Gaming Devices: Game Design
|
|
- Ursula Williamson
- 6 years ago
- Views:
Transcription
1 Gaming Devices: Technical Developments in Software Verification Game Design 3 reel 1 line, line up 3 red cherry to win bonus Line up any 2 cherry to win $10,000 Code class paytable { int returnwin(int reelstop, int symbol) { int paywin; if(reelstop ==2 && symbol=red) { paywin=2xnetbet+bonus; } return paywin; } Binary Equivalent Signature Equivalent HAP7
2 The Past Technology - Electro Mechanical - Micro Controller Devices - EPROMs Procedures - Level 1 Industry Standards - Nevada - New Jersey - Kobetron 3 rd Party The Present Technology - Micro Processors - Computer Architecture Devices - EPROM, SIMM, HD - CD, Compact Flash - Memory Sticks Procedures - Level 1 & Level 2 Industry Standards - GLI - Testing - GSA - Protocols - Kobetron - Verification
3 The Future Technology - Bios Chips - Embedded Firmware - Trusted Party Devices - Flash Cards - Thumb Drives (USB) Procedures - Level 1, 2 and 3 Industry Standards - GLI Testing - GSA Protocols - Kobetron Verification/Validation Gaming Industry Standards Testing Standard GLI Jurisdictional Protocol Standard GSA - G2S (BOB) IGT - Super SAS (SAS) Bally - SDS Verification and Validation Standards Kobetron (3 rd Party Proprietary) SHA-1 (Public)
4 GSA Protocol Standards System-To-System (S2S) The standard provides the communication link for the casino to link their various database systems, and hospitality / POS Systems. Game-To-System (G2S) The standard is merged from the BOB and SuperSAS protocols, based on proven computer industry standard technologies, such as Ethernet, TCP/IP and XML. This will allow the industry to migrate to downloadable games such as client / server games, Intranet and Internet environments, while still maintaining the games of today, well into the future. Gaming Device (GDS) Gaming Device Standard controls the flow of information between a slot machine and the array of peripheral devices operating inside, including Bill Validators, Card Readers and Ticket Printers utilizing Universal Serial Bus (USB) standards protocol. Gaming Authentication Terminal (GAT) This communication link allows for authenticating game programs residing in the machine, based on manufacturer s self-verification. Industry Standards Gaming Laboratories International (GLI) Software Verification: The device shall have the ability to allow for an independent integrity check of the device s software from an outside source and is required for all control programs that may affect the integrity of the game. This must be accomplished by being authenticated by a third-party device, which may be embedded within the game software or by having an interface port for a third-party device to authenticate the media. (Source: GLI Standards 11 (4.19), 18 (3.6), and 21 (6.19).)
5 Industry Standards (continued) Gaming Standards Association (GSA) Certification The procedure by which a 3rd party gives written assurance that a product conforms to specific requirements. (Source: GSA Las Vegas Operator s Forum, 5/19/09) Nevada Gaming Control Board s Minimum Internal Control Standards B32. Slots MICS #91 Does a Kobetron need to be used to test the EPROMS for slot machines which have an audit function available to be used? The slot machine s audit function does not satisfy the requirement of this MICS. This method relies on the game itself to tell you if it contained approved software or not. The intent of this MICS is to externally verify the programs using a device or mechanism independent of the slot machine. This can be done by removing the EPROM or other game storage media and comparing the signature of the image contained on that device to the known image signature approved by the Board. (Source: Frequently Asked Questions, posted 7/27/09) Process Should Be 3 rd Party Independent Verification & Validation Independent Verification: Essential Action to Assure Integrity in the Voting Process by Roy G. Saltman Consultant and Author on Voting Technology rsaltman@alum.mit.edu submitted to National Institute of Standards and Technology Gaithersburg, MD under Order No. SB134106W0703 August 22, 2006
6 Independent Verification & Validation Definitions Kobetron s definition of a independent third-party verification tool is a device that can produce multiple signatures based on both public and proprietary algorithms. This offers regulators a double check to self-verification public algorithms. Verification: Certifying that the software was accurately loaded and is not corrupt by verifying that the signature of the data matches the published signature for that data. Validation: Ensuring that the software residing in the game is appropriate and authorized. This is done by verifying that the software is approved for use in the jurisdiction. Why Is An Independent Third Party Important? The independent third-party verification tool provides the same assurance as independent accounting firms such as Price Waterhouse auditing (verifying) a Fortune 500 Company s financial information per government regulations. The mission of a regulator has always been to maintain the integrity of gaming devices in the Industry by using all necessary means to assure a Fair Game of Chance. An independent third-party verification tool is an essential ingredient in achieving the gaming regulator s mission, which is to provide a check and balance system similar to our government (judicial, executive and legislative branches).
7 Three Levels of Verification Verification & Validation Process Critical Program Storage Media (CPSM) BIOS Chips EPROM s SIMM s Files Folders CD ROM Compact Flash Hard Drives USB Thumb Drives Hardware- and software-based testing methods Signature testing method required depends on type of media When is IV&V required? Initial set-up Casino changes game software Manufacturer sends game software updates New machine is added to the floor Required internal audits External audits Player disputes Jackpot verifications
8 GLI Manual Examples GLI Manual Examples
9 GLI Manual Examples (con t.) GLI Manual Examples (con t.)
10 IVVM Menu Server Based Game Download Systems Common Examples of Server Based Gaming Video Lottery Terminals (VLTs) VLTs are connected to a central system that can control the functionality of the terminal. Bingo and Keno Systems These systems are predicated on a server based architecture that will send results to terminals are handheld devices. Finite - Scratch Ticket Systems Finite Scratch Ticket systems use a server based architecture to send the ticket to the gaming device. Downloadable Games Downloadable Games constitutes the transfer of game packages to player terminals stationed on the gaming floor.
11 Server Based Game Download Systems Methods of Downloading Non-System Based The ability to download directly at the gaming device using a communication port of some kind. System Based This method utilizes a server, which has the ability to download games directly to gaming terminal on the casino floor. Server Based Game Download Systems Topology Download Server Report Server In this example, the entire game kit is downloaded to the player terminal, and all gaming functions are run at the player terminal.
12 Server Based Game Download Systems Topology Report Server Seed Values Seed Values Central Server In this configuration, seed values are sent to the gaming terminals with each press of the play button. The random outcome is then determined at the gaming device. Server Based Game Download Systems Topology Bonus Server In this scenario, the games have their own internal RNG, yet they share a bonus server. The bonus server will usually be called upon, during certain events like the triggering of a bonus game. The bonus server will then generate the random event used in the bonus.
13 Houston, we have a problem We ve lost control!!! Have We Lost Control? S2000 Platform AVP Platform
14 Verification Requirements Are Manufacturer Driven, But Should Be Regulator Driven New Verification Methods Evolve In Three Ways: 1) Manufacturer requests a method to independently verify and validate the CPSM. 2) Laboratory is examining product and requests 3 rd Party or internally develops method to verify. 3) Regulatory body requests an independent, 3 rd party verification method. Need For Regulator To Take Control Prevent The Runaway Train On A Circular Track Syndrome
15 Regulator s Mission Mind the Store - Game Regulations Fair Game of Chance - Device Verification and Validation Chart the Course - Control Mechanism Key Ingredients for Success Expanded Levels of Verification Internal/External Device Verification Third-Party Verification & Validation
16 Charting the Course THANK YOU, THIS CONCLUDES OUR PRESENTATION Questions?
GSA Protocols: How and Why they are Important and Relevant to
GSA Protocols: How and Why they are Important and Relevant to Lotteries and Lottery Operations By Marc McDermott, Technical Director, Gaming Standards Association (GSA) As posted at PGRI - Public Gaming
More informationIssuing Laboratory: Evaluating Laboratory: Jurisdiction: Technical Standard for Testing: Software Supplier: Submitting Party: Product Tested:
Issuing Laboratory: Evaluating Laboratory: GLI Europe BV GLI Europe B.V. Jurisdiction: Technical Standard for Testing: Software Supplier: Submitting Party: Product Tested: Malta Online Remote Gaming Regulations,
More informationBMM CERTIFICATION TEST REPORT
Report Issue Date: 30 th December, 2014 Jurisdiction Issued To: Georgia Lottery Corporation Issued By: BMM Testlabs Travis Foley, Executive Vice President, Operations 815 Pilot Road, Suite G, Las Vegas,
More informationELECTRONIC RAFFLE SYSTEMS MINIMUM TECHNICAL STANDARDS FOR MEGA RAFFLES
ELECTRONIC RAFFLE SYSTEMS MINIMUM TECHNICAL STANDARDS FOR MEGA RAFFLES DRAFT - SEPTEMBER 2016 AGCO VISION A leader in the alcohol, gaming and horse racing sectors through effective regulation and services
More informationGeorgia COAM. SAS Requirements
Georgia COAM SAS Requirements Table of Contents 1. Introduction... 4 1.1 Purpose... 4 1.2 Intended Audience... 4 1.3 Overview... 4 1.4 List of Relevant Documents... 5 1.5 Acknowledgement... 5 1.6 Definitions...
More informationRuss Ristine Radical Blue Gaming
Russ Ristine Radical Blue Gaming What is G2S? (a little history) The Benefits of G2S Securing the New Environment Case Study The Road to Aria Slide 2 How did we get here? Slide 3 SAS became the de-facto
More informationSoftware Verification Procedures Voting Systems vs. Slot Machines
Software Verification Procedures Voting Systems vs. Slot Machines Annual State Certification Testing of Voting Systems National Conference Raleigh, NC 6/19/2018 SLI and GLI SLI Compliance has insight into
More informationBMM COMPLIANCE TEST REPORT
Report Issue Date: 24 th May, 2016 Jurisdiction Issued To: Georgia Lottery Corporation Issued By: BMM Testlabs Travis Foley, Executive Vice President, Operations 815 Pilot Road, Suite G, Las Vegas, NV
More informationA panoramic view of the gaming industry
Sponsor Media Partners Peter DeRaedt, President, Gaming Standards Association A panoramic view of the gaming industry Moderator: Andrew Gellatly, Editorial Director, GamblingCompliance Ltd Panellists:
More informationGeoLocation Overview
GeoLocation Overview Location-as-a-Service How Mobile, igaming and Lottery Markets can Advance with Layered Location Intelligence LocationSmart 2035 Corte del Nogal, Suite 110 Carlsbad, CA 92011 White
More information10 Things to Know about G2S
10 Things to Know about G2S Being a Smart Consumer When moving to a server-based or network gaming floor: Be informed Try to ensure that your solution is future-proof This is a primer, but lots more info
More informationGaming Supplies Classification and Gaming Supplier Licence List
Supplies ification and List Items not appearing on this classification list do not require Liquor and Authority of Manitoba (LGA) approval, but this list is subject to change. Refer to the applicable note
More informationRequirements Specification. New Gambling Device and Modifications
Requirements Specification for New Gambling Device and Modifications Montana Department of Justice Gambling Control Division October 13, 2011 Table of Contents Table of Contents... 1 Revision History...
More informationGLI-24: STANDARD SERIES. Electronic Table Game Systems. Version: 1.3. Release Date: September 6, 2011
STANDARD SERIES GLI-24: Electronic Table Game Systems Version: 1.3 Release Date: This Page Intentionally Left Blank ABOUT THIS STANDARD This Standard has been produced by Gaming Laboratories International,
More informationELECTRONIC RAFFLE SYSTEMS MINIMUM TECHNICAL STANDARDS
ELECTRONIC RAFFLE SYSTEMS MINIMUM TECHNICAL STANDARDS VERSION 1.0 NOVEMBER 2018 Alcohol and Gaming Commission of Ontario 90 SHEPPARD AVE E - SUITE 200 TORONTO ON M2N 0A4 Fax: 416 326-8711 Tel: 416 326-8700
More informationTrusted Audit. Trust in Process. Trust in Data. through. Irena Szrek, Director Szrek2Solutions. SMART TECH, April 18, 2007 Szrek2Solutions, LLC Page 1
Trusted Audit Trust in Process through Trust in Data Irena Szrek, Director Szrek2Solutions SMART TECH, April 18, 2007 Szrek2Solutions, LLC Page 1 Szrek2Solutions, LLC International supplier of secure system
More informationGLI-13 Revision History
GLI-13 Revision History Table of Contents Revision 2.1... 2 Revision 2.0... 4 Revision 1.2... 4 Revision History Outline Date Released: September 6, 2011 Revision 2.1 Final Date Released: April 20, 2007
More informationGaming Laboratories International Evaluation Report Report No SY-49-TLI Date 21 December 2017
Report No -049 Issuing Laboratory GLI Africa (Pty) Ltd Evaluating Laboratory GLI Africa (Pty) Ltd Recipient Trinitial Associates Ltd Juan Luis Segovia 152/9, Naxxar Road SGN 9030 San Gwann Malta Tested
More informationINFORMATION BULLETIN
BULLETIN #: 16-007028-05 WWW.WMSGAMING.COM LOCAL CUSTOMER SERVICE (800) 378-7741 DISTRIBUTE TO: Sales Field Service Management Legal Regulatory Compliance Other: Customers MODEL(S) AFFECTED UNIT AFFECTED
More informationELECTRONIC RAFFLE SYSTEMS MINIMUM TECHNICAL STANDARDS FOR RAFFLES
ELECTRONIC RAFFLE SYSTEMS MINIMUM TECHNICAL STANDARDS FOR 50-50 RAFFLES DRAFT - SEPTEMBER 2016 AGCO VISION A leader in the alcohol, gaming and horse racing sectors through effective regulation and services
More informationResort and Casino Takes its Gaming Floor to the Next Level
Resort and Casino Takes its Gaming Floor to the Next Level Pechanga Resort and Casino teams with Cisco and Bally Technologies to create a dynamic networked gaming floor. EXECUTIVE SUMMARY PECHANGA RESORT
More informationNetEnt Product Services Ltd. Platform 10.2 and RNG Certification Report. for UK Gambling Commission
NetEnt Product Services Ltd Platform 10.2 and RNG Certification Report for UK Gambling Commission 26 March 2015 itech Labs Australia ACN 108 249 761 Suite 24, 40 Montclair Ave, Glen Waverley, VIC 3150,
More informationICB FAQ v6.0 Reference Guide
ICB FAQ v6.0 Reference Guide JCM Global 925 Pilot Road Las Vegas, NV 89119 (702) 651-0000 www.jcmglobal.com ICB FAQ v6.0 Reference Guide REVISION HISTORY Rev. Date Reason for Update Comment A 5/14/12 Initial
More informationDolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC
Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3
More informationWLA Certification : Preparation and Management
WLA Certification : Preparation and Management Australia 27-30 April 2015 By Driss HAMDOUNE MDJS Secretary General & WLA Security & Risk Management Committee Member What kinds of risk is our business activity
More informationRuss Ristine Radical Blue Gaming
Russ Ristine Radical Blue Gaming Moving to a networked gaming floor? Be informed Strive for a future-proof solution This is just a primer Focus = 10 things to understand for success Slide 2 G2S source
More informationGI-4000 User Manual. Kobetron, Inc. P.O. Box 5489 Navarre, FL 32566
GI-4000 User Manual Kobetron, Inc. P.O. Box 5489 Navarre, FL 32566 TEL: (850) 939-5222 FAX: (850) 939-0490 EMAIL: sales@kobetron.com WEB: www.kobetron.com "Testing Tomorrow's Technology Today" TABLE OF
More informationCoSign Hardware version 7.0 Firmware version 5.2
CoSign Hardware version 7.0 Firmware version 5.2 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation July 2010 Copyright 2009 AR This document may be freely reproduced and distributed whole and
More informationTrusted Optical Disc March 2008
Trusted Optical Disc March 2008 1 Agenda TCG - Trusted Optical Disc mission Overview - 2 minute drill Target Features/Platforms/Markets Optical SSC Details 2 Trusted Optical Disc Mission Encrypt data on
More informationValidation and Use of Excel Spreadsheets in Regulated Environments
Validation and Use of Excel Spreadsheets in Regulated Environments February 13, 2007 Ludwig Huber Fax.: +49 7802 981948 Tel.: +49 7802 980582 E-mail:Ludwig_Huber@labcompliance.com Today s Agenda Regulatory
More informationIGT Part Number IGT Progressive Controller EZ Setup User s Manual
IGT Part Number 821-369-00 IGT Progressive Controller EZ Setup User s Manual Reno, Nevada January 15, 2004 IGT Progressive Controller EZ Setup User s Manual Warranty IGT warrants that its products have
More informationProSlot-6000 MODULE 7
ProSlot-6000 MODULE 7 MK7-S6MOD-9800 PROGRESSIVE OPERATION 1998 BALLY GAMING, INC. ALL RIGHTS RESERVED 6601 South Bermuda Road Las Vegas, NV 89119 Module 7 Progressi essive e Operation Table le of Contents
More informatione-motion Software Module
e-motion Software Module This module of the Atronic e-motion Service Manual contains software information and procedures for the e-motion Cabinet. Content Logic Box... 2 Software Descriptions... 3 Audit
More informationGLI-31: STANDARD SERIES. Electronic Raffle Systems. Version: Version 1.1. Release Date: July 24, 2015
STANDARD SERIES GLI-31: Electronic Raffle Systems Version: Version 1.1 Release Date: All Rights Reserved This Page Intentionally Left Blank All Rights Reserved ABOUT THIS STANDARD This Standard has been
More informationZatara Series ARM ASSP High-Performance 32-bit Solution for Secure Transactions
1 ARM-BASED ASSP FOR SECURE TRANSACTIONS ZATARA SERIES 32-BIT ARM ASSP PB022106-1008 ZATARA SERIES ADVANTAGE SINGLE-CHIP SOLUTION BEST FEATURE SET IN POS PCIPED PRE-CERTIFIED EMV L1 CERTIFIED TOTAL SOLUTION
More informationSMIB. Technical Manual FIRMWARE V5.0.5.X HARDWARE REV. B. P.N March 31,
SMIB FIRMWARE V5.0.5.X HARDWARE REV. B P.N. 990-242-38 March 31, 2003 www.mikohn.com 2003 MIKOHN CORPORATION COPYRIGHT NOTICE All rights are reserved worldwide. This document ("document" refers to manual,
More informationTarsin Mobile Inc. 0
0 Tarsin Mobile Inc. Mobile gambling is legal in the UK 10 years experience in developing and marketing mobile games Over 2.5 million mobile players in UK alone Strong relationships with mobile network
More informationRESOLUTION BEFORE THE OHIO LOTTERY COMMISSION VIDEO LOTTERY GAME THEME APPROVAL March 19, 2018
RESOLUTION BEFORE THE OHIO LOTTERY COMMISSION VIDEO LOTTERY GAME THEME APPROVAL March 19, 2018 WHEREAS, Game Rule Sixty, OAC 3770:2-10-60 is the General video lottery game rule effective 10/28/2010 which
More informationPeter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security
Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, 2011-09-20 Secure and reliable Redundant communication network and cyber security Content Reliable Substation communication networks Introduction
More informationLexmark PrintCryption TM (Firmware Version 1.3.1)
Lexmark PrintCryption TM (Firmware Version 1.3.1) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 0.95 April 2007 Table of Contents INTRODUCTION... 3 PURPOSE... 3 REFERENCES... 3
More informationCisco IoT Industrial Ethernet and Connected Grid Switches running IOS
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco IoT Industrial Ethernet
More informationCAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010
CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy Version 3 June 30, 2010 Dolby Laboratories Licensing Corporation Corporate Headquarters Dolby Laboratories, Inc. Dolby Laboratories Licensing
More informationInside the Computer System
Inside the Computer System What s on the Motherboard? What s on the Motherboard? What s on the Motherboard? Parallel processing o Method where more than one processor performs at the same time faster processing
More informationThis is a preview - click here to buy the full publication. IEC Quality Assessment System for Electronic Components (IECQ System)
IECQ 03-3-1 Edition 1.0 2013-02 IECQ PUBLICATION IEC Quality Assessment System for Electronic Components (IECQ System) Rules of Procedure Part 3-1: IECQ Approved Component Products, Related Materials &
More informationGame Guide. Keno Game Guide
Game Guide Keno Game Guide Contents Introduction and ways to play Keno - Keno Classic Keno Mega-Millions Keno Kwikpik Keno Heads or Tails Keno Advanced Keno Superplay Watching the game 0 Keno Replay 0
More informationAnnouncing Sage Estimating SQL v17.11 ( our most impactful release of the decade!)
Sage Construction and Real Estate Sales Flash May 30th, 2017 Announcing Sage Estimating SQL v17.11 ( our most impactful release of the decade!) On May 30 th, 2017 Sage Estimating SQL v17.11 will be released
More informationGT1200 RETAILER REFERENCE GUIDE
GT1200 RETAILER REFERENCE GUIDE CONTACT INFORMATION RETAILER HOTLINE 1-800-242-7782 - REPORT LOST OR STOLEN TICKETS - TICKET ORDERING - APPLICATIONS AND CONTRACTS - ACCOUNTING QUESTIONS - GAME INFORMATION
More informationPersonal computer hardware From Wikipedia, the free encyclopedia (Redirected from Computer hardware)
Personal computer hardware From Wikipedia, the free encyclopedia (Redirected from Computer hardware) Personal computer hardware are component devices which are typically installed into or peripheral to
More informationConference for Food Protection. Standards for Accreditation of Food Protection Manager Certification Programs. Frequently Asked Questions
Conference for Food Protection Standards for Accreditation of Food Protection Manager Certification Programs Frequently Asked Questions Q. What was the primary purpose for the Conference for Food Protection
More informationNetEnt Product Services Ltd. Random Number Generator Certification Report
NetEnt Product Services Ltd Random Number Generator 01 April 2015 itech Labs Australia ACN 108 249 761 Suite 24, 40 Montclair Ave, Glen Waverley, VIC 3150, Australia. Tel. +61 3 9561 9955 www.itechlabs.com.au
More informationApproved establishments, which must have a valid liquor license, will pay a $500 annual license fee to offer KENO 603, according to the legislation.
GOVERNOR Christopher T. Sununu CHAIRMAN Debra M. Douglas COMMISSIONER Paul J. Holloway COMMISSIONER David L. Gelinas EXECUTIVE DIRECTOR Charles R. McIntyre December 1, 201. KENO 0 IS ON SALE NOW! During
More informationStep-by-Step Guide to Installing Cluster Service
Page 1 of 23 TechNet Home > Products & Technologies > Windows 2000 Server > Deploy > Configure Specific Features Step-by-Step Guide to Installing Cluster Service Topics on this Page Introduction Checklists
More informationBlack Box Micro HD. User s Guide. Page 1 BrickHouse Security User s Guide
Black Box Micro HD User s Guide Page 1 BrickHouse Security User s Guide Black Box Micro HD The Black Box Micro HD is a fully functional and customizable video recording system in a compact case. Use the
More informationSome announcements. Announcements for game due (via ) on Wednesday, March 15 Homework 6 due on March 15 Exam 3 on March 17
Hamming Codes Some announcements Announcements for game due (via email) on Wednesday, March 15 Homework 6 due on March 15 Exam 3 on March 17 Today s Goals Learn about error correcting codes and how they
More informationBiometric Fingerprint Reader Unit OZD-ABC-OA99 Technical Specification Data Sheet
BIOMETRIC FINGERPRINT TIME & ATTENDANCE FINGERPRINT READER UNIT Item Code: OZD-ABC-OA99 OZD-ABC-OA99 is one of the most cost effective Biometric Fingerprint Readers on the market today. OZD-ABC-OA99 incorporates
More informationCertDigital Certification Services Policy
CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES
More informationDESIGNING THE NEW INFORMATION SYSTEM. Lecturer: Prof. E.E Badu, Dept. of Information Studies Contact Information:
DESIGNING THE NEW INFORMATION SYSTEM Lecturer: Prof. E.E Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education School of Continuing and Distance Education 2017 Session
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationCredant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS Non-Proprietary Security Policy, Version 1.7 Level 1 Validation
Credant CmgCryptoLib Version 1.7 Credant Cryptographic Kernel Version 1.5 FIPS 140-2 Non-Proprietary Security Policy, Version 1.7 Level 1 Validation October 2007 1. INTRODUCTION 3 2. PRODUCT, BOUNDARY,
More informationCerticom Security for Government Suppliers developing products to meet the US Government FIPS security requirement
certicom application notes Certicom Security for Government Suppliers developing products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage of the lucrative
More informationNational Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco Catalyst 2K/3K
More informationDrywall Finishing Council, Inc. c/o Walsworth - WFBM, LLP Account No.:
Quote Date: 2015/07/14 Valid Until: 2015/10/30 One City Boulevard West, 5th Floor Orange, CA 92868-3677 United States Single Industry Wide EPD Greetings, On behalf of UL, it is my pleasure to submit to
More informationCertification Report
Certification Report EAL 2+ Evaluation of Tactical Network-layer Gateway (2E2 IA): a GD Canada MESHnet G2 Gateway product Issued by: Communications Security Establishment Canada Certification Body Canadian
More informationAgenda. Bibliography
Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria
More informationUse of Standards and Conformity Assessment in U.S. Regulation: Perspective of the Private Sector
Use of Standards and Conformity Assessment in U.S. Regulation: Perspective of the Private Sector Standards Alliance Peru Workshop on Regulatory Decision Making October 29-30, 2014 Presentation Objectives
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationLet s get started. Game guide
Let s get started Game guide What is Keno? Keno is a fun, easy game that is played every minutes. 0 numbers are drawn from the 0 available on the Keno game grid. Match the numbers you play to the numbers
More informationFIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points
FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points November 4, 2010 Version 2.2 Contents This security policy
More informationPolicy. Sensitive Information. Credit Card, Social Security, Employee, and Customer Data Version 3.4
Policy Sensitive Information Version 3.4 Table of Contents Sensitive Information Policy -... 2 Overview... 2 Policy... 2 PCI... 3 HIPAA... 3 Gramm-Leach-Bliley (Financial Services Modernization Act of
More informationFIPS Level 1 Validation March 31, 2011 Version 1.12
KoolSpan TrustChip Developer Kit (TDK) Cryptographic Library Version 3.0 Security Policy FIPS 140-2 Level 1 Validation March 31, 2011 Version 1.12 Table of Contents 1 Introduction... 1 1.1 Acronyms and
More informationMemory Study Material
Computer memory refers to the devices that are used to store data or programs on a temporary or permanent basis for use in a computer. Any data or instruction entered into the memory of a computer is considered
More informationSilicon Motion Technology Corporation
Silicon Motion Technology Corporation Silicon for Mobile Information Investor Presentation March 2006 Safe Harbor Statement This presentation does not constitute or form part of any offer for sale or subscription
More information1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Access Certifier Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Periodic review and cleanup of security entitlements. 2 Agenda Hitachi ID corporate overview.
More informationManaging Born- Digital Documents.
Managing Born- Digital Documents www.archives.nysed.gov Objectives Review the challenges of managing born-digital records Provide Practical strategies to ensure born-digital records are well managed Understand
More informationKENYA TRADE NETWORK AGENCY KENTRADE VACANCY ANNOUNCEMENT
KENYA TRADE NETWORK AGENCY KENTRADE VACANCY ANNOUNCEMENT The Kenya Trade Network Agency (KenTrade) is a State Corporation under the National Treasury whose mandate is to implement, operationalize and manage
More informationIntegral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy
Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT
More informationStandard CIP Cyber Security Physical Security
A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security program
More informationModels HP USB Standard Duty Cash Drawer
Overview Models HP Standard Duty Cash Drawer HP USB Standard Duty Cash Drawer QT457AA E8E45AA Introduction HP's Standard Duty Cash Drawer provides excellent performance and reliability to meet the needs
More informationMulti-Sponsor Environment. SAS Clinical Trial Data Transparency Version 2.3 Getting Started
Multi-Sponsor Environment SAS Clinical Trial Data Transparency Version 2.3 Getting Started Version 1.0 30 January 2018 Contents Contents 1 Overview...1 2 Setting Up Your Account...3 2.1 Completing the
More informationDownload from Powered By JbigDeaL
1. If a word is typed that is not in Word s dictionary, a wavy underline appears below the word. (A) red (B) green (C) blue (D) black 2. The button on the quick access Toolbar allows you to cancel your
More informationEXAM PREPARATION GUIDE
When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 37001 Lead Auditor www.pecb.com The objective of the Certified ISO 37001 Lead Auditor examination is to ensure that the candidate possesses
More informationEPIC 950 THERMAL TICKET PRINTER
EPIC 950 THERMAL TICKET PRINTER Tech Support Reference Guide www.transac-tech.com 2 Contacting Information / Serial Plate Info TransAct Technologies Incorporated is the manufacturer of Ithaca brand POS,
More informationMC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER
Page 1 of 6 PRODUCT SPEC SHEET MC75A HF MC75A HF PREMIUM HF RFID CONTACTLESS MOBILE COMPUTER THE RIGHT MOBILE SOLUTION FOR TICKETING, IDENTITY AND ACCESS MANAGEMENT Zebra's MC75A HF takes its place as
More informationMAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User
More informationInformation Technology Commercial Pricelist January 2018
Information Technology Commercial Pricelist January 2018 This document contains the approved commercial prices of the products and services offered by Gradkell Systems, Inc. It shall remain valid from
More informationComputers Are Your Future
Computers Are Your Future Twelfth Edition Chapter 2: Inside the System Unit Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Inside the Computer System Copyright 2012 Pearson Education,
More informationRGS EVALUATION TESTING REPORT
Report ID: GIB_THK004GAM_The Falcon Huntress_rev. 1 Page 1 of 18 RGS EVALUATION TESTING REPORT Game: The Falcon Huntress (Game Platform: 1.0.0) HTML5 (Desktop & Mobile) release 1.0.1 RNG version: 3.5.0
More informationComparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition
Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,
More informationHow-To Guide. AVP OS Version 1.4 (Family 14) For use with the following base operating systems: AVP AVP x
AVP OS Version 1.4 (Family 14) For use with the following base operating systems: AVP014-00305 AVP014-0032x Reno, Nevada July 2010 Warranty IGT warrants that its products have been manufactured in conformity
More informationCasinArena GLS/MGA RNG Compliance
Gambling Commission approved Test House Accredited to ISO/IEC 17025:2005 NMi Metrology & Gaming Ltd Parc Menai Bangor Gwynedd LL57 4EZ United Kingdom Tel: +44 (0)1248 660550 http://www.nmi.uk.com 4403
More informationImporting and Using your or Personal Authentication Certificate with Outlook 2010 / 2013
Personal Authentication Certificates Importing and Using your Email or Personal Authentication Certificate with Outlook 2010 / 2013 If you originally applied for the certificate on the same computer as
More informationNational Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Delta Security Technologies Sentinel Model III Computer Security System Report Number: CCEVS-VR-02-0023
More informationSpecification for PCs ANNEXURE-C. Technical specification:- Sl. No. Items Specifications Offered Y/N Deviation if any
Technical specification:- ANNEXURE-C 1 Dot Matrix Printers 2) 24 pin 136 col, 300cps@10 cpi draft mode parallel and USB port.minimum print head life of 200 million character and input buffer 64kb 2 High
More informationACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
More informationEuropean seminar on accounting reforms. Preparation of certification France s experience
European seminar on accounting reforms Preparation of certification France s experience Mr David Litvan Deputy Director, State Accounting Public Finances General Directorate Introduction The accounting
More informationRecords Retention Schedule
Retention Schedule Form C must Record Title Storage 1. Page 18 of 104 106 Category 2: Electronic Data Processing Section 2.1 Automated Applications 2.1.001 38 Automated Files - Processing Files Machine-readable
More informationUELMA Exploring Authentication Options Nov 4, 2011
UELMA Exploring Authentication Options Nov 4, 2011 A U T H E N T I C A T I O N M E T H O D S P R E L I M I N A R Y R E P O R T B R A D L E E C H A N G X C E N T I A L G R O U P B R A D @ X C E N T I A
More informationEnabling a World-Class National ICT Sector
Activity: Workshop on Government Procurement Modernization in the Caribbean Topic: Digital Signature, E-Government Procurement Títle: Demystifying Authentication & Digital Signatures, PKI, ETA Speaker:
More informationPC BIOS Settings: (22 Jan 2004) These settings will be required for either O.S. Installation or to improve the PC performance.
PC BIOS Settings: (22 Jan 2004) These settings will be required for either O.S. Installation or to improve the PC performance. S.No. Standard Hard Disks Operation Reason 1. CMOS SETUP Keep Type setting
More informationWeighing in on the Benefits of a SAS 70 Audit for Third Party Administrators
Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener
More information