tchnologis into your company
Maintain Your F5 Solution with Fast, Reliable Support
F5 SERVICES TECHNICAL SUPPORT SERVICES DATASHEET Maintain Your F5 Solution with Fast, Rliabl Support In a world whr chang is th only constant, you rly on your F5 tchnology to dlivr no mattr what turns
Adverse Selection and Moral Hazard in a Model With 2 States of the World
Advrs Slction and Moral Hazard in a Modl With 2 Stats of th World A modl of a risky situation with two discrt stats of th world has th advantag that it can b natly rprsntd using indiffrnc curv diagrams,
Product Overview. Version 1-12/14
Product Ovrviw Vrsion 1-12/14 W ar Grosvnor Tchnology Accss Control Solutions W dvlop, manufactur and provid accss control and workforc managmnt solutions th world ovr. Our product offring ompasss hardwar,
Moving Securely Around Space: The Case of ESA
Moving Scurly Around Spac: Th Cas of ESA Prpard By: Andra Baldi, Jos Frnandz Balsiro, Marco Incollingo Tommaso Parrinllo, Cristiano Silvagni, Stfano Zatti Europan Spac Agncy [email protected] ESA Scnario
Rural and Remote Broadband Access: Issues and Solutions in Australia
Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity
CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises
CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY Outcom 10 Rgulation 11 Safty and Suitability of Prmiss CQC Rf 10A 10A(1) Lad Dirctor / Lad Officr Rspons Impact Liklihood Lvl of Concrn
Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)
con 37: Answr Ky for Problm St (Chaptr 2-3) Instructor: Kanda Naknoi Sptmbr 4, 2005. (2 points) Is it possibl for a country to hav a currnt account dficit at th sam tim and has a surplus in its balanc
A Secure Web Services for Location Based Services in Wireless Networks*
A Scur Wb Srvics for Location Basd Srvics in Wirlss Ntworks* Minsoo L 1, Jintak Kim 1, Shyun Park 1, Jail L 2 and Sokla L 21 1 School of Elctrical and Elctronics Enginring, Chung-Ang Univrsity, 221, HukSuk-Dong,
Cisco Data Virtualization
Cisco Data Virtualization Big Data Eco-systm Discussion with Bloor Group Bob Ev, David Bsmr July 2014 Cisco Data Virtualization Backgroundr Cisco Data Virtualization is agil data intgration softwar that
Important Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2
Installation and Opration Intrnt Tlphony Adaptr Aurswald Box Indx C I R 884264 03 02/05 Call Duration, maximum...10 Call Through...7 Call Transportation...7 Calls Call Through...7 Intrnt Tlphony...3 two
by John Donald, Lecturer, School of Accounting, Economics and Finance, Deakin University, Australia
Studnt Nots Cost Volum Profit Analysis by John Donald, Lcturr, School of Accounting, Economics and Financ, Dakin Univrsity, Australia As mntiond in th last st of Studnt Nots, th ability to catgoris costs
Developing Economies and Cloud Security: A Study of Africa Mathias Mujinga School of Computing, University of South Africa [email protected].
Journal of Emrging Trnds in Computing and Information Scincs 2009-2012 CIS Journal. All rights rsrvd. Dvloping Economis and Cloud Scurity: A Study of Africa Mathias Mujinga School of Computing, Univrsity
Swisscom Cloud Strategy & Services
Swisscom Stratgy & Srvics Swisscom our 360 On for Entrpris Workloads and Wb Srvics Dynamic Computing Srvics Our intgratd approach is uniqu B2C B2B Ntwork, infrastructur and IT from a singl sourc All Industris
WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769
08-16-85 WORKERS' COMPENSATION ANALYST, 1774 SENIOR WORKERS' COMPENSATION ANALYST, 1769 Summary of Dutis : Dtrmins City accptanc of workrs' compnsation cass for injurd mploys; authorizs appropriat tratmnt
Personal Identity Verification (PIV) Enablement Solutions
Prsonal Idntity Vrification (PIV) Enablmnt Solutions pivclass Govrnmnt Solutions Affordabl Prsonal Idntity Vrification (PIV) Enablmnt Solutions from a Singl, Trustd Supplir Complt Solution for PIV Enablmnt
The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.
Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl
Scalable Transactions for Web Applications in the Cloud using Customized CloudTPS
Shashikant Mahadu Bankar/ (IJCSIT) Intrnational Journal of Computr Scinc and Information Tchnologis, Vol. (3), 2015, 218-2191 Scalabl Transactions for Wb Applications in th Cloud using Customizd CloudTPS
Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling
Planning and Managing Coppr Cabl Maintnanc through Cost- Bnfit Modling Jason W. Rup U S WEST Advancd Tchnologis Bouldr Ky Words: Maintnanc, Managmnt Stratgy, Rhabilitation, Cost-bnfit Analysis, Rliability
Combinatorial Analysis of Network Security
Combinatorial Analysis of Ntwork Scurity Stvn Nol a, Brian O Brry a, Charls Hutchinson a, Sushil Jajodia a, Lynn Kuthan b, and Andy Nguyn b a Gorg Mason Univrsity Cntr for Scur Information Systms b Dfns
UTILITY SOLUTIONS. Security & Site Monitoring. Substation Automation Solutions. Protection & Control Systems. Optical Communication Networks
Scurity & Sit Monitoring Substation Automation Solutions Protction & Control Systms Optical Communication Ntworks UTILITY Intgratd Automation SOLUTIONS for Elctric Utilitis GE Powr Systms GE Industrial
ESA Support to ESTB Users
ESA Support to ESTB Usrs Dr. Javir Vntura-Travst Europan Spac Agncy 3 rd ESTB Workshop Nic 12 Novmbr 2002 OUTLINE! ESA ESTB wbsit support! Th ESTB/EGNOS Hlpdsk! Th ESTB Nwslttr! Th ESA SISNET tchnology!
C H A P T E R 1 Writing Reports with SAS
C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd
Free ACA SOLUTION (IRS 1094&1095 Reporting)
Fr ACA SOLUTION (IRS 1094&1095 Rporting) Th Insuranc Exchang (301) 279-1062 ACA Srvics Transmit IRS Form 1094 -C for mployrs Print & mail IRS Form 1095-C to mploys HR Assist 360 will gnrat th 1095 s for
Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.
Volum 3, Issu 6, Jun 2013 ISSN: 2277 128X Intrnational Journal of Advancd Rsarch in Computr Scinc and Softwar Enginring Rsarch Papr Availabl onlin at: wwwijarcsscom Dynamic Ranking and Slction of Cloud
Engineering Analytics Opportunity Preview Zinnov Report August 2013
Enginring Analytics Opportunity Prviw Zinnov Rport August 2013 Enginring Analytics: Prviw Agnda Dfinition Markt Siz Summary 2 Enginring Analytics: Prviw Agnda Dfinition Markt Siz Summary 3 Agnda 1 Enginring
An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore
Intrnational Journal of mrging Tchnology and dvancd nginring Wbsit: www.ijta.com (ISSN 2250-2459, Volum 2, Issu 4, pril 2012) n road outlin of Rdundant rray of Inxpnsiv isks Shaifali Shrivastava 1 partmnt
Contents. Presentation contents: Basic EDI dataflow in Russia. eaccounting for HR and Payroll. eaccounting in a Cloud
Accounting Contnts Prsntation contnts: Basic EDI dataflow in Russia Accounting for HR and Payroll Accounting in a Cloud Basic EDI Procss Flow Typs of documnts for EDI Lgally rquird documnts: Act of accptanc
5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power
Prim numbrs W giv spcial nams to numbrs dpnding on how many factors thy hav. A prim numbr has xactly two factors: itslf and 1. A composit numbr has mor than two factors. 1 is a spcial numbr nithr prim
FACULTY SALARIES FALL 2004. NKU CUPA Data Compared To Published National Data
FACULTY SALARIES FALL 2004 NKU CUPA Data Compard To Publishd National Data May 2005 Fall 2004 NKU Faculty Salaris Compard To Fall 2004 Publishd CUPA Data In th fall 2004 Northrn Kntucky Univrsity was among
Category 7: Employee Commuting
7 Catgory 7: Employ Commuting Catgory dscription This catgory includs missions from th transportation of mploys 4 btwn thir homs and thir worksits. Emissions from mploy commuting may aris from: Automobil
Architecture of the proposed standard
Architctur of th proposd standard Introduction Th goal of th nw standardisation projct is th dvlopmnt of a standard dscribing building srvics (.g.hvac) product catalogus basd on th xprincs mad with th
Enterprise Resource Planning (ERP) Systems
Entrpris Rsourc Planning (ERP) Systms For Non-Practitionrs Octobr 1997 Octobr 1997 National Industry Srvics - Industrial & Automotiv Products ERP nabls companis to driv th optimum intr-oprability btwn
YouthWorks Youth Works (yüth- w rkz), n.
YouthWorks Youth Works(yüth- w rkz),n. 1. Baltimor City s summr jobs program. 2. Crats carr pathways for Baltimor City youth. 3. Givs Baltimor mployrs opportunitis to train thir futur workforc. Opportunity
IBM Healthcare Home Care Monitoring
IBM Halthcar Hom Car Monitoring Sptmbr 30th, 2015 by Sal P. Causi, P. Eng. IBM Halthcar Businss Dvlopmnt Excutiv [email protected] IBM Canada Cloud Computing Tigr Tam Homcar by dfinition 1. With a gnsis
Traffic Flow Analysis (2)
Traffic Flow Analysis () Statistical Proprtis. Flow rat distributions. Hadway distributions. Spd distributions by Dr. Gang-Ln Chang, Profssor Dirctor of Traffic safty and Oprations Lab. Univrsity of Maryland,
Title: Patient Safety Improvements through Real-Time Inventory Management
Titl: Patint Safty Improvmnts through Ral-Tim Invntory Managmnt Author: Lynda Wilson, Administrativ Projct Analyst/Crtifid Six Sigma Black Blt Mrcy Ds Moins - Mrcy Hart Hospital 411 Laurl Strt, Suit 1225
Parallel and Distributed Programming. Performance Metrics
Paralll and Distributd Programming Prformanc! wo main goals to b achivd with th dsign of aralll alications ar:! Prformanc: th caacity to rduc th tim to solv th roblm whn th comuting rsourcs incras;! Scalability:
QUANTITATIVE METHODS CLASSES WEEK SEVEN
QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.
Remember you can apply online. It s quick and easy. Go to www.gov.uk/advancedlearningloans. Title. Forename(s) Surname. Sex. Male Date of birth D
24+ Advancd Larning Loan Application form Rmmbr you can apply onlin. It s quick and asy. Go to www.gov.uk/advancdlarningloans About this form Complt this form if: you r studying an ligibl cours at an approvd
Sci.Int.(Lahore),26(1),131-138,2014 ISSN 1013-5316; CODEN: SINTE 8 131
Sci.Int.(Lahor),26(1),131-138,214 ISSN 113-5316; CODEN: SINTE 8 131 REQUIREMENT CHANGE MANAGEMENT IN AGILE OFFSHORE DEVELOPMENT (RCMAOD) 1 Suhail Kazi, 2 Muhammad Salman Bashir, 3 Muhammad Munwar Iqbal,
Cookie Policy- May 5, 2014
Cooki Policy- May 5, 2014 Us of Cookis on Sizmk Wbsits This Cooki Disclosur applis only to us of cookis on corporat wbsits (www.sizmk.com and rlatd rgional wbsits) publishd by Sizmk Inc. and its affiliats
LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W
Cllo Tchnology LG has introducd th NON 2, with nwly dvlopd Cllo Tchnology which improvs prformanc and rliability. Up to 320W 300W Cllo Tchnology Cll Connction Elctrically Low Loss Low Strss Optical Absorption
Teaching Computer Networking with the Help of Personal Computer Networks
Taching Computr Ntworking with th Hlp of Prsonal Computr Ntworks Rocky K. C. Chang Dpartmnt of Computing Th Hong Kong Polytchnic Univrsity Hung Hom, Kowloon, Hong Kong [email protected] ABSTRACT
SCHOOLS' PPP : PROJECT MANAGEMENT
Rport Schools' PPP Sub Committ 22 April 2004 2 SCHOOLS' PPP : PROJECT MANAGEMENT 1 Rason for Rport To provid Mmbrs with information on th structur of th Schools' PPP Projct Tam 2 Background 21 Dumfris
Fleet vehicles opportunities for carbon management
Flt vhicls opportunitis for carbon managmnt Authors: Kith Robrtson 1 Dr. Kristian Stl 2 Dr. Christoph Hamlmann 3 Alksandra Krukar 4 Tdla Mzmir 5 1 Snior Sustainability Consultant & Lad Analyst, Arup 2
User-Perceived Quality of Service in Hybrid Broadcast and Telecommunication Networks
Usr-Prcivd Quality of Srvic in Hybrid Broadcast and Tlcommunication Ntworks Michal Galtzka Fraunhofr Institut for Intgratd Circuits Branch Lab Dsign Automation, Drsdn, Grmany [email protected]
Lecture 3: Diffusion: Fick s first law
Lctur 3: Diffusion: Fick s first law Today s topics What is diffusion? What drivs diffusion to occur? Undrstand why diffusion can surprisingly occur against th concntration gradint? Larn how to dduc th
Who uses our services? We have a growing customer base. with institutions all around the globe.
not taking xpr Srvic Guid 2013 / 2014 NTE i an affordabl option for audio to txt convrion. Our rvic includ not or dirct trancription rvic from prviouly rcordd audio fil. Our rvic appal pcially to tudnt
STATEMENT OF INSOLVENCY PRACTICE 3.2
STATEMENT OF INSOLVENCY PRACTICE 3.2 COMPANY VOLUNTARY ARRANGEMENTS INTRODUCTION 1 A Company Voluntary Arrangmnt (CVA) is a statutory contract twn a company and its crditors undr which an insolvncy practitionr
Nimble Storage Exchange 2010 40,000-Mailbox Resiliency Storage Solution
Nimbl Storag Exchang 2010 40,0-Mailbox Rsilincy Storag Solution Tstd with: ESRP Storag Vrsion 3.0 Tst dat: July 10, 2012 Ovrviw This documnt provids information on Nimbl Storag's storag solution for Microsoft
Asset set Liability Management for
KSD -larning and rfrnc products for th global financ profssional Highlights Library of 29 Courss Availabl Products Upcoming Products Rply Form Asst st Liability Managmnt for Insuranc Companis A comprhnsiv
Category 1: Purchased Goods and Services
1 Catgory 1: Purchasd Goods and Srvics Catgory dscription T his catgory includs all upstram (i.., cradl-to-gat) missions from th production of products purchasd or acquird by th rporting company in th
Secure User Data in Cloud Computing Using Encryption Algorithms
Scur Usr Data in Using Encrypt Algorithms Rachna Arora*, Anshu Parashar ** *(Rsarch Scholar, HCTM, Kaithal, Haryana) ** (Associat Profssor, HCTM, Kaithal, Haryana) ABSTRACT is transming inmat tchnology.
Basis risk. When speaking about forward or futures contracts, basis risk is the market
Basis risk Whn spaking about forward or futurs contracts, basis risk is th markt risk mismatch btwn a position in th spot asst and th corrsponding futurs contract. Mor broadly spaking, basis risk (also
YOU HAVE A MISSION WE HAVE TECHNOLOGY SAVING TIME TO BUILD YOUR CAMP S BOTTOM LINE
YOU HAVE A MISSION WE HAVE TECHNOLOGY SAVING TIME TO BUILD YOUR CAMP S BOTTOM LINE TABLE OF CONTENTS Camp Markting Ar You Invsting Your Markting Budgt Wisly? Choosing A Softwar Partnr 8 Ky Faturs Spotlight
Development of Financial Management Reporting in MPLS
1 Dvlopmnt of Financial Managmnt Rporting in MPLS 1. Aim Our currnt financial rports ar structurd to dlivr an ovrall financial pictur of th dpartmnt in it s ntirty, and thr is no attmpt to provid ithr
Enforcing Fine-grained Authorization Policies for Java Mobile Agents
Enforcing Fin-graind Authorization Policis for Java Mobil Agnts Giovanni Russllo Changyu Dong Narankr Dulay Dpartmnt of Computing Imprial Collg London South Knsington London, SW7 2AZ, UK {g.russllo, changyu.dong,
Information Management Strategy: Exploiting Big data and Advanced Analytics
Information Managmnt Stratgy: Exploiting Big data and Advancd Analytics William Duply Stratgist HP Cloud Hwltt-Packard Canada Big : What w ar building: Actionabl intllignc Businss valu Traditional BI/MIS/CRM/
Managing Risk with Composite Information Systems
Managing Risk with Composit Information Systms Ying-Sung Tay May 1990 WP # CIS-90-10 MANAGING RISK WITH COMPOSITE INFORMATION SYSTEMS Ying-Sung Tay May 31, 1990 Rsarch Assistantship Rport ABSTRACT With
Lift Selection Guide
Lift Slction Guid Hlping you choos th right lifts to kp your staff and rsidnts saf Th Dirct Supply diffrnc Kp your community saf DIRECT SUPPLY MAKES EQUIPMENT SELECTION EASY BENEFITS OF SAFE LIFTING PRACTICES
Natural Gas & Electricity Prices
Click to dit Mastr titl styl Click to dit Mastr txt styls Scond lvl Third lvl Natural Gas & Elctricity Prics Fourth lvl» Fifth lvl Glnn S. Pool Manufacturing Support Mgr. Enrgy April 4, 2013 Click Vrso
Thursday, March 18, 2010-4:07 PM Page 1 of 16
Exhibit 300: Capital Asst Plan Businss Cas Summary Part I: Summary And Justification (All Capital Assts) Sction A: Ovrviw (All Capital Assts) 1. Dat of Submission: 2/1/2010 2. Agncy: Dpartmnt of Justic
Why An Event App... Before You Start... Try A Few Apps... Event Management Features... Generate Revenue... Vendors & Questions to Ask...
Mo b i l E v ntap pgui d : Ho wt op ur c ha t hb te v ntap p f o ry o ura o c i a t i o n T he nt i a l Gui d t oe v ntap p E v nt nt i a l b y Tabl of Contnt Why An Evnt App......... o Whr to Start With
TELL YOUR STORY WITH MYNEWSDESK The world's leading all-in-one brand newsroom and multimedia PR platform
TELL YOUR STORY WITH MYNEWSDESK Th world's lading all-in-on brand nwsroom and multimdia PR platform SO WHAT'S THE STORY WITH MYNEWSDESK? Th world s lading all-in-on nwsroom and digital PR platform. Usd
June 2012. Enprise Rent. Enprise 1.1.6. Author: Document Version: Product: Product Version: SAP Version: 8.81.100 8.8
Jun 22 Enpris Rnt Author: Documnt Vrsion: Product: Product Vrsion: SAP Vrsion: Enpris Enpris Rnt 88 88 Enpris Rnt 22 Enpris Solutions All rights rsrvd No parts of this work may b rproducd in any form or
Analyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop
Intrnational Journal of Computr Scinc and Enginring Opn Accss Rsarch Papr Volum-2, Issu-1 E-ISSN: 2347-2693 Analyzing Failurs of a Smi-Structurd Suprcomputr Log Fil Efficintly by Using PIG on Hadoop Madhuri
Lecture 20: Emitter Follower and Differential Amplifiers
Whits, EE 3 Lctur 0 Pag of 8 Lctur 0: Emittr Followr and Diffrntial Amplifirs Th nxt two amplifir circuits w will discuss ar ry important to lctrical nginring in gnral, and to th NorCal 40A spcifically.
Non-Emergency Health Transport
Ovr 14 i n v r y 1 0 0 p o p l in N SW l iv NCOSS Background Papr Non-Emrgncy Halth Transport b l o w t h p o v r ty li n... Council of Social Srvic of NSW Fbruary 2014 What is transport disadvantag? Transport
Logo Design/Development 1-on-1
Logo Dsign/Dvlopmnt 1-on-1 If your company is looking to mak an imprssion and grow in th marktplac, you ll nd a logo. Fortunatly, a good graphic dsignr can crat on for you. Whil th pric tags for thos famous
Data Encryption and Decryption Using RSA Algorithm in a Network Environment
IJCSNS Intrnational Journal of Computr Scinc and Ntwork Scurity, VOL.13 No.7, July 2013 9 Data Encryption and Dcryption Using RSA Algorithm in a Ntwork Environmnt Nntaw Y. Goshw. Dpartmnt of Elctrical/Elctronics
High Interest Rates In Ghana,
NO. 27 IEA MONOGRAPH High Intrst Rats In Ghana, A Critical Analysis IEA Ghana THE INSTITUTE OF ECONOMIC AFFAIRS A Public Policy Institut High Intrst Rats In Ghana, A Critical Analysis 1 by DR. J. K. KWAKYE
DENTAL CAD MADE IN GERMANY MODULAR ARCHITECTURE BACKWARD PLANNING CUTBACK FUNCTION BIOARTICULATOR INTUITIVE USAGE OPEN INTERFACE. www.smartoptics.
DENTAL CAD MADE IN GERMANY MODULAR ARCHITECTURE BACKWARD PLANNING CUTBACK FUNCTION BIOARTICULATOR INTUITIVE USAGE OPEN INTERFACE www.smartoptics.d dntprogrss an b rsion c v o m d ss.d! A fr ntprog.d w
Lecture notes: 160B revised 9/28/06 Lecture 1: Exchange Rates and the Foreign Exchange Market FT chapter 13
Lctur nots: 160B rvisd 9/28/06 Lctur 1: xchang Rats and th Forign xchang Markt FT chaptr 13 Topics: xchang Rats Forign xchang markt Asst approach to xchang rats Intrst Rat Parity Conditions 1) Dfinitions
IHE IT Infrastructure (ITI) Technical Framework Supplement. Cross-Enterprise Document Workflow (XDW) Trial Implementation
Intgrating th Halthcar Entrpris 5 IHE IT Infrastructur (ITI) Tchnical Framwork Supplmnt 10 Cross-Entrpris Documnt Workflow (XDW) 15 Trial Implmntation 20 Dat: Octobr 13, 2014 Author: IHE ITI Tchnical Committ
a m e s y s AMESYS INTELLIGENCE SOLUTIONS C RITIC A L SYSTEM ARCHITEC T www.amesys.fr SERVICES PROVIDED C O N T A C T S
SERVICES PROVIDED Smooth and profssional dploymnt With its growing xprinc, Amsys has mastrd th art of implmntation of intllignc systm. Our tam of profssional xprt will hlp you from th dsign of th architctur
CalOHI Content Management System Review
CalOHI Contnt Systm Rviw Tabl of Contnts Documnt Ovrviw... 3 DotNtNuk... 4 Ovrviw... 4 Installation / Maintnanc... 4 Documntation... 5 Usability... 5 Dvlopmnt... 5 Ovrall... 6 CMS Mad Simpl... 6 Ovrviw...
FEASIBILITY STUDY OF JUST IN TIME INVENTORY MANAGEMENT ON CONSTRUCTION PROJECT
FEASIBILITY STUDY OF JUST IN TIME INVENTORY MANAGEMENT ON CONSTRUCTION PROJECT Patil Yogndra R. 1, Patil Dhananjay S. 2 1P.G.Scholar, Dpartmnt of Civil Enginring, Rajarambapu Institut of Tchnology, Islampur,
Question 3: How do you find the relative extrema of a function?
ustion 3: How do you find th rlativ trma of a function? Th stratgy for tracking th sign of th drivativ is usful for mor than dtrmining whr a function is incrasing or dcrasing. It is also usful for locating
Siemens IT Solutions and Services Pvt. Ltd.
Simns IT Solutions and Srvics Pvt. Ltd. Transforming IT into Businss Valu In 10 yars tim our plant will b populatd by 8 billion popl. Th challngs ahad supply of ncssary goods and srvics, clan nrgy, smart
SPECIAL VOWEL SOUNDS
SPECIAL VOWEL SOUNDS Plas consult th appropriat supplmnt for th corrsponding computr softwar lsson. Rfr to th 42 Sounds Postr for ach of th Spcial Vowl Sounds. TEACHER INFORMATION: Spcial Vowl Sounds (SVS)
High Availability Architectures For Linux on IBM System z
High Availability Architcturs For Linux on IBM Systm z March 31, 2006 High Availability Architcturs for Linux on IBM Systm z 1 Contnts Abstract...3 Introduction. Dfinition of High Availability...4 Chaptr
http://www.wwnorton.com/chemistry/tutorials/ch14.htm Repulsive Force
ctivation nrgis http://www.wwnorton.com/chmistry/tutorials/ch14.htm (back to collision thory...) Potntial and Kintic nrgy during a collision + + ngativly chargd lctron cloud Rpulsiv Forc ngativly chargd
content Fresh thinking for decision makers
Roland Brgr Stratgy Consultants contnt Frsh thinking for dcision makrs Think your bank can maintain its liquidity vn undr xtrm strss? Fin, but thr's mor to stratgic liquidity managmnt than that Th prcis
Data warehouse on Manpower Employment for Decision Support System
Data warhous on Manpowr Employmnt for Dcision Support Systm Amro F. ALASTA, and Muftah A. Enaba Abstract Sinc th us of computrs in businss world, data collction has bcom on of th most important issus du
The international Internet site of the geoviticulture MCC system Le site Internet international du système CCM géoviticole
Th intrnational Intrnt sit of th goviticultur MCC systm L sit Intrnt intrnational du systèm CCM géoviticol Flávio BELLO FIALHO 1 and Jorg TONIETTO 1 1 Rsarchr, Embrapa Uva Vinho, Caixa Postal 130, 95700-000
Entity-Relationship Model
Entity-Rlationship Modl Kuang-hua Chn Dpartmnt of Library and Information Scinc National Taiwan Univrsity A Company Databas Kps track of a company s mploys, dpartmnts and projcts Aftr th rquirmnts collction
