Protection of Communication Infrastructures
|
|
- Reginald Sparks
- 6 years ago
- Views:
Transcription
1 Protectio of Commuicatio Ifrastructures Chapter Itroductio Threats, Security Goals & Requiremets Threat Aalysis System Security Egieerig Course Objectives & Overview A Short Advertisemet Before We Begi... :o) There is a additioal course etitled Simulative Evaluatio of Protocol Fuctios (project semiar, SWS) which is desiged to give you a hads-o experiece with etwork protocol fuctios ad simulatio studies: Itroduces a simulatio eviromet ad lets you add protocol fuctioality Studied protocol fuctios: forwardig, routig, (iterface queues), coectio setup, error-, flow- ad cogestio cotrol Requires good programmig skills Kowledge of C++ is a asset (but ot a pre-requisite) Allows you to obtai i-depth kowledge of topics covered i Telematics I ad the techiques ad art of simulatio studies because afterwards you did it! :o) Itroductio ad iscriptio: ,5:00 6:00, Room Z 0
2 Example: Evaluatio of TCP Cogestio Cotrol Motivatio: A Chagig World Mobile commuicatio etworks ad ubiquitous availability of the global Iteret have already chaged dramatically the way we commuicate, coduct busiess, ad orgaize our society With curret research ad developmets i sesor etworks ad pervasive computig, we are eve creatig a ew etworked world However, the beefits associated with iformatio ad commuicatio techology imply ew vulerabilities Icreasig depedece of moder iformatio society o availability ad secure operatio of commuicatio services
3 What is a Threat i a Commuicatio Network? Abstract Defiitio: A threat i a commuicatio etwork is ay possible evet or sequece of actios that might lead to a violatio of oe or more security goals The actual realizatio of a threat is called a attack Examples: A hacker breakig ito a corporate computer Disclosure of s i trasit Someoe chagig fiacial accoutig data A hacker temporarily shuttig dow a website Someoe usig services or orderig goods i the ame of others... What are security goals? Security goals ca be defied: depedig o the applicatio eviromet, or i a more geeral, techical way 5 Security Goals Depedig o the Applicatio Eviromet Public Telecommuicatio Providers: Protect subscribers privacy Restrict access to admiistrative fuctios to authorized persoel Protect agaist service iterruptios Corporate / Private Networks: Protect corporate / idividual privacy Esure message autheticity Protect agaist service iterruptios All Networks: Prevet outside peetratios (who wats hackers?) Sometimes security goals are also called security objectives 6
4 Security Goals Techically Defied Cofidetiality: Data trasmitted or stored should oly be revealed to a iteded audiece Cofidetiality of etities is also referred to as aoymity Data Itegrity: It should be possible to detect ay modificatio of data This requires to be able to idetify the creator of some data Accoutability: It should be possible to idetify the etity resposible for ay commuicatio evet Cotrolled Access: Oly authorized etities should be able to access certai services or iformatio Availability: Services should be available ad fuctio correctly 7 Threats Techically Defied Masquerade: A etity claims to be aother etity Eavesdroppig: A etity reads iformatio it is ot iteded to read Authorizatio Violatio: A etity uses a service or resources it is ot iteded to use Loss or Modificatio of (trasmitted) Iformatio: Data is beig altered or destroyed Deial of Commuicatio Acts (Repudiatio): A etity falsely deies its participatio i a commuicatio act Forgery of Iformatio: A etity creates ew iformatio i the ame of aother etity Sabotage (Deial of Service): Ay actio that aims to reduce the availability ad / or correct fuctioig of services or systems 8
5 Threats ad Techical Security Goals Techical Security Goals Masquerade Eavesdroppig Authorisatio Violatio Cofidetiality x x x Geeral Threats Loss or Modificatio of (trasmitted) iformatio Deial of Commuicatio acts Forgery of Iformatio Data Itegrity x x x x Accoutability x x x x Sabotage (e.g. by overload) Availability x x x x Cotrolled Access x x x Threats are ofte combied i order to perform a attack! 9 Architectural View of our Object to be Protected Network Edsystem Edsystem 5 5 Applicatio 55 Trasport Network Network Data Lik Data Lik Physical Physical Commuicatio i ed Protocol Architectures 0
6 Security Aalysis of ed Protocol Architectures Edsystem (Iitiator) Network Edsystem (Respoder)??? Dimesio : At which iterface could a attack take place? Security Aalysis of ed Protocol Architectures? 55 Applicatio 55? Trasport? Network Network? Data Lik Data Lik? Physical Physical Dimesio : I which layer could a attack take place?
7 Systematic Threat Aalysis o the Message Level A systematic security aalysis of a layered protocol architecture has to cosider the followig attackig techiques: Passive attacks: Eavesdroppig Active attacks: Delay of PDUs (Protocol Data Uits) Replay of PDUs Deletio of PDUs Modificatio of PDUs Isertio of PDUs Successful lauch of oe of the above attacks requires: There are o detectable side effects to other commuicatios (coectios / coectioless trasmissios) There are o side effects to other PDUs of the same coectio / coectioless data trasmissio betwee the same etities Security Aalysis of Commuicatio Ifrastructures O the precedig slides, the aalysis was basically cocetrated o potetial attacks o the trasmissio of iformatio Of equal importace, however, are attacks agaist the systems, that are part of or makig use of a commuicatio etwork: Ed systems Routers Importat ifrastructure servers: DNS, , WWW, file servers, etc. We, therefore, have to exted our aalysis framework: Dimesio S.: Which system could be attacked? Dimesio S.: Which compoet of the system is attacked (OS, protocol stack, applicatio process, etc.)? However, this itroduces a ew difficulty: A active etity (system) offers much more differet attackig opportuities tha a passive data object (like a PDU) It is, therefore, much harder to coduct a systematical aalysis
8 Towards Systematic Threat Aalysis Oe ot very systematic approach is producig of arbitrary threat lists by ay ad-hoc braistormig method Example: Hospital Iformatio System Corruptio of patiet medical iformatio Corruptio of billig iformatio Disclosure of cofidetial patiet iformatio Compromise of iteral schedules Uavailability of cofidetial patiet iformatio... Drawbacks of this approach: Questioable completeess of idetified threats Lack of ratioale for idetified threats other tha experiece Potetial icosistecies (e.g. disclosure vs. uavailability of cofidetial patiet iformatio i the example above) 5 Threat Trees: Oe Systematic Threat Aalysis Approach Defiitio: threat tree A threat tree is a tree with: odes describig threats at differet levels of abstractios, ad subtrees refiig the threat of the ode they are rooted at, where the child odes of oe ode give a complete refiemet of the threat represeted by the paret ode Techique for establishig threat trees: Start with a geeral abstract descriptio of the complete set of threats that exist for a give system (e.g. security of system X compromised ) Iteratively itroduce detail by gradually refiig the descriptio with care Each itroduced ode may itself become the root of a subtree further describig the threat represeted by the ode Evetually, each leaf ode of the tree provides a descriptio of a threat that ca be used for a (less arbitrary) threat list The mai idea of this techique is to postpoe the creatio of (arbitrary) treat lists as much as possible 6
9 Example: A Hospital Iformatio System Threat Tree Hospital System Threats Patiet Medical Iformatio No Patiet Medical Iformatio Life Threateig No Life Threateig Billig No Billig Disclosure Itegrity Deial of Service... It is importat that at each level of refiemet the child odes of a ode maitai demostrable completeess so that oe ca be cofidet that othig has bee missed (source: [Amo9]) 7 Iferrig Composed Threat i Threat Trees The child odes of oe ode ca actually be i differet relatios to their paret ode with the two most commo relatios beig: Disjuctio Cojuctio Threat Threat OR AND Subthreat Subthreat Subthreat Subthreat These relatios ca be used to ifer composed threat: Augmet odes with effort estimatios (e.g. easy, moderate, high) Ifer effort of a OR-related composed threat as the lowest effort value of its child odes (the attacker will most likely take the easy way...) For AND-related composed threats, the highest effort is iferred 8
10 Supportig System Security Egieerig with Threat Trees Whe augmeted with appropriate attributes (e.g. estimated criticality ad attacker effort for idividual threats), threat trees ca help to gai isight where to sped resources to decrease the overall system s vulerability: Threat OR Threat OR Subthreat A Criticality = Effort = Subthreat B Criticality = 6 Effort = Subthreat A Criticality = Effort = Subthreat B Criticality = 6 Effort = Risk = Risk = 6 Risk = Risk = The secod threat tree re-evaluates risk after some protective measure has bee take to icrease the attacker s effort for subthreat B I the above example, risk is assessed with the followig formula: Risk = Criticality / Effort 9 A High Level System Security Egieerig Process Specify system architecture: Idetify compoets ad iterrelatios Idetify threats, vulerabilities ad attack techiques: The threat tree techique provides help for this step Estimate compoet risks by addig attributes to the threat tree: However, removig subjectivity from iitial assessmets is ofte impossible ad other attributes tha criticality ad effort (e.g. risk of detectio) might have to be cosidered as well Prioritize vulerabilities: Takig ito accout the compoets importace Idetify ad istall safeguards: Apply protectio techiques to couter high priority vulerabilities Perform potetial iteratios of this process Re-assess risks of the modified system ad decide, if more iteratios are required 0
11 A High Level Model for Iteret-Based IT-Ifrastructure Private Networks Public Iteret Mobile Commuicatio Networks... Access Network Web-Server Network Maagemet DNS Server... ISP Networks Support Ifrastructure A High Level Threat Tree for Iteret-Based IT-Ifrastructure
12 Couterig Attacks: Three Priciple Classes of Actio Prevetio: All measures take i order to avert that a attacker succeeds i realizig a threat Examples: Cryptographic measures: ecryptio, computatio of modificatio detectio codes, ruig autheticatio protocols, etc. Firewall techiques: packet filterig, service proxyig, etc. Prevetive measures are by defiitio take before a attack takes place Detectio: All measures take to recogize a attack while or after it occurred Examples: Reactio: Recordig ad aalysis of audit trails O-the-fly traffic moitorig All measures take i order react to ogoig or past attacks Safeguards Agaist Iformatio Security Threats Physical Security: Locks or other physical access cotrol Tamper-proofig of sesitive equipmet Evirometal cotrols Persoel Security: Idetificatio of positio sesitivity Employee screeig processes Security traiig ad awareess Admiistrative Security: Cotrollig import of foreig software Procedures for ivestigatig security breaches Reviewig audit trails Reviewig accoutability cotrols Emaatios Security: Radio Frequecy ad other electromagetic emaatios cotrols Referred to as TEMPEST protectio
13 Safeguards Agaist Iformatio Security Threats Media Security: Safeguardig storage of iformatio Cotrollig markig, reproductio ad destructio of sesitive iformatio Esurig that media cotaiig sesitive iformatio are destroyed securely Scaig media for viruses Lifecycle Cotrols: Trusted system desig, implemetatio, evaluatio ad edorsemet Programmig stadards ad cotrols Documetatio cotrols Computer / System Security: Protectio of iformatio while stored / processed i a system Protectio of the computig devices / systems themselves Commuicatios Security: Protectio of iformatio durig trasport from oe system to aother Protectio of the commuicatio ifrastructure itself 5 Commuicatios Security: Some Termiology Security Service: A abstract service that seeks to esure a specific security property A security service ca be realised with the help of cryptographic algorithms ad protocols as well as with covetioal meas: Oe ca keep a electroic documet o a floppy disk cofidetial by storig it o the disk i a ecrypted format as well as lockig away the disk i a safe Usually a combiatio of cryptographic ad other meas is most effective Cryptographic Algorithm: A mathematical trasformatio of iput data (e.g. data, key) to output data Cryptographic algorithms are used i cryptographic protocols Cryptographic Protocol: A series of steps ad message exchages betwee multiple etities i order to achieve a specific security objective 6
14 Security Services Overview Autheticatio The most fudametal security service which esures, that a etity has i fact the idetity it claims to have Itegrity I some kid, the small brother of the autheticatio service, as it esures, that data created by specific etities may ot be modified without detectio Cofidetiality The most popular security service, esurig the secrecy of protected data Access Cotrol Cotrols that each idetity accesses oly those services ad iformatio it is etitled to No Repudiatio Protects agaist that etities participatig i a commuicatio exchage ca later falsely dey that the exchage occurred 7 Course Objectives The course Network Security (held every fall term) focuses o: Itroductio to iformatio security techology (icl. cryptology) Network security protocols to esure: Etity autheticatio Data cofidetiality & data itegrity Some established techiques to realize access cotrol i etworks This course takes a complemetary view o the followig aspects: Threats to ad measures for esurig availability Threats ad measures cocerig systems (beyod pure etwork security protocols which are more targetig trasmissio security) Measures for itrusio detectio ad respose Additioally, some case studies to be performed by studets (talks, potetially based o experimetatio) shall: provide backgroud ad guidelies o securig specific applicatios add a practical perspective to the gathered coceptual kowledge 8
15 Prelimiary Course Overview. Itroductio. Security Aware System Desig ad Implemetatio. Deial-of-Service Attacks ad Coutermeasures. Routig 5. DNS Security 6. Iteret Firewalls 7. Itrusio Detectio ad Respose 8. Security i Sesor Networks (Challeges i Costrait Eviromets) 9. Securig Group Commuicatios (if time permits) 0. Joit Discussio: Ope source vs. proprietary software: will ope source lead to more secure systems? 9 Geeral Course Bibliography [Amo9] E. Amoroso. Fudametals of Computer Security Techology. Pretice Hall. 99. [Amo99] E. Amoroso. Itrusio Detectio. Itrusio.Net Books, 999. [Cha95] Bret Chapma ad Elizabeth Zwicky. Buildig Iteret Firewalls. O'Reilly, 995. [For9b] Warwick Ford. Computer Commuicatios Security - Priciples, Stadard Protocols ad Techiques. Pretice Hall. 99. [Gar96] Simso Garfikel ad Gee Spafford. Practical Iteret & Uix Security. O'Reilly, 996. [GW0] M.G. Graff, K.R. va Wyck. Secure Codig. O Reilly, 00 [NN0] S. Northcutt, J. Novak. Network Itrusio Detectio - A Aalyst s Hadbook. secod editio, New Riders, 00. [SR] G. Schäfer, M. Rossberg. Netzsicherheit - dpukt.verlag, 676 Seite, Gebude, 9,90 Euro, 0. [VM0] J. Viega, G. McGraw. Buildig Secure Software. Addiso-Wesley, 00. 0
Security of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationResource Public Key Infrastructure for Secure Border Gateway Protocol
Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationHow Deutsche Telekom protects customer data
KEEPING THE CLOUD OF THINGS Secure How Deutsche Telekom protects customer data CotetS Maximum security with the Cloud of Thigs A secure start CONTENTS 1. THE CLOUD OF THINGS IT All starts with access 1.
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationWYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET
WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56
More informationThe CCITT Communication Protocol for Videophone Teleconferencing Equipment
The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More informationGoals of this Lecture Activity Diagram Example
Goals of this Lecture Activity Diagram Example Object-Orieted Aalysis ad Desig - Fall 998 Preset a example activity diagram Ð Relate to requiremets, use cases, ad class diagrams Also, respod to a questio
More informationCA Top Secret r14 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationCustomer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More informationFirewall and IDS. TELE3119: Week8
Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad
More informationGE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III
GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationModern Systems Analysis and Design Seventh Edition
Moder Systems Aalysis ad Desig Seveth Editio Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Desigig Databases Learig Objectives ü Cocisely defie each of the followig key database desig terms: relatio,
More informationSERIAL COMMUNICATION INTERFACE FOR ESA ESTRO
Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0
More information1&1 Next Level Hosting
1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationData Protection: Your Choice Is Simple PARTNER LOGO
Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected
More informationIn this chapter, you learn the concepts and terminology of databases and
A Itroductio to Database Developmet I this chapter, you lear the cocepts ad termiology of databases ad how to desig the tables that your forms ad reports will use. Fially, you build the actual tables used
More informationProbability of collisions in Soft Input Decryption
Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More information% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationCORD Test Project in Okinawa Open Laboratory
CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationAddressing SaaS Security
White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address
More informationOutline n Introduction n Background o Distributed DBMS Architecture
Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationOracle Process Manufacturing
Oracle Process Maufacturig Product Developmet Recipe API User s Guide Release 11i Part No. A97387-04 Jauary 2005 Oracle Process Maufacturig Product Developmet Recipe API User s Guide, Release 11i Part
More informationMindmapping: A General Purpose (Test) Planning Tool
W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationGoals of the Lecture UML Implementation Diagrams
Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More informationDesign and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance
Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 10463-10472 Research Idia Publicatios http://www.ripublicatio.com Desig ad Implemetatio of Itegrated Testig
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002
ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationTransitioning to BGP
Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April
More informationTraditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]
Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table
More informationEE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control
EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,
More informationEvaluation of Distributed and Replicated HLR for Location Management in PCS Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationFundamentals of Communication Networks
Politecico di Milao Scuola di Igegeria Idustriale e dell Iformazioe Fudametals of Commuicatio Networks Alessadro Redodi Teacher o Alessadro Redodi o Office: Dip. di Elettroica, Iformazioe e Bioigegeria
More informationTerm Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.
CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig
More informationUniversity of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani
Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442
More informationBaan Finance Financial Statements
Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace
More informationTrusted Design in FPGAs
Trusted Desig i FPGAs Mark Tehraipoor Itroductio to Hardware Security & Trust Uiversity of Florida 1 Outlie Itro to FPGA Architecture FPGA Overview Maufacturig Flow FPGA Security Attacks Defeses Curret
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More informationCyber Risk Mitigation for Smart Cities
Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationSECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA
ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter
More informationBasic Design Principles
+ Basic Desig Priciples + Assigmet 2: Your studet web site 1. Baer 2. Your ame 3. Your accout umber 4. A lik to aother web page, preferably oe useful to you i this class 5. A photo, preferably of you 6.
More informationSchema for the DCE Security Registry Server
Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.
More informationSecure Software Upload in an Intelligent Vehicle via Wireless Communication Links
Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,
More informationAdaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1
Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics
More informationCIS 121. Introduction to Trees
CIS 121 Itroductio to Trees 1 Tree ADT Tree defiitio q A tree is a set of odes which may be empty q If ot empty, the there is a distiguished ode r, called root ad zero or more o-empty subtrees T 1, T 2,
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationLoop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation
eea les-sig-bricks 1 Loop Emulatio Service Protocols over ATM Eea LES-SIG-Bricks is a complete implemetatio of the Loop Emulatio Service usig AAL2 stadard (AF-VMOA-0145.000) protocols. Eea LES-SIG-Bricks
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies
More informationSecurity and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms
Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The
More informationSCAN INSPECT TRACK SOLVE
SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.
More informationModeling a Software Architecture. Paolo Ciancarini
Modelig a Software Architecture Paolo Ciacarii Ageda Describig software architectures Architectural frameworks Models based o architectural laguages Models based o UML Mai architectural views 2 Why documet
More informationSRx. HD/SD Dual Input Diversity COFDM Receiver. Features. Options. Accessories. Applications
HD/SD Dual Iput Diversity COFDM Receiver Features Dual iput maximum ratio combiig diversity receiver Umatched adjacet chael performace Superior broadcast grade video MPEG-4 Part-10/H.264 2 moo audio chaels
More informationLecture 1: Introduction
Lecture 1: Itroductio g Class orgaizatio Istructor cotact Course objectives ad outcomes Lectures outlie Laboratory outlie Gradig system Tetative schedule g Lab schedule g Itelliget sesor systems (ISS)
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationChapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,
More informationHeaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationThe Value of Peering
The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th
More informationUsing VTR Emulation on Avid Systems
Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit
More informationSecurity Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team
Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More information