Security of End User based Cloud Services Sang Young
|
|
- Preston Cunningham
- 5 years ago
- Views:
Transcription
1 Security of End User based Cloud Services Sang Young Chairman, Mobile SIG Professional Information Security Association
2 Cloud Services you can choose Social Media Business Applications Productivity Applications Agile Infrastructure Website Hosting Mobile Enablement Storage Centralized Reference:
3 Graphic Source:
4 Cloud Services Characteristics Zero capital investments Zero maintenance cost On demand self service Rapid elasticity and scalability Ubiquitous network access
5 Well known Cloud Service Dropbox Evernote Google Services Microsoft Office 365 Apple icloud etc
6 Threats in Using Cloud Service Client Tool Authentication Data Transmission Data Storage Avaliability
7 Cloud Service Clients Web Browser Customized Client (Windows, MacOS X, Linux etc) dropbox evernote Mobile Apps
8 Security depends on Web Browser Operating System Security Patches Level Microsoft Windows, MacOS X, Linux User Privilege on the PC Administrators, Power Users, Users Which Browser? Chrome, Firefox, IE, Safari Browser version & Security Patches level Browser Configuration
9 Security Depends on Customized Clients Operating System Patches Level User Privilege on the PC Client Configuration Vulnerabilities in Cloud Services Client e.g. the issue of %APPDATA%\Dropbox\config.db in DropBox. e.g. weakness that let hacker stole all username & password in Evernote
10 Mobile Apps Security Depends On Platform ios vs Android Jailbreak or Rooted Any vulnerabilities in Apps? Dropbox for Android allows other apps to access its content database allowing attackers to upload your files to the public
11 Authentication Authentication Methods Password based may become insufficient The evil of Save Password Automatic login how secure the credentials stored in client computer?
12 Data Transmission Protection in data transmission Communication encryption HTTPS check the Web Browser when using Cloud Service How about Client Application? How about Mobile Apps?
13 Security Controls Encryption Type of encryption? Key Management? Data Storage Does Encryption enable?
14 Communication Availability The reliability of your network connection Dial up Broadband Wi Fi GPRS/EDGE/3G/HSDPA/HSPA+/LTE/LTE A Bandwidth Consideration Latency Consideration
15 Service Providers Availability Technical Problems Network outage Servers down Storage system down Services malfunction Information Security Incident Out of Business Can you migrate an accounting data from one provider to another? (hint: there is not standard data format in cloud computing world)
16 Availability in cloud based infrastructure is Feb 2009: Gmail outage for 2.5 hours Mar 2009: Microsoft Azure outage for a day Jun 2009: Amazon EC2 outage for 4 hours Apr 2011: Amazon EC2 outage for 3 hours
17 Availability of Microsoft Office 365 Sep 2011: includes Microsoft Office 365, Hotmail, Skydrive and Live Services
18 Availability of Apple icloud Nov 2011: Apple icloud service is not available for some users
19 Availability of Apple icloud Nov 2011: Apple icloud service is not available for some users
20 Security Incident of Cloud Services Oct 2009: T Mobile, lost customer all sidekick data Apr 2011: Epsilon, customer data were stolen by hacker Jun 2011: Dropbox, allowed any password to be used to access any user account
21 Security Incident of Cloud Services Nov 2013: Instagram, photo sharing services had an outage Facebook, partial outage that affected timeline & page contents WhatsApp, change of Daylight Savings time crashed the platform More incidents in:
22 Cloud Incidents Categories AutoFail DataLoss Hack Outage Vulnerability
23 Countermeasures Authentication: Using two setup verification
24
25
26 Data Transmission Countermeasures Encrypted Channel (e.g. Using Secure Wi Fi Only) HTTPS
27 Data Leakage Encrypt before upload (e.g. password protected a file using Zip) Countermeasures Slide 27
28 Leverage Security Controls Difference among cloud services providers Providers give you security functions and features, not help you to configure it. You should take primary responsibilities to secure it
29 AWS Checklist Published by Amazon uditing_security_checklist.pdf
30 Conclusion Cloud Services is still in stone age Encrypt your data, if possible, before uploading to cloud service provider Encrypt your communication traffic HTTPS / VPN Local copy of data for backup purpose Contingency if Internet connection outage Provider services suspend Reputation of Providers Keep up to date of your cloud service clients Password
31 About PISA A not for profit organization for local information security professionals. Focus on developing the local information security market with a global presence in the industry
32 Mission to facilitate knowledge and information sharing among the PISA members to promote the highest quality of technical and ethical standards to the information security profession, to promote best practices in information security control, to promote security awareness to the IT industry and general public in Hong Kong
33 Web Site: Contact PISA Membership Information:
UFED Cloud Analyzer. Traces and changes. February Version 6.0
UFED Cloud Analyzer Traces and changes February 2017 Version 6.0 Legal notices Copyright 2017 Cellebrite Mobile Synchronization Ltd. All rights reserved. This manual is delivered subject to the following
More informationCloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.
Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and
More informationKeeping Important Data Safe and Secure Online. Norm Kaufman
Keeping Important Data Safe and Secure Online Norm Kaufman Examples of Important Data Passwords and Secret Answers Personal Documents (Licenses, Passports, Insurance Cards, Credit Cards) Social Security
More informationMoving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop
Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop 10.08.2011 What is computing? Examples of service providers Computing preface Cloud computing
More informationIntroduction to data centers
Introduction to data centers Paolo Giaccone Notes for the class on Switching technologies for data centers Politecnico di Torino December 2017 Cloud computing Section 1 Cloud computing Giaccone (Politecnico
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationicloud History & Services Dr. Leon Chapman
icloud History & Services Dr. Leon Chapman 1 icloud History & Services Apple ID & Accounts Overview Online Backup Services Cloud Storage & File Sharing 2 Off-Site Backup? icloud What is it? File storage?
More informationHow NOT To Get Hacked
How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?
More informationSAAS: THE RDP ADVANTAGE FOR ISVS AND USERS
SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS How RDP SaaS deployment reduces costs, time to market and barriers to entry while improving security, performance and the UX Independent Software Vendors (ISVs)
More informationAlexa, what did I do last summer?
, what did I do last summer? Vladimir Katalov, ElcomSoft SecTor 2018 ElcomSoft Ltd. www.elcomsoft.com 1 Who s Alexa? Amazon Alexa is a virtual assistant developed by Amazon She s 4 years young First appeared
More informationWorldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System
Your world, Secured 2016 Worldwide Release System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and
More informationQuick Start: Creating a Video and Publishing in YouTube
Getting Started Quick Start: Creating a Video and Publishing in YouTube 1. Get a YouTube (Google) Account. YouTube is owned by Google. So, to create YouTube content, you ll need a Google account. If you
More informationClouds in the Forecast. Factors to Consider for In-House vs. Cloud-Based Systems and Services
Clouds in the Forecast Factors to Consider for In-House vs. Cloud-Based Systems and Services Speakers Sam Gabal Sam Gabal is a Sales Executive with Origami Risk, based in Orange County and experienced
More informationMOBILE SECURITY OVERVIEW. Tim LeMaster
MOBILE SECURITY OVERVIEW Tim LeMaster tim.lemaster@lookout.com Your data center is in the cloud. Your users and customers have gone mobile. Starbucks is your fall-back Network. Your mobile device is a
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationEthical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,
More informationSecure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS)
Technical Overview Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) Copyright 2017 by Bluetooth SIG, Inc. The Bluetooth word mark and logos are owned
More informationBYOD. Bring your own device. ICT Support Office
BYOD Bring your own device ICT Support Office Bring Your Own Device (BYOD) User Guide Table of Contents BYOD General Information... 2 a) What devices have been tested (Operating System / Devices)?... 2
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationMSRS Roadmap. As of January 15, PJM 2019
MSRS Roadmap As of January 15, 2019 Impact Details Product - Action Required Deadline Who May Be Affected MSRS - Update processes to use basic authentication MSRS - Org parameter added for SUMA requests
More informationPassword & Tutorials Packet
& Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings
More informationFREQUENTLY ASKED QUESTIONS
DISTRICT 7030 WEBSITE FREQUENTLY ASKED QUESTIONS NB: THIS WILL BE REGULARLY UPDATED FOR YOUR INFORMATION. 1. This website works better with the following browsers: Internet Explorer (IE) and Google Chrome.
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationCloud Computing 1. CSCI 4850/5850 High-Performance Computing Spring 2018
Cloud Computing 1 CSCI 4850/5850 High-Performance Computing Spring 2018 Tae-Hyuk (Ted) Ahn Department of Computer Science Program of Bioinformatics and Computational Biology Saint Louis University Learning
More informationPassword & Tutorials Packet
& Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings
More informationUsing the Cloud Howard Verne 7/10/2013
Using the Cloud Howard Verne 7/10/2013 Simple Backup e.g. Carbonite Only Data Pictures Music Etc No Programs No Windows 1 HV1 Most Cloud Storage Only Data Pictures Music Etc No Programs No Windows Browser
More informationG, William James. The smartphone & tablet have changed the course of real estate
Mobile Office Solutions For REALTORS : Must-Have Tools For The Agent s Mobile Office A mobile professional s guide to knowing Which wireless technologies work for you G. William James Handheld Computer
More informationSFC strengthens internet trading regulatory controls
SFC strengthens internet trading regulatory controls November 2017 Internet trading What needs to be done now? For many investors, online and mobile internet trading is now an everyday interaction with
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationBest Practices for Keeping Your Home Network Secure
Best Practices for Keeping Your Home Network Secure The cyber threat is no longer limited to your office network and work persona. Adversaries realize that targets are typically more vulnerable when operating
More informationCloud Storage Vendors Wide Support and Security Key Features for Shifting Towards Business Perspective
Institute of Advanced Engineering and Science International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.2, No.6, December 2013, pp. 421~426 ISSN: 2089-3337 421 Cloud Storage Vendors
More informationVIEVU Solution App User Guide
VIEVU Solution App User Guide INTRODUCTION VIEVU Solution is the next generation, fully-hosted, cloud evidence management system. This guide describes how to operate the VIEVU Solution. Additional support
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More informationCloud Computing Briefing Presentation. DANU
Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities
More informationMake Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)
Make Cloud the Most Secure Environment for Business Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks) Enterprise cloud apps Consumer cloud apps The average organization now uses
More informationGUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE
GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING ACTIONS ARE ADVISED:...
More informationPasswords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist
Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Threat Landscape Breach accomplished Initial attack
More informationMeasuring KSA Broadband
Measuring KSA Broadband Meqyas, Q2 218 Report In 217, the CITC in partnership with SamKnows launched a project to measure internet performance. The project, named Meqyas, gives internet users in Saudi
More informationEmbracing a Secure Cloud. Cloud & Network Virtualisation India 2017
Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks
More informationCloud & AWS Essentials Agenda. Introduction What is the cloud? DevOps approach Basic AWS overview. VPC EC2 and EBS S3 RDS.
Agenda Introduction What is the cloud? DevOps approach Basic AWS overview VPC EC2 and EBS S3 RDS Hands-on exercise 1 What is the cloud? Cloud computing it is a model for enabling ubiquitous, on-demand
More informationCLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to
CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.
More informationPROTECTION SERVICE FOR BUSINESS. Datasheet
PROTECTION SERVICE FOR BUSINESS Datasheet Protection Service For Business is one of the world s leading multi-endpoint security solutions. It is the only endpoint security solution on the market that combines
More informationSECURE YOUR APPLICATIONS, SIMPLIFY AUTHENTICATION AND CONSOLIDATE YOUR INFRASTRUCTURE
SECURE YOUR APPLICATIONS, SIMPLIFY AUTHENTICATION AND CONSOLIDATE YOUR INFRASTRUCTURE San Diego March 21, 2013 John Lee Field Systems Engineer Conjecture of relative breach impact is based on publicly
More informationEC-Council C EH. Certified Ethical Hacker. Program Brochure
EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the
More informationApple OS Deployment Guide for the Enterprise
Apple OS Deployment Guide for the Enterprise So your organization is about to deploy Mac, iphone, ipad and/or Apple TV to your users and you re not sure where to start? That s where the Apple management
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationToward Resilient Cloud Environment:
Toward Resilient Cloud Environment: Case for Virtual Machine Introspection Using Hardware Architectural Invariants Z. Kalbarczyk C. Pham, C. Di Martino, R. Iyer Coordinated Science Laboratory Department
More informationJordan Levesque - Keeping your Business Secure
Jordan Levesque - Keeping your Business Secure Review of PCI Benefits of hosting with RCS File Integrity Monitoring Two Factor Log Aggregation Vulnerability Scanning Configuration Management and Continuous
More informationStop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico
1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become
More informationPhil Schwan Technical
Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.
More informationJordan Levesque Making sure your business is PCI compliant
Jordan Levesque Making sure your business is PCI compliant Brief overview of PCIDSS What's new in PCI DSS 3.2 Why is PCI important? Dive in! Simple things you can do to be secure Tomorrows session: What
More informationMulti-factor authentication enrollment guide for Deloitte practitioners
Deloitte OnLine eroom Global Technology Services December 2017 Multi-factor authentication enrollment guide for Deloitte practitioners What is multi-factor authentication (MFA) and how does it impact the
More informationSecurity and Compliance at Mavenlink
Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure
More informationSecurity Best Practices. For DNN Websites
Security Best Practices For DNN Websites Mitchel Sellers Who am I? Microsoft MVP, ASPInsider, DNN MVP Microsoft Certified Professional CEO IowaComputerGurus, Inc. Contact Information msellers@iowacomputergurus.com
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationReduce Data Usage. 01 Cellular Data for Certain Apps Go to Settings > Cellular. Dad s iphone Tips Version: 1/1/2018 6:43:00 AM
Page 1 of 6 Contents Reduce Data Usage... 1 01 Cellular Data for Certain Apps... 1 02 icoud Drive... 3 03 Wi-Fi Assist... 3 04 Automatic Downloads... 3 05 Background App Refresh... 3 06 Load Remote Images...
More informationDimensioning enterprise cloud platforms for Bring Your Own Devices (BYOD) BYOD Device Emulation and Policy Analysis
Dimensioning enterprise cloud platforms for Bring Your Own Devices (BYOD) BYOD Device Emulation and Policy Analysis Enterprise Policy Management for BYOD Dimensioning enterprise cloud platforms for BYOD
More informationThe Power of Prediction: Cloud Bandwidth and Cost Reduction
The Power of Prediction: Cloud Bandwidth and Cost Reduction Eyal Zohar Israel Cidon Technion Osnat(Ossi) Mokryn Tel-Aviv College Traffic Redundancy Elimination (TRE) Traffic redundancy stems from downloading
More informationHow to tell if you are being cyber stalked or hacked BCS, September 2017
How to tell if you are being cyber stalked or hacked BCS, September 2017 Paul Vlissidis - Technical Director, Senior Advisor paul.vlissidis@nccgroup.trust Welcome Speaker Paul Vlissidis, Technical Director,
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools
Enterprise Management Suite (EMS) & On-Premises Tools Page 1 of 7 Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools Course 20398A: 4 days; Instructor-Led
More informationInstalling. Download the O365 suite including OneDrive for Business: 1. Open the Google Play Store on your Android device
Mobile Microsoft OneDrive for Business is a part of Office 365 (O365) and is your private professional document library, it uses O365 to store your work files in the cloud and is designed to make working
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationBlackBerry UEM Configuration Guide
BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator
More informationConfiguration Guide. BlackBerry UEM. Version 12.9
Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration
More informationipad Getting Started Guide
ipad Getting Started Guide Part I - ipad Setup and Configuration For Part I You will begin to setup and configure your ipad. Please make sure you have wireless Internet access to complete this section.
More informationMobile Device Support. Jeff Dove February
Mobile Device Support Jeff Dove February 18 2017 Apple is a vertical company. Apple and IOS Control of type and design of hardware components Control over phone operating system and updates Control over
More informationHow To Sync Apple Iphone Contact To Gmail Without Itunes
How To Sync Apple Iphone Contact To Gmail Without Itunes Open itunes to buy and download apps. This is the #1 app for syncing Gmail contacts with the iphone/ipad/ipod both in terms of For example, you
More informationUsing HyperFIDO with a GitHub Account or GitHub Enterprise Account
Using HyperFIDO with a GitHub Account or GitHub Enterprise Account 8/24/2017 HSTE-NB0033.2-RV 1.0 HYPERSECU INFORMATION SYSTEMS INC #200-6191 Westminster Hwy, Richmond, BC V7C 4V4 Canada 1 (604) 297-2000
More informationWindows 10 Azure AD / EMS
Windows 10 Azure AD / EMS Jörgen Nilsson @ccmexec Jorgen.nilsson@onevinn.se Blog: http://ccmexec.com #win10tour The traditional IT environment is no more Our users have More than one device A large number
More informationWEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM
SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud
More informationTHE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.
THE KERNEL Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients. Since our founding in 1986, and establishing The Kernel s UAE office in 2008, our company
More informationipad Detail Process to Backup and Restore ipads
ipad Detail Process to Backup and Restore ipads IMPORTANT Synopsis Please do not use itunes method to backup your device. It is STRICTLY not recommended. Applications that are installed on the ipad are
More informationLaunching a Highly-regulated Startup in the Cloud
Launching a Highly-regulated Startup in the Cloud Poornaprajna Udupi (@poornaudupi) 1 Starting in the 86%by 2020 Cloud Cisco Global Cloud Index: Forecast and Methodology, 2015 2020 2 Building blocks, Cost,
More informationSecureFactors. Copyright SecureFactors Corp ver 1.0a
SecureFactors Copyright SecureFactors Corp. 2018 ver 1.0a Table of Contents Introduction... How to Use... Run SF Connector to access systems... SF Console... 1 2 3 10 11 SecureFactors(SF) is a new generation
More informationThe Cisco HCM-F Administrative Interface
CHAPTER 5 This chapter contains information on the following topics: Overview of Cisco HCM-F Administrative Interface, page 5-1 Browser Support, page 5-2 Login and Logout, page 5-4 Online Help, page 5-5
More informationCPM Quick Start Guide V2.2.0
CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup
More informationMarch Using ShareFile. Darren Sandbach FA Learning
March 2013 Using ShareFile Darren Sandbach darren.sandbach@thefa.com FA Learning Using Sharefile Contents 1 About ShareFile 2 Your username and password 3 Accessing ShareFile from a PC 4 Accessing ShareFile
More informationLiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017
LiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017 Contents Introduction... 3 Supported Platforms... 3 Protecting Data in Transit... 3 Protecting Data at Rest... 3 Encryption...
More informationFrequently Asked Questions
General Where can I find a user guide? When logged in, a user guide can be downloaded from within the client. Help is located in the options tab at the bottom right hand corner of the desktop client and
More informationCourse 831 EC-Council Certified Ethical Hacker v10 (CEH)
Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class
More informationPass, No Record: An Android Password Manager
Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationInstructions Hack Ipod Touch Password Without Losing Data
Instructions Hack Ipod Touch Password Without Losing Data Apple has just released ios 8.4 for iphone, ipad and ipod touch, along with Apple with normal data, secure information like passwords etc. are
More informationWeb Systems. Lecture 1. An Overview of Web Systems
Web Systems Lecture 1 An Overview of Web Systems Paul I-Hai Lin, Professor of Electrical and Computer Engineering Technology Dept. of Computer, Electrical, and Information Technology College of Engineering,
More informationAnsible Tower Quick Setup Guide
Ansible Tower Quick Setup Guide Release Ansible Tower 2.4.5 Red Hat, Inc. Jun 06, 2017 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 4 4 Examine the Tower Dashboard 6 5 The Setup
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationIBM Security Access Manager
IBM Access Manager Take back control of access management with an integrated platform for web, mobile and cloud Highlights Protect critical assets with risk-based and multi-factor authentication Secure
More information3.1 Getting Software and Certificates
3 Configuring the Remote Client On the remote client you have to download the Sophos SSL VPN Client software including configuration data from the UTM User Portal. Then you install the software package
More informationITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
More informationCloud Computing and Service-Oriented Architectures
Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors
More informationThis ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.
EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different
More informationFind out how to print from: computers on campus, your own laptop, mobile device, or home computer. your laptop/ desktop computer
Printing your work Find out how to print from: computers on campus, your own laptop, mobile device, or home computer. 1 See essential information about the university s networked printers. 2 Follow the
More informationCopyright
1 SECURITY TEST Data flow -- Can you establish an audit trail for data, what goes where, is data in transit protected, and who has access to it? Data storage -- Where is data stored, and is it encrypted?
More informationInformation Security for Neuropsychologists AACN Conference 6/10/16
PRACTICAL AND ETHICAL ISSUES IN INFORMATION SECURITY FOR NEUROPSYCHOLOGISTS DARCY COX, PSY.D., R.PSYCH., ABPP ROBERT N. DAVIS, PH.D., ABPP LEARNING OBJECTIVES 1. Describe how to encrypt, lock, and install
More informationTesting Cloud Services: SaaS, PaaS and IaaS. Kees Blokland Jeroen Mengerink
Testing Cloud Services: SaaS, PaaS and IaaS Kees Blokland Jeroen Mengerink Agenda Introduction Cloud computing Challenges Risks Solutions Test measures Objectives Learn how to Cope with Cloud services
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing 1 Outline 1. A brief history 2. Definition 3. Motivation, Benefit, Risk 4. Concepts 2 Outline 1. A brief history 2. Definition 3. Motivation, Benefit, Risk 4. Concepts 3
More information