CLOUD COMPUTING: SECURITY THREATS AND MECHANISM
|
|
- Cynthia Spencer
- 8 years ago
- Views:
Transcription
1 CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel fr enabling cnvenient, n-demand netwrk access t a shared pl f cnfigurable cmputing resurces (e.g., netwrks, servers, strage, applicatins, and services) that can be rapidly prvisined and released with minimal management effrt r service prvider interactin. Clud cmputing is a significant advancement in the delivery f infrmatin technlgy and services. This paper explains the security threats and security mechanism in clud cmputing, and utlines what are the majr security cncerns which are stpping the rganizatin frm mving cmpletely t clud. Keywrds: Clud Cmputing, SaaS, PaaS, IaaS, Security, Threat, Mechanism I. INTRODUCTION Clud cmputing is a significant advancement in the delivery f infrmatin technlgy and services. By prviding n demand access t a shared pl f cmputing resurces in a self-service, dynamically scaled and metered manner, clud cmputing ffers cmpelling advantages in speed, agility and efficiency. With Clud Cmputing users can access database resurces via the Internet frm anywhere, fr as lng as they need, withut wrrying abut any maintenance r management f actual resurces. Five Essential Characteristics f clud cmputing are: On-demand self service Users are able t prvisin, mnitr and manage cmputing resurces as needed withut the help f human administratrs Brad netwrk access Cmputing services are delivered ver standard netwrks and hetergeneus devices Rapid elasticity IT resurces are able t scale ut and in quickly and n an as needed basis Resurce pling IT resurces are shared acrss multiple applicatins and tenants in a nn-dedicated manner Measured service IT resurce utilizatin is tracked fr each applicatin and tenant, typically fr public clud billing r private clud chargeback 1.1 Service mdel fr Clud Cmputing Infrastructure-as-a-Service (IaaS) Infrastructure-as-a-Service is the first layer and fundatin f clud cmputing. Using this service mdel, yu manage yur applicatins, data, perating system, middleware and runtime. The service prvider manages yur virtualizatin, servers, netwrking and strage. This allws yu t avid expenditure n hardware and human capital; reduce yur ROI risk; and streamline and autmate scaling. An example f a typical need fr this mdel 105 P a g e
2 is smene wh needs extra data space fr prcessing pwer n ccasin. Infrastructure-as-a-Service allws yu t easily scale based n yur needs and yu nly pay fr the resurces used.. Platfrm-as-a-Service (PaaS) This clud service mdel culd be cnsidered the secnd layer. Yu manage yur applicatins and data and the clud vendr manages everything else. Benefits fr using Platfrm-as-a-Service include streamlined versin deplyment and the ability t change r upgrade and minimize expenses. One ppular Platfrm-as-a-Service is the Ggle app engine.a business with limited resurces interested in app testing r develpment might find Platfrm-as-a-Service beneficial t eliminate csts f upkeep fr hardware. In this mdel, yur business benefits because it is nt necessary t hire peple t maintain these systems. A scalable prcessing center is available at yur dispsal t use as yu need (again, yu nly pay fr what yu use). Sftware-as-a-Service (SaaS) This is the final layer f the clud services mdel. This allws yur business t run prgrams in the clud where all prtins are managed by the clud vendr. Yur users will have assured cmpatibility and easier cllabratin because all will be using the same sftware. Yur cmpany wn t need t pay extra licensing fees and yu can easily add new users. As cnsumers we interact with Sftware-as-a-Service based applicatins everyday withut even realizing it. Examples f this are nline banking and such as Gmail and Htmail. Fig.1: Clud Architecture 1.2 Clud Structures There are three primary deplyment mdels fr clud services: Private cluds, whether perated and hsted by enterprise IT department r by an external prvider, are fr the exclusive use f the rganizatin. Public cluds are pen t any number f rganizatins and individual users n a shared basis. Using a public clud minimizes initial capital investment and cmbines agility and efficiency with massive scalability. Hybrid cluds link private and public cluds, prviding access t extra resurces when the private clud hits maximum utilizatin r, a hybrid clud might split cmputing by tier between private and public cluds. II. CLOUD COMPUTING SECURITY There are majr securities cncerns which are stpping the rganizatin frm mving cmpletely t clud are: Is my data secure n clud? Can ther access my cnfidential data? What if an attacker brings dwn my applicatin which is hsted n clud? 106 P a g e
3 2.1 Key cncept in infrmatin security is CIA (Cnfidentiality, Integrity, Availability) triad. Cnfidentiality: ensures that yur data is cnfidential, unauthrized user can nt access yur data nly authrized user can access the data. Integrity: ensures that yur data remains as it is s n unauthrized user can change yur data. Availability: ensures that yur data, applicatin & services are always available t authrized users. 2.1 Security Cncerns in Clud Cmputing Multitenancy: Single server hst multiple VM Same infrmatin is shared by different rganizatin and VM might be cllcated in a single server. When multiple rganizatins have varius frm f security plicy hw des clud prvider make sure that each cmpany s security plicy is fulfilled. Velcity f attack: Infrastructure is huge s the surface which is available fr attack is huge that s why velcity f attack is als higher s because f this ptential lss is als high, because if 1 VM is attack the entire infrastructure might get attack. Infrmatin assurance and data wnership: In case f clud cmputing envirnment data and applicatin are hsted by clud service prvider s the clud service prvider has access t data but the wner is nt the CSP, the rganizatin is wner s hw t make sure that yur data is accessed nly by the authrized user and ensuring that the cnfidentiality is maintained. Data Privacy: T make sure that privacy f data is ensured in clud envirnment because multiple enterprises and multiple users might be using the same infrastructure and might have access the data s it is imprtant t make sure that privacy f data is maintained. 2.2 Clud Security Threats VM theft: is vulnerability which enable attacker t cpy a VM and use it fr attacking the rest f infrastructure. VM is nthing but a file s VM is saved as a file in virtual envirnment s if a file desn t have prper access privileges an authrized user can cpy yur VM file and use it fr attacking. S hyper jacking enables attackers t install VM mnitr that can take cntrl f the underline server resurces. Hyper wiser is a cmpnent that virtualized a server. Hyper jacking is an attack which takes cntrl ver the hyper wiser that creates the virtual envirnment within a VM hst. Data Leakage: Cnfidential data stred n a third party clud n is ptentially vulnerable t unauthrized access r manipulatin. Denial f service attack: It is an attempt t prevent legitimate users frm accessing a resurce r service. III. CLOUD SECURITY MECHANISM Cmpute and netwrk security Secure data at rest Identity and access management Risk analysis and cmpliance 107 P a g e
4 3.1 Security at Cmpute Level It includes Securing physical server Securing hypervisr Securing VMs VM islatin VM hardening Securing at guest OS level Guest OS hardening Securing at applicatin level Applicatin hardening 3.2 Securing Data-at-Rest Data-at- rest Data which is nt being transferred ver a netwrk Encryptin f Data-at-rest Prvides cnfidentiality and integrity services Reduces legal liabilities f a CSP due t an unauthrized disclsure f data at its clud. Full disk encryptin is a key methd t encrypt data at rest residing n a disk. 3.3 Identity and Access Management One time passwrd Every new access requires new passwrd A measure against passwrd cmprmises. Federated identity management is prvided as a service n clud Enables rganizatin t authenticate their users f clud service using the chsen identity prvider User identities acrss different rganizatin can be managed tgether t enable cllabratin n clud. 3.4 Risk Assessment Aim t identify ptential risks while perating n clud envirnment Shuld be perfrmed befre mving t a clud Used t determine the actual scpe fr clud adptin Cmpliance Clud adptin and peratin fr enterprise business need t abide by cmpliance plicies Types f cmpliance Internal plicy cmpliance Cntrls the nature f IT peratins within rganizatin Needs t maintain same cmpliance even when perating in clud External Regulatry cmpliance Includes legal legislatins and identity regulatins 108 P a g e
5 Cntrls the nature f IT peratin related t flw f data ut f an rganizatin May differs based n the type f infrmatin, business etc. IV. CONCLUSION Clud cmputing represents an exciting pprtunity t bring n-demand applicatins t custmers in an envirnment f reduced risk and enhanced reliability. Clud cmputing is particularly valuable t small and medium businesses, where effective and affrdable IT tls are critical t helping them becme mre prductive withut spending lts f mney n in-huse resurces and technical equipment. By adpting varius mechanism f clud cmputing security and take prper measure t avid threats in clud cmputing security, rganizatin can easily adapt themselves in clud envirnment. REFERENCES [1] Clud Applicatin Architectures: Building Applicatin by Gerge Reese. [2] Clud Cmputing: Web-Based Applicatins That Change the Way Yu Wrk and Cllabrate Online by Michael Miller [3] Grssman, R. L. The case f clud cmputing, prc. f IEEE Educatinal Activities Department, Piscataway, NJ, USA vl. 11, Issue 2, pp , March, [4] M. D. Dikaiaks, D. Katsars, G. Pallis, A. Vakali, P. Mehra: Guest Editrs Intrductin: "Clud Cmputing, IEEE Internet Cmputing [5] Luis M. Vaquer et al., A Break in the Cluds: Tward a Clud Definitin, ACM SIGCOMM Cmputer Cmmunicatin Review, Vlume 39, Issue 1 (January 2009) [6] L. Kleinrck. A visin fr the Internet. ST Jurnal f Research, 2(1):4-5, Nv P a g e
Basic concept of Cloud computing
Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale
More informationLicensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
More informationHow Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
More informationSecurely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationIN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
More informationIn-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future
In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt
More informationSession 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationAHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
More informationState of Wisconsin DET Agency Managed Virtual Services Service Offering Definition
State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationUnified Infrastructure/Organization Computer System/Software Use Policy
Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationPCI DSS Cloud Computing Guidelines
Standard: PCI Data Security Standard (PCI DSS) Versin: 2.0 Date: February 2013 Authr: Clud Special Interest Grup PCI Security Standards Cuncil Infrmatin Supplement: PCI DSS Clud Cmputing Guidelines Table
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationHIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
More informationState of Wisconsin DET Dedicated Virtual Host Services Offering Definition
State f Wiscnsin DET Dedicated Virtual Hst Services Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 10/29/2010 1.0 Phil Staley Initial draft 11/3/2010 1.1 Phil Staley Ryan McKee Secnd
More informationConfiguring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationLaunchPad is your personal cloud desktop giving access to school from anywhere.
LaunchPad Persnal Clud Desktp Persnal Clud Desktp fr educatin ClassLink LaunchPad is the first K-12 persnal clud desktp that gives teachers and students access t all their applicatins and files fr anywhere,
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationOnline Network Administration Degree Programs
Online Schls, Degrees & Prgrams Blg Abut Archives Cntact Online Netwrk Administratin Degree Prgrams A Netwrk Administratr is smene respnsible fr the maintenance and perfrmance f cmputer hardware and sftware
More informationUC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
More informationProcess of Setting up a New Merchant Account
Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationJunos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
More informationCLOUD ENABLED CLOUD ENABLED
Asia s st 1 and Only Cmpany t Offer Bradest Prtfli f Clud trainings. Clud Architect: Duratin 5 Days Abut Us: Clud Enabled is Asia's First and nly Cmpany t ffer the Bradest prtfli f clud trainings. Clud
More informationWhite Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava
White Paper SharePint and the Cnsumerizatin f IT: Cnsideratins fr BYOD Success Authrs: Aseem Pandit and Prateek Bhargava The Evlutin f IT Cnsumerizatin & BYOD BYOD refers t the plicy f permitting emplyees
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More information1 Google Apps for Education Henrico County, Virginia
1 Ggle Apps fr Educatin Henric Cunty, Virginia PROGRAM CATEGORY: Infrmatin Technlgy 1. Abstract f the Prgram Henric Cunty Public Schls (HCPS) prides itself n its innvative apprach t instructin. We believe
More informationThe ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationBYOD and Cloud Computing
BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What
More informationLicensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
More informationBest Practices for Optimizing Performance and Availability in Virtual Infrastructures
Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures www.nimsft.cm Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures PAGE 2 Table f Cntents
More informationMarket Research Report - Q4 2015
Market Research fr the IT & Netwrking Industry Wrldwide Clud Market Analysis & Vendr Tracking Reprt fr HPE Q4 2015 Synergy Research Grup 31, Market Research fr the Netwrking & Telecm Industry Cntents Clud
More informationCloud Application Risks You Can t Manage What You Can t See
The Unique Alternative t the Big Fur Clud Applicatin Risks Yu Can t Manage What Yu Can t See Managing Unapprved and Apprved Emplyee Clud Adptin March 18, 2015 Agenda Shadw IT trends that are creating visibility
More informationSaaS Listing CA Cloud Service Management
SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationNC3A SOA Techwatch Day Call for Presentations
NC3A SOA Techwatch Day Call fr Presentatins 1 February 2012 Hsted at NATO C3 Agency, The Hague, The Netherlands By NC3A Chief Technlgy Office (CTO) David Burtn Chief Technlgy fficer Versin 1, 1 December
More informationHP ExpertOne. HP2-T21: Administering HP Server Solutions. Table of Contents
HP ExpertOne HP2-T21: Administering HP Server Slutins Industry Standard Servers Exam preparatin guide Table f Cntents Overview 2 Why take the exam? 2 HP ATP Server Administratr V8 certificatin 2 Wh shuld
More informationVersion Date Comments / Changes 1.0 January 2015 Initial Policy Released
Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance
More informationSecurity Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview
Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the
More informationInformation & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
More informationWhite. Paper. HP Ethernet Virtual Interconnect: Extending the Benefits of Virtualized Environments Across Geographically Dispersed Data Centers
White Paper HP Ethernet Virtual Intercnnect: Extending the Benefits f Virtualized Envirnments Acrss Gegraphically Dispersed Data Centers By Bb Laliberte, Senir Analyst August 2012 This ESG White Paper
More informationSupersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5
Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet
More informationProfessional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
More informationITU-T IdMFG Framework Work Group
ITU-T IdMFG Framewrk Wrk Grup Internatinal Telecmmunicatin Unin 1 Evlutin f Identity Management Presence (Inference frm vide cameras, RFID sensrs, etc.) Implicit Bimetrics (Key strkes, vice, face) Transparent
More informationHow To Use Citrix Xendesktp 4 With Flexcast
Citrix XenDesktp 4: The clear chice fr desktp virtualizatin Citrix pineered desktp and applicatin delivery ver 20 years ag, and in recent years, we have been rapidly innvating with ur industry leading
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationSharePoint Governance
Explring the Myths, Risks and Realities f SharePint Gvernance AIIM Suthwest Chapter Octber 13, 2010 Renu Isaac 2009 Access Sciences Crpratin All rights reserved. 1 Agenda SharePint Gvernance Why Bther?
More informationIntegrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
More informationHow To Write A Byod
Limitatins f the Walled Garden This is the secnd part in a series designed t help rganizatins develp their BYOD (bring-yur-wn-device) strategies fr persnally-wned smartphnes and tablets in the enterprise.
More informationOnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN.
Slutin Brief SDN Training OVERVIEW SDN is mving faster than previus netwrking advancements. Sme teams have already deplyed and are mnitring their envirnments, while thers are just starting t ask abut SDN
More informationInfrastructure- as- a- Service
HpOne Internet Crpratin Infrastructure- as- a- Service Lwering IT csts is just ne f many benefits driving enterprises t IaaS. Tim Sextn 2015 Whitepaper Mving an entire infrastructure (r even a prtin f
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationTESTING TIMES: HOLISTIC ENVIRONMENT MANAGEMENT IN AN AGILE WORLD
www.wipr.cm TESTING TIMES: HOLISTIC ENVIRONMENT MANAGEMENT IN AN AGILE WORLD Peri Narasimha, Slutin Architect Table f Cntents 03... Abstract 03... Mapping the Strategy 04... Service Integratin Creating
More informationState of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
More informationCisco IT Essentials v4.1. Course Overview. Total Hours: 240
PC Hardware and Sftware Teacher Resurce Cisc Essentials v4.1 Curse Overview Ttal Hurs: 240 Fundamental Chapters 1-10 Chapter 1: Intrductin t the Persnal Cmputer Hurs: 14.00 Gal: Chapter 2: The chapter
More informationCognosys Proposal for Hospital Management System. Health Care Cloud Solutions August 3, 2012
Cgnsys Prpsal fr Hspital System Health Care Clud Slutins August 3, 2012 Cgnsys Services: Building Futuristic Hspitals Drive tward yur gals f cst reductins and increased prductivity in rder t enhance yur
More informationMobilizing Healthcare Staff with Cloud Services
Mbilizing Healthcare Staff with Clud Services Published May 2012 Mbile Technlgies are changing hw healthcare staff delivers care. With new pwerful integrated slutins available fr the healthcare staff,
More informationConsiderations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag
Autmating Wrkflws with KwikTag by ImageTag Cnsideratins fr Success in Wrkflw Autmatin KwikTag balances cmprehensive, feature-rich Transactinal Cntent Management with affrdability, fast implementatin, ease
More informationMANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016
MANITOBA SECURITIES COMMISSION STRATEGIC PLAN 2013-2016 The Manitba Securities Cmmissin (the Cmmissin) is a divisin f the Manitba Financial Services Agency (MFSA). The ther divisin is the Financial Institutins
More informationSecurity in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade
Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small
More informationALM in the Cloud an Overview of Oracle Developer Cloud Service. Introduction. By Dana Singleterry
ALM in the Clud an Overview f Oracle Develper Clud Service Intrductin By Dana Singleterry In recent years the wrld f applicatin develpment has adpted new methdlgies that aim t imprve the quality and speed
More informationFundingEdge. Guide to Business Cash Advance & Bank Statement Loan Programs
Guide t Business Cash Advance & Bank Statement Lan Prgrams Cash Advances: $2,500 - $1,000,000 Business Bank Statement Lans: $5,000 - $500,000 Canada Cash Advances: $5,000 - $500,000 (must have 9 mnths
More informationCritical Success Factors for FedRAMP Assessments A 3PAO Perspective
Creating Mre Effective and Strategic Slutins Critical Success Factrs fr FedRAMP Assessments A 3PAO Perspective David Svec Veris Grup, LLC Summary Clud Security Prviders (CSPs) fr the gvernment have a strategic
More informationXenApp and XenDesktop: Application Virtualization and Desktop Virtualization are Better Together
XenApp and XenDesktp July 2008 XenApp and XenDesktp: Applicatin Virtualizatin and Desktp Virtualizatin are Better Tgether This dcument is designed t help Citrix XenApp custmers understand hw and when Citrix
More informationEA-POL-015 Enterprise Architecture - Encryption Policy
Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:
More informationOsterman Research User Guides
Osterman Research User Guides Hw t Evaluate and Chse a Messaging Archival Slutin 2006 Editin Osterman Research, Cntural and RITE Chice have published a user guide that will help rganizatins f all sizes
More informationVendor Management. Federal Deposit Insurance Corporation Division of Risk Management Supervision Atlanta Regional Office.
Vendr Management Federal Depsit Insurance Crpratin Divisin f Risk Management Supervisin Atlanta Reginal Office June 18, 2014 1 Agenda Intrductin Vendr Management Overview Regulatry Expectatins Bard and
More informationCloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013
Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies
More informationBetter Practice Guide Financial Considerations for Government use of Cloud Computing
Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.
More informationPRIVATE CLOUD WHAT IS IN IT? Aleksandar Zubović Technical Account Manager Microsoft Premier Support
PRIVATE CLUD WHAT IS IN IT? Aleksandar Zubović Technical Account Manager Microsoft Premier Support WHAT CNSTITUTES CLUD CMPUTING? SFTWARE AS A SERVICE PLATFRM AS A SERVICE INFRASTRUCTURE AS A SERVICE PUBLIC
More informationPOSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position
Psitin Title I.T Prject Officer Classificatin Higher Educatin Wrker, Level 7 Respnsible t The Psitin I.T Manager The psitin assists with the cmpletin f varius IT prjects intended t enable the nging administratin
More informationBitrix Intranet. Product Requirements
Bitrix Intranet Prduct Requirements Bitrix Intranet: Prduct Requirements Bitrix Intranet is a highly secure, turnkey intranet slutin fr small and medium-sized businesses designed fr effective cllabratin,
More informationData Abstraction Best Practices with Cisco Data Virtualization
White Paper Data Abstractin Best Practices with Cisc Data Virtualizatin Executive Summary Enterprises are seeking ways t imprve their verall prfitability, cut csts, and reduce risk by prviding better access
More informationSBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
More informationCOE: Hybrid Course Request for Proposals. The goals of the College of Education Hybrid Course Funding Program are:
COE: Hybrid Curse Request fr Prpsals The gals f the Cllege f Educatin Hybrid Curse Funding Prgram are: T supprt the develpment f effective, high-quality instructin that meets the needs and expectatins
More informationCloud Services MDM. Windows 8 User Guide
Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad
More informationProcess Automation With VMware
Prcess Autmatin With VMware Intelligent Service Autmatin fr Real and Virtual Envirnments Intrductin This Whitepaper describes hw the UC4 platfrm integrates with the VMware vsphere Server and the VMware
More informationPlus500CY Ltd. Statement on Privacy and Cookie Policy
Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and
More informationBest Practices on Monitoring Hotel Review Sites By Max Starkov and Mariana Mechoso Safer
January 2008 Best Practices n Mnitring Htel Review Sites By Max Starkv and Mariana Mechs Safer Hteliers ften ask HeBS hw they can mnitr the Internet chatter surrunding their htels and whether r nt they
More informationHow To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn
SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4
More informationIntel Hybrid Cloud Management Portal Update FAQ. Audience: Public
Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid
More informationRetail Security and Compliance Where On Earth is it Headed?
Retail Security and Cmpliance Where On Earth is it Headed? An verview f the retail sectr s IT threats and hw t be mre effective in preventing them. Agenda Intrductin Retail in the news Why cyber security
More informationWEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
More informationA96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
More informationMigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200
MigratinWiz HIPAA Cmpliant Migratin Fcus n data migratin, nt regulatin. BitTitan Glbal Headquarters: 3933 Lake Washingtn Blvd NE Suite 200 Table f Cntents Kirkland, WA 98033 www.bittitan.cm sales@bittitan.cm
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More information