Cyber Risk Mitigation for Smart Cities
|
|
- Clyde Mason
- 6 years ago
- Views:
Transcription
1 Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are, essetially, dyamic ecosystems characterized by highly advaced, ituitive, ad iterdepedet cyber systems. As emergig digital techologies ad the Iteret of Thigs (IoT) pave the way for these smart habitats, effective risk maagemet becomes crucial to provide risk-free smart services to citizes.
2 The Rise of Smart Cities Approximately 70% of the world's populatio is expected to live i cities by Two key features of smart cities are citizecetricity ad digitallyeabled ifrastructure. As with all IT-eabled services, smart city services too should be risk-free ad secure. I coectig devices ad users, cyber systems should esure the highest level of co detiality ad itegrity, while allowig uhidered availability. It is therefore importat to proactively maage the security risks of iterdepedet systems of the smart city digital ifrastructure. Apart from smart ifrastructure, a smart city has advaced systems to maage eergy, trasport, traf c, water, healthcare, ad educatio. It is a seamless uio of techology, govermet, ad society to eable smart livig, which is characterized by a boomig ecoomy, effective goverace, ad coveiet public services. Iterdepedet Systems Form the Backboe of Smart Cities Iterdepedet systems are the foudatio of smart cities, as they provide the critical ifrastructure to hadle major public systems ad citize services. These iclude water ad eergy geeratio ad trasmissio setups, trasportatio frameworks, waste disposal mechaisms, street ad home lightig systems, coected healthcare, surveillace, ad more. Iterdepedet systems also eable dyamic ad syergistic data gatherig ad aalytics, which drive cotiuous improvemets across systems. I effect, a smart city is a 'system of systems' that follows a scale-free topology to allow future expasio, but without affectig the attributes of iterdepedecy ad itercoectedess.. Opportuities ad Risks: IT-eabled iterdepedet systems preset several opportuities to improve a citize s lifestyle. They ca help city coucils take ecessary actios, based o real-time aalysis of the data collected from various iterdepedet systems, such as idetifyig health hazards, mappig eergy ef ciecy of buildigs, prevetig crime, ad effectively maagig atural disasters. However, these iterdepedet systems also pose operatioal challeges ad security risks. If oe smart service iformatio system fails to provide relevat iformatio to other coected smart services, it ca lead to chaotic situatios.
3 Criticality of Risk Mitigatio: Due to the large umber of coected devices that make up a smart city's digital ifrastructure, ehaced security maagemet for gateway devices, such as idustrial cotrol systems (ICS) ad IT systems (ITS), is critical to prevet data breach or leakage. Leakage of sesitive data ca lead to a lockdow of critical services. The Role of Smart City Coucils Risk mitigatio i smart cities requires a detailed uderstadig of several factors. These iclude desig ad architecture of smart services, IT ifrastructure support capabilities, ad the kowledge of probable cyber threats. A city coucil should operate like a moder-day eterprise with speci c goals ad objectives that iclude plaig for defedig agaist cyber-attacks ad respodig to emergecies. Esurig security of etwork ad sesors: The smart city coucil should secure coected systems ad sesors from ay physical attack or i ltratio. Idetity maagemet ad device autheticatio mechaisms should be deployed at every iterface of a smart system. Digital foresic capabilities, which help trace cyber breaches ad gather evidece of malicious activities for legal actio, should be itegrated with the overall cyber architecture, right from the desig phase. Gatherig ad aalyzig real-time data with supervisory cotrol ad data acquisitio (SCADA) will help predict security failures, ad thus prevet a complete lockdow of critical services. Buildig resiliet systems: As a smart city grows, the itercoectios of systems ad iterdepedecies of smart services icrease maifold. This makes them more vulerable to cyber-attacks. The smart city coucil should therefore aim to desig risk resiliet digital architecture. The architecture should possess the adaptive capability to arrest aomalies i the ascet stage, ad lock dow a subsystem without disturbig other live compoets, esurig uiterrupted service delivery. Adoptig iteratioal stadards: The security stadards ad risk mitigatio strategies curretly beig used to secure IT systems may ot be adequate to safeguard the iterdepedet systems i smart cities. ISO 22301:2012,
4 the Iteratioal Stadard for Societal Security Busiess 1 Cotiuity Maagemet Systems should be adopted to prevet the disruptio of citize services. Proper commuicatio maagemet is critical for smart cities to respod to cyber threats ad other exigecies. Performig system impact ad iterdepedecy aalysis: Periodic system impact aalysis should be performed to idetify risks posed to critical iterdepedet systems ad itercoected services, with appropriately de ed recovery time ad recovery poit objectives. Smart cities should also have secure data receivers ad data storage to collect ad store data geerated from the ICS ad ITS compoets for aalysis, decisio makig, ad icidet respose maagemet. Smart city coucils should devise a compoet protectio strategy to idetify critical compoets of iterdepedet systems for agile risk aalysis. The CPNI Good Practice Guide for Process Cotrol ad SCADA 2 Security- ca be used by city coucils to esure security ad trustworthiess of the iterdepedet systems. It provides a framework based o idustry best practices for process cotrol ad IT security. The framework focuses o seve key themes: 1. Uderstadig busiess risks 2. Implemetig secure architecture 3. Establishig respose capabilities 4. Improvig awareess ad skills 5. Maagig third party risks 6. Egagig projects for security measures i service desig 7. Establishig ogoig goverace Esurig citize compliace: Citizes of smart cities are boud to play a crucial role i esurig the security of iterdepedet systems from cyber as well as physical security perspectives. Citizes with smart devices are critical poits i the cyber system framework, ad ca be targeted by attackers ad hackers to gai etry ito the system. This ca be doe through social egieerig, spam s, data streamig, ad other malicious methods. To prevet this, smart city coucils should develop policies ad procedures for establishmet, maiteace, ad operatio of secure smart services. Cyber-awareess programs should be made madatory for citizes, ad pealties levied for ocompliace.
5 Coclusio Uderstadig ad evaluatig risks i smart city systems require a pragmatic approach to cyber risk maagemet due to the high level of itercoectedess of smart services ad the rapidly evolvig ature of costituet systems. With smart cities projected to grow rapidly over the ext few years, there is a clear eed for smart city coucils to focus o mitigatig security cocers. Icorporatig risk mitigatio ad developig strog security strategies i the iitial plaig ad service desig stages will eable smart city coucils to provide safe, secure, ad reliable services to its citizes. Refereces [1] ISO, ISO 22301:2012, accessed November 2015 [2] Good Practice Guide Process Cotrol ad SCADA Security, GPG_SCADA_Security_Good_Practice.pdf, accessed November 2015
6 About The Author Abhik Chaudhuri Abhik Chaudhuri is a Domai Cosultat with the Iformatio Techology Ifrastructure Services Global Techology Practice at TCS. He is a Cheveig TCS Fellow i Cyber Security, Privacy ad Policy with more tha 14 years of IT experiece. Cotact Visit TCS IT Ifrastructure Services uit page for more iformatio itis.presales@tcs.com Subscribe to TCS White Papers TCS.com RSS: Feedburer: About Tata Cosultacy Services Ltd (TCS) Tata Cosultacy Services is a IT services, cosultig ad busiess solutios orgaizatio that delivers real results to global busiess, esurig a level of certaity o other firm ca match. TCS offers a cosultig-led, itegrated portfolio of IT ad IT-eabled, ifrastructure, egieerig ad assurace services. This is TM delivered through its uique Global Network Delivery Model, recogized as the bechmark of excellece i software developmet. A part of the Tata Group, Idia s largest idustrial coglomerate, TCS has a global footprit ad is listed o the Natioal Stock Exchage ad Bombay Stock Exchage i Idia. For more iformatio, visit us at All cotet / iformatio preset here is the exclusive property of Tata Cosultacy Services Limited (TCS). The cotet / iformatio cotaied here is correct at the time of publishig. No material from here may be copied, modified, reproduced, republished, uploaded, trasmitted, posted or distributed i ay form without prior writte permissio from TCS. Uauthorized use of the cotet / iformatio appearig here may violate copyright, trademark ad other applicable laws, ad could result i crimial or civil pealties. Copyright 2016 Tata Cosultacy Services Limited TCS Desig Services I M I 12 I 16
Building Your Security Operations Center and Taking it to the Next Level
Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio
More informationShielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework
Shieldig Eterprises from Evolvig Cyber Attacks with a Digital Security Framework Abstract As the IT ladscape evolves, cyber threat actors also mature i respose developig ew techiques to compromise the
More informationGetting the Most out of IoT with an Effective Data Lifecycle Management Strategy
Gettig the Most out of IoT with a Effective Data Lifecycle Maagemet Strategy Abstract The Iteret of Thigs (IoT) is a rapidly evolvig techology, ad like ay other techology, it ca pose challeges with respect
More informationStrengthening Privacy Protection with the European General Data Protection Regulation
Stregtheig Privacy Protectio with the Europea Geeral Data Protectio Regulatio Abstract The expoetial growth of digital data has led to a substatial icrease i data breaches. To meet the privacy cocers of
More informationInnovation Labs. White Paper. Accelerate Your Digital API Program
Iovatio Labs White Paper Accelerate Your Digital API Program About the Author Abhishek Seth Abhishek Seth is a Associate Cosultat i the API Program withi the Research ad Iovatio uit at Tata Cosultacy Services
More informationTransforming Railroad Asset Management: Going Smart with Predictive Maintenance
Trasformig Railroad Asset Maagemet: Goig Smart with Predictive Maiteace Abstract As oe of the most asset-itesive idustries i the world, the rail idustry ivests early 20% of its reveue i asset maiteace
More informationBig Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations
Big Data Capacity Plaig: Achievig Right Sized Hadoop Clusters ad Optimized Operatios Abstract Busiesses are cosiderig more opportuities to leverage data for differet purposes, impactig resources ad resultig
More informationContinuity Logic Frontline Live
September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece
More informationDemystifying IaaS Adoption for Enterprise Applications
Demystifyig IaaS Adoptio for Eterprise Applicatios Abstract Despite the growig sped o cloud techologies, eterprises worldwide are plagued with this questio, Which amog the may is the best solutio for us?
More informationLandscape in the Making
Tokeizatio: A Fraudfree Paymets Ladscape i the Makig Abstract Baks are uder pressure to meet customers' demads for coveiet ad frictioless digital paymets. At the same time, they are required to esure the
More informationServerless Computing: A Compelling Opportunity for Today s Digital Enterprise
Serverless Computig: A Compellig Opportuity for Today s Digital Eterprise Abstract Cloud computig has eabled orgaizatios to focus less o their IT ifrastructure ad more o their core products ad services.
More informationData Governance Simplifying Machine Learning Model Deployment
Data Goverace Simplifyig Machie Learig Model Deploymet Abstract Although machie learig (ML) offers may advatages whe it comes to predictig outcomes ad idetifyig with ovel isights, deployig ML models i
More informationMaking Software Inclusive and Accessible
Makig Software Iclusive ad Accessible Abstract Aroud 650 millio people across the world live with some form of disability, which iadvertetly prevets them from beig able to fully utilize 1 covetioally desiged
More informationThe Threat Hunting Route to Predictive Cyber Security
The Threat Hutig Route to Predictive Cyber Security Abstract Withi a icreasigly malicious cyber threat ladscape, our defese mechaisms must mature from beig reactive to proactive ad ally, predictive. For
More informationMulti-drone four-dimensional flight constraint management
Multi-droe four-dimesioal flight costrait maagemet Abstract With the emergece of the umaed aerial vehicle (UAV) eco-system for commercial ad eterprise markets, multi-droe traf c maagemet has become critical
More informationGaining Ecommerce-like Simplicity within a Drone-As-A-Service Framework
Gaiig Ecommerce-like Simplicity withi a Droe-As-A-Service Framework Abstract Takig ote of the expoetial growth of droe-asas-a-service (DaaS), eterprises are deployig commercial droes for ispectio (ifrastructure,
More informationLeveraging Meta Data Management: Powering Cognitive Automation in Clinical Trial Processes
Leveragig Meta Data Maagemet: Powerig Cogitive Automatio i Cliical Trial Processes Abstract Today, arti cial itelligece (AI) is trasformig every area of busiess, icludig life scieces, particularly i the
More informationDevice-as-a-Service Model: Key to Workplace Transformation in the High Tech Industry
Device-as-a-Service Model: Key to Workplace Trasformatio i the High Tech Idustry Abstract The emergece of radically ew workig styles ad the eed to provide exceptioal workplace experieces are compellig
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationData Protection: Your Choice Is Simple PARTNER LOGO
Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected
More informationRobots in the Back Office: The Future of Recruitment Enterprises
Robots i the Back Office: The Future of Recruitmet Eterprises Abstract As social ad techological chages reshape the busiess ladscape ad ew etrats stiffe the competitio, staffig ad recruitmet eterprises
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationSecurity Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team
Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper
More informationData Warehousing. Paper
Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial
More informationCA Top Secret r14 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationReaching for the Sky: Using Drones to Propel the Mining Industry Forward
Reachig for the Sky: Usig Droes to Propel the Miig Idustry Forward Abstract Droes are becomig icreasigly pervasive across idustries. Use of droes i the Metals & Miig (M&M) idustry is curretly cetered o
More informationIntelligent Systems in Retail. Powered by Windows Embedded
Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber
More informationMANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR
FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports
More informationGoing Mobile with. SYSPRO Espresso
Goig Mobile with SYSPRO Espresso SYSPRO Espresso offers the opportuity for you to brig your busiess ito the 21 st Cetury, takig advatage of mobile techology. www.syspro.com Ulock the world with SYSPRO
More informationSecurity and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms
Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access
More informationTruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information
TruVu 360 User Commuity Cotiuous educatio is importat for a successful o-site lubricat program. With ever growig articles, videos, ad structured learig modules, TruVu 360 user commuity is a digital commuity
More informationTHE FUTURE IS EFFICIENT
THE FUTURE IS EFFICIENT KV-S1027C AND KV-S1057C WORKGROUP SCANNER SOLUTIONS Versatile scaig solutios from the world s imagig specialists Paasoic has eared a worldwide reputatio as a leader i imagig techology
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationNational strength. Regional knowledge. Industry expertise.
parterships parterships Natioal stregth. Regioal kowledge. Idustry expertise. Thic is a leadig, idepedet maagemet cosultacy, specialisig i projects. We advise o ad deliver a rage of projects across the
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationWIPO-ESCWA ARAB REGI ONAL CONFERENCE ON INTELLECTUAL PROPERT Y AND ELECTRONIC COM MERCE
WIPO-ESCWA/EC/BEY/ ORIGINAL: Eglish DATE: April 2003 E 03 /Doc. 5a LEBANESE REPUBLIC UNITED NATIONS ECONOMIC AND SOCIAL COMMISSION FOR WESTERN ASIA (ESCWA) WORLD INTELLECTUAL PROPERTY ORGANIZATION WIPO-ESCWA
More informationAddressing SaaS Security
White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address
More informationBuilding the Internet of Everything (IoE) for First Responders
Buildig the Iteret of Everythig (IoE) for First Respoders Robert E. Balfour, Ph.D. Chief Techology Officer V.C.O.R.E. Solutios LLC Bethpage, NY, USA bob.balfour@vcoresolutios.com Abstract The Iteret of
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More information2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter
2017 LEARNING SYSTEM FOR CLTD CERTIFICATION EXAM PREPARATION CONTACT INFORMATION Joi Holema, VP Educatio APICS DC Metro Chapter Email: educatio@apicsdcmetro.org Phoe: 703-430-4075 learcltd.com THE CLTD
More informationThe Value of Peering
The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th
More informationHow Deutsche Telekom protects customer data
KEEPING THE CLOUD OF THINGS Secure How Deutsche Telekom protects customer data CotetS Maximum security with the Cloud of Thigs A secure start CONTENTS 1. THE CLOUD OF THINGS IT All starts with access 1.
More informationInnovative. Pharma-Tech Process Services is a high-energy, schedule-driven, technical service provider. Our innovative consulting services cover
Iovative S o l u t i o s Pharma-Tech Process Services is a high-eergy, schedule-drive, techical service provider. Our iovative cosultig services cover Commissioig, Validatio ad Costructio Period Services
More informationENTERPRISE ARCHITECTURE TRAINING COURSES to-tonex ( ) International: Fax:
ENTERPRISE ARCHITECTURE TRAINING COURSES 1-888-to-toex (1-888-868-6639) Iteratioal: 1-972-735-8686 Fax: 1-972-692-7492 w w w.t o ex.com TONEX Global Traiig Courses & Semiars Customizatio is Our Secret
More informationNext generation IP- based multimedia services on cable TV networks
Iteratioal Telecommuicatio Uio Next geeratio IP- based multimedia services o cable TV etworks Volker Leisse ECCA Pre - coferece draft ITU-T Workshop All Star Network Access Geeva, 2-4 Jue 2004 Outlie o
More informationCORD Test Project in Okinawa Open Laboratory
CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationSTRATEGIC. alliances & Services
STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884
More informationSECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA
ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationIndia Infrastructure. Expo 2018 AN EXPOSITION ON OPPORTUNITIES AND TECHNOLOGIES FOR COLLABORATION IN INFRASTRUCTURE. 24th 26th June 2018, NCPA Mumbai
Miistry of Fiace Govermet of Idia Idia Ifrastructure Expo 2018 AN EXPOSITION ON OPPORTUNITIES AND TECHNOLOGIES FOR COLLABORATION IN INFRASTRUCTURE 24th 26th Jue 2018, NCPA Mumbai O the Occasio of 3rd Aual
More informationSCAN INSPECT TRACK SOLVE
SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.
More information2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com
2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION APICS CSCP Learig System users cosistetly surpass the average CSCP exam pass rate. learcscp.com 2016_APICS_A4_Brochure_parter.idd 1 WHY SEEK
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More informationEFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS
Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &
More informationThe Implementation of the National Probation Service Information Systems Strategy
Home Office The Implemetatio of the Natioal Probatio Service Iformatio Systems Strategy REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 401 Sessio 2000-2001: 26 April 2001 LONDON: The Statioery Office
More informationMindmapping: A General Purpose (Test) Planning Tool
W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage
More informationCA InterTest for CICS r8.5
PRODUCT SHEET: CA INTERTEST FOR CICS CA IterTest for CICS r8.5 CA IterTest for CICS provides testig ad debuggig of IBM CICS Trasactio Server for z/os applicatios writte i COBOL, PL/I, Assembler ad Laguage
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationBE Software Upgrades to ITALYCS 5. It s in the. Software
BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the
More informationComplete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel.
Complete Security Solutios with the Latest Techology ad Law Eforcemet Experieced Persoel www.smartsecuritypros.com ( 3 0 1 ) 9 5 5-9 7 8 2 SPECIAL FEATURES Our Remote Guard VSaaS video surveillace equipmet
More informationGE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III
GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-
More informationOutline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers
Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate
More informationTONEX Global Training Courses & Seminars. Customization is Our Secret. Wireless Communication n. Business Management n
TELECOMMUNICATIONS TRAINING COURSES 1-888 -to-toex (1-888-868-6639) Iteratioal: 1-972-735-8686 Fax: 1-972-692-7492 www.toex.com TONEX Global Traiig Courses & Semiars Customizatio is Our Secret Telecom
More informationProtection of Communication Infrastructures
Protectio of Commuicatio Ifrastructures Chapter Itroductio Threats, Security Goals & Requiremets Threat Aalysis System Security Egieerig Course Objectives & Overview http://www.tu-ilmeau.de/telematik/protectio/
More informationIncorporatingCluster-BasedRelationshipsin Web Rule Language
IcorporatigCluster-BasedRelatioshipsi Web Rule Laguage Mala Mehrotra Pragati Syergetic ResearchIc. Cupertio. CA mm@pragati-ic.com http://www.pragati-ic.com 1 Itroductio The Sematic Web visio requires rule-based
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationPayMobile. Features Overview
PayMobile Features Overview PayMobile Features & Services Subscriber Beefits Immediate oboardig, coveiet ed-user experiece, stimulatio Aget Maagemet Beefits Structure your sales force, supervise, act,
More informationAir Force Data Reference Architecture and Platform
Headquarters U.S. Air Force Air Force Data Referece Architecture ad Platform Ms. Jackie Murray 11 Oct 2018 1 AF Data Challeges Large umber of legacy systems with umerous poit-to-poit iterfaces that are
More informationSFP1215W Forensic Pouch E V A L U A T I O N R E P O R T
E V A L U A T I O N R E P O R T April 2012 NIJ Electroic Crime Techology Ceter of Excellece 550 Marshall St., Suite B Phillipsburg, NJ 08865 www.ectcoe.org NIJ ECTCOE TESTING AND EVALUATION PROJECT STAFF
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More information150 Internet Exchange Points And Beyond!
150 Iteret Exchage Poits Ad Beyod! HKNOG 2018 Hog Kog Walt Wolly, Director Itercoectio Strategy Hurricae Electric AS6939 Who is Walt Wolly? Hurricae Electric AS6939 4 years Amazo AS16509 4 years Director
More informationCAMPUS OF THE SENSES ERLANGEN
CAMPUS OF THE SENSES ERLANGEN Kick-off 15 th September 2017 istock.com/peopleimages Frauhofer IIS / 1 Huma Sesory Perceptio i the Digital Era istock.com/tscho Huma sesory perceptio is barely uderstood
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More information100 Internet Exchange Points And Beyond!
100 Iteret Exchage Poits Ad Beyod! April 2016 LACNIC 25 Havaa Cuba Walt Wolly, Director Itercoectio Strategy Hurricae Electric AS6939 Who is Walt Wolly? Hurricae Electric AS6939 2 years Amazo AS16509 4
More informationThe Birth of the Connected Platform
Jue 2011 ThigWorx Foudatios: The Birth of the Coected Platform Sposored by ThigWorx Cotets Executive Summary 1 The Madate for a Coected Platform 3 Questios Facig Every Busiess 5 The Aatomy of a Coected
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationHuawei FusionHome Smart Energy Solution
Smarter Eergy for a Better Life Copyright Huawei Techologies Co., Ltd.208. All rights reserved. No part of this documet may be reproduced or trasmitted i ay form or by ay meas without prior writte coset
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationDEK Technologies. Through specialisation and innovation, dependability and dedication, we are developing tomorrow s technology.
DEK Techologies Through specialisatio ad iovatio, depedability ad dedicatio, we are developig tomorrow s techology. DEK Story DEK Techologies delivers cuttig edge solutios across a diverse rage of high
More informationJoint Inter-Ministerial Policy Dialogue on ehealth Standardization and Second WHO Forum on ehealth Standardization and Interoperability
Joit Iter-Miisterial Policy Dialogue o ehealth Stadardizatio ad Secod WHO Forum o ehealth Stadardizatio ad Iteroperability 10-11 February 2014 Geeva, Switzerlad Joit Iter-Miisterial Policy Dialogue o ehealth
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationData Protection A Guide to The General Data Protection Regulation for County FAs, National League System and other Football Clubs
Data Protectio A Guide to The Geeral Data Protectio Regulatio for Couty FAs, Natioal League System ad other Football Clubs Itroductio Data protectio laws are evolvig. The Geeral Data Protectio Regulatio
More informationThe Software Delivery Experts. Agile, DevOps & QA Conference
The Software Delivery Experts Agile, DevOps & QA Coferece The Software Delivery Experts Settig Agile-Cetric Release Criteria Aka Doe-Ness or Defiitio of Doe (DoD) Bob Gale Director of Agile Practices Outlie
More informationDesign and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance
Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 10463-10472 Research Idia Publicatios http://www.ripublicatio.com Desig ad Implemetatio of Itegrated Testig
More informationOut the box. dataloggers. easy to configure easy data streaming easy choice. connect, simply configure and go
Out the box dataloggers easy data collectio easily prove easy to cofigure easy data streamig easy choice coect, simply cofigure ad go Rebel Data Loggers - A complete solutio The Rebel rage offers a complete
More informationPanel for Adobe Premiere Pro CC Partner Solution
Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere
More informationUnderstanding the Federal IT Security Professional (FITSP) Certification
Uderstadig the Federal IT Security Professioal (FITSP) Certificatio ISSA-Natioal Capital Chapter Ceter for America Progress September 20th, 2016 Jim Wiggis Executive Director Federal IT Security Istitute
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationOracle Process Manufacturing
Oracle Process Maufacturig Product Developmet Recipe API User s Guide Release 11i Part No. A97387-04 Jauary 2005 Oracle Process Maufacturig Product Developmet Recipe API User s Guide, Release 11i Part
More informationAnti Fraud Services Founding Member Associate Member of..
Ati Fraud Services Foudig Member Associate Member of.. Ati Fraud Overview BTS prides itself o its developmet ad deploymet of its Ati-Fraud services. Its Fraud prevetio services provide a seamless fraud
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationFuture Safe Havens. Jon Crowcroft,
Future Safe Haves Jo Crowcroft, http://www.cl.cam.ac.uk/~jac22 Private Data Ceter->Public Cloud ATI parters e.g. Farr/NHS Scotlad HSBC Motives for public cloud Scale out/cost save Higher Throughput aalytics
More informationLecture 1: Introduction
Lecture 1: Itroductio g Class orgaizatio Istructor cotact Course objectives ad outcomes Lectures outlie Laboratory outlie Gradig system Tetative schedule g Lab schedule g Itelliget sesor systems (ISS)
More information