Privacy, Security and Trust in P2P environments: A Perspective

Size: px
Start display at page:

Download "Privacy, Security and Trust in P2P environments: A Perspective"

Transcription

1 Privacy, Security and Trust in P2P environments: A Perspective Anirban Mondal Masaru Kitsuregawa Institute of Industrial Science, University of Tokyo, JAPAN. {anirban, kitsure}@tkl.iis.u-tokyo.ac.jp Abstract The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users on a global-scale. Given the inherently untrustworthy nature of P2P networks, this paper provides a perspective concerning trust, privacy and security issues in P2P networks. Additionally, we discuss the applicability of the P2P paradigm to new application domains, the aim being to ensure that the power of the P2P paradigm goes well beyond P2P file-sharing interactions. 1. Introduction The ever-increasing popularity of the Peer-to-Peer (P2P) paradigm of computing has resulted in huge amounts of data being shared on a global-scale in P2P networks. The strength of the P2P paradigm stems from its capability of efficiently harnessing the power of a large number of peers that may be geographically distributed. Incidentally, peers can join or leave the system without any intervention from a centralized server, which facilitates seamless integration of any number of new nodes (peers) to existing systems. Understandably, the decentralized nature of P2P networks facilitates scalability. Moreover, P2P networks do not have a single point of failure. However, the downside is that P2P environments are inherently untrustworthy in nature since P2P users generally have no idea about whom they are interacting with, and the notion of accountability does not typically exist in P2P environments. Thus, it becomes a necessity to adequately address P2P trust, privacy and security issues in order to optimally exploit the power of the P2P paradigm. Incidentally, the P2P paradigm is applicable to two types of environments: 1. A large number of distributively-owned peers: Such environments are characterized by peers that are largely unknown to each other. The notion of accountability is generally non-existent in such cases. Examples include Kazaa [8], Gnutella [5] and Morpheus [12]. 2. Peers that are owned by the same organization: These environments generally incorporate the existence of accountability and organizational controls e.g., a particular organization may manage its computer systems in a P2P manner to facilitate seamless integration of new nodes into its existing systems. This paper primarily focusses on environments associated with Case 1, although some discussions in this paper would also be applicable to environments involving Case 2. Since Case 2 incorporates accountability, it becomes easier for a peer to trust other peers. In contrast, for Case 1, lack of accountability implies that trust, privacy and security issues need to be addressed in comprehensive detail. Incidentally, issues concerning trust, security and privacy arise in several centralized and distributed computing environments. However, in the P2P context, these issues become significantly more challenging than in the case of traditional domains due to distributive ownership, lack of centralized control and lack of global knowledge. Hence, many open questions still remain in this research area. The main focus of this work is to provide our perspective concerning trust, privacy and security issues in P2P networks. We also discuss the applicability of the P2P paradigm to new application domains because we strongly believe that the power of the P2P paradigm could be exploited to obtain significantly greater user benefits than merely audio and video file-sharing. As such, this paper is not intended to be a survey, hence we have just referred to existing schemes in this area briefly without delving into specific details. The remainder of this paper is organized as follows. Section 2 discusses our perspectives concerning trust, security and privacy in P2P networks. Section 3 details advanced P2P applications, which we believe will maximize user ben-

2 efits from P2P systems. Section 4 briefly alludes to existing works in this area. Finally, Section 5 summarizes the paper. 2. Perspectives on Trust, Security and Privacy This section presents our perspectives concerning trust, security and privacy issues in P2P network. In some sense, trust holds the key to security and privacy, hence our perspectives are primarily from the viewpoint of trust. We shall henceforth use the terms peer and user interchangeably Quantifying trust in P2P environments Quantifying the notion of trust in P2P environments is extremely difficult primarily because a particular user generally has no idea about other users. In reality, the trustworthiness of a peer depends heavily upon the context. For example, a peer A may feel comfortable with downloading a file from a peer B, but A may not be willing to share his own medical data with B. Thus, A trusts B in the context of file downloads, but does not trust B in the context of medical data sharing. In the same vein, a peer X could provide very high-quality music files and low-quality of scientific documents. In other words, X can be trusted more in the context of music files than in the context of scientific documents. Furthermore, X could provide high-quality music files for classic songs and low-quality music files for new songs i.e., even for sharing similar kind of data, the amount of trust that could be placed in X could differ significantly. The implication is that quantifying a single trust measure for a peer is incomplete and does not reflect the reality of a diverse range of P2P interactions. Thus, several trust values could be assigned to a single peer, one value for each context to better reflect reality. Even when trust values of a peer have been specified w.r.t. a given context, P2P users should still take such values with a grain of salt since accountability and roll-back ability do not exist in case of P2P environments. Given a peer P, trust values for P for different contexts could be computed by considering other peers opinions about P s previous behaviours. However, the following practical issues arise: 1. Does expertise differ across users for a given context? 2. How to objectively assign weights to user opinions? 3. How to differentiate perception of trust across users? Question 1 above suggests that since different users have varying levels of expertise in a given context, it would not be reasonable to assign the same weight to all the peers opinions. This leads to Question 2. If users themselves decide the weight of their opinions, it is clear that objectivity would be lost since there would be too much dependence on user perception of their own expertise. On the other hand, such weights being determined by other users would bring us back to Question 1. Furthermore, as Question 3 indicates, users have varying ways of perceiving trust i.e., a one-time bad-quality file download from a peer P may be acceptable to some peers, while other peers may start viewing P as absolutely untrustworthy. From Questions 1, 2 and 3, we can understand that trust values computed by existing P2P trust schemes may not adequately reflect the actual trustworthiness of a peer. The complexity of this issue is further exacerbated by a wide variety of practical factors e.g., a peer posing as another peer, colluding peers, significant changes in behavioural patterns of peers and so on Accountability in P2P networks Trust is closely related to accountability. If any breach of trust occurs, the entity causing the breach of trust needs to be held accountable, thereby discouraging malicious behaviour in the system. However, in case of P2P networks, it is practically extremely challenging to ensure accountability due to the following reasons: 1. Identifying the peer who caused a breach of trust could be difficult in practice. 2. Even when it is possible to identify malicious peers, there is often extremely limited recourse (if any at all) to legal action. Now let us take a closer look at the above points. Identifying malicious peers could be difficult because such peers could easily pose as other peers. While peers could be monitored for detecting malicious behaviour in the network, it is important to remember that the immense popularity of P2P networks stems from the principles of anonymity and freedom, which the P2P paradigm embodies. Consequently, monitoring peers would run counter to the very principles which are the foundations of P2P computing. In the absence of monitoring, locating the origin of malicious behaviour may be practically impossible, especially given the scale of P2P networks. As a single instance, if a peer downloads a virus-infected file from another peer, the source of the file could have been any peer which once contained a copy of the file. Since tracing back the paths of all file downloads is too expensive in large-scale P2P networks and infringes upon peer privacy, we can intuitively understand that locating the origin of malicious behaviour is a problem in itself. Understandably, when legal systems all over the world were created, the concept of P2P computing, as we know it today, did not even exist. Hence, it is not surprising that legal experts could not really reach a consensus on the kind of P2P-related activities, which would allow the victim to

3 seek legal action. The recent spate of court proceedings between P2P systems and music corporations related to the sharing of music files in P2P systems has highlighted several grey areas in current laws when applied to P2P filesharing. These grey areas exist due to lack of P2P-specific laws. Moreover, creating P2P-specific laws would require consolidation of knowledge in two orthogonal domains i.e., P2P computing and law. This becomes challenging because P2P computing experts and legal experts generally have limited knowledge about each other s fields. Interestingly, P2P technologies have been growing at a fast pace, which makes it very difficult for legal systems to keep pace with the latest developments in P2P computing. In such cases, the scarcity of legal precedents concerning the P2P paradigm makes it even more challenging for legal experts to extrapolate current laws to P2P-specific scenarios. Finally, P2P systems transcend geographical and political boundaries, which further exacerbates legal issues. For example, if a peer located in a country X behaves maliciously with a peer located in a country Y, how would the victim bring the perpetrator to justice? Observe that most countries around the world do not even have P2Pspecific laws. For the relatively few countries, which have at least some P2P-specific laws, it is clear that those laws are quickly becoming obsolete due to the emergence of new and innovative P2P computing technologies. In our opinion, the notion of accountability should not be pro-actively incorporated into P2P networks primarily because accountability contradicts the basic tenets of the P2P paradigm. Till date, there have been millions of P2P users and a mind-boggling number of file downloads across P2P networks. In contrast, the number of reported cases of malicious peers have been relatively very few. This alone is excellent evidence that individual peers do not generally try to harm each other, even when the notion of accountability does not exist. We believe that P2P users should be educated about the risks involving the usage of P2P networks so that each individual user can decide the kind of P2P interactions with which he is comfortable Will users trust P2P systems for advanced data sharing applications? First, let us examine the following questions: 1. How many users would be willing to trust a (computer) system-generated trust value of a peer they have otherwise no idea about? 2. To what extent can the past trust-related behaviour of a peer be extrapolated to measure its future trustworthiness? Incidentally, the vast majority of P2P users cannot be expected to have even a preliminary understanding of how the trust values are generated for each peer. Moreover, a given peer may know virtually nothing about other peers. Thus, it becomes extremely difficult for a user to trust another user based on only the system-generated trust values. A few hundred years ago, it would have been unimaginable for humans to store their financial resources and valuables in a bank. But, currently, we feel that banks are safe. This can be attributed to evolution of trust in the banking system. In other words, since we have used banks for a long time without encountering any major loss, our trust in the banking system has increased over time to the point that we feel almost absolutely safe with the current banking system. We believe that the same would also be applicable in case of P2P systems in the future. Currently, P2P systems are still in their infancy. However, over the course of time, the trust among P2P users would evolve probably to the extent that users would be comfortable with sharing even some of their non-sensitive private information with other P2P users. User perception of P2P-related risk plays a major role in the types of data that a user would be willing to share in a P2P environment. Interestingly, the perception of risk associated with P2P systems may differ significantly among users. For example, a paranoid user may not be willing to accept even small risks (e.g., sharing non-copyrighted music files), while some users may feel comfortable with sharing some of their private medical information. This can be attributed to the fact that users have varying perceptions concerning the sensitivity of different kinds of data. Interestingly, many users may not even be aware of the risks associated with sharing their data in P2P networks. In essence, we are looking at a spectrum of P2P-related risk in which the user typically selects activities for which he perceives the risk to be low enough to be reasonably acceptable to him. Notably, P2P systems thrive on the principles of freedom, hence users are free to decide upon the kinds of data that they would be willing to share in a P2P system. Thus, there should be no system-imposed restrictions concerning the kinds of data that should be shared in a P2P network. Incidentally, user expectation of P2P systems is also an important factor. Since P2P systems are usually free and the data is generally not authenticated by any authority figure, users do not usually expect 100% accurate data or the latest versions of documents or the highest quality of mp3 files and videos from P2P systems. Generally speaking, most P2P users understand that they are probably not going to obtain data with quality guarantees from P2P systems. In realworld scenarios, as long as the quality of data is reasonable, it would suffice for the vast majority of users. Moreover, if a user is not satisfied with the quality of a file (e.g., music mp3 file) that he has downloaded from a P2P system, he can always download the same music file from possibly several different sources, until he finds one which meets his quality

4 requirements. We believe that user expectation of P2P systems is significantly lower than that of user expectation of dedicated servers which guarantee good data quality albeit at a price. 3 Towards advanced P2P applications This section presents advanced P2P applications to suggest how the power of the P2P paradigm could be harnessed to improve overall user benefits from P2P systems. We consider both static and mobile P2P domains Applications for static P2P systems Currently, P2P systems are primarily used for sharing music and video files. The question which arises is: Should a powerful computing paradigm such as P2P be limited to just file-sharing applications? Since P2P systems provide a large-scale and cost-effective mechanism for data sharing in general, several different kinds of data can also be shared by means of P2P systems. For example, different users could store information concerning their experiences with searching for a house to buy in a given spatial location. Since buying a house requires significant investment, we can intuitively understand that users would like to obtain every possible piece of information before making their final decision. Since P2P systems typically have a large number of users, users would be able to exploit a considerable large pool of experiences, thereby facilitating effective decisionmaking. Notably, our work in [10] has investigated the sharing of spatial data in P2P systems primarily from the perspective of indexing, the main objective being to support real estate applications. While such information may also be available from multiple websites associated with real-estate agents, the information in the websites are provided by real-estate agents who wish to sell. In contrast, the comments in P2P systems are from the experience of real users, who are all looking to buy, the implication being that such comments can be reasonably expected to be significantly more useful as well as realistic from the user perspective. Similarly, different users organizing different events (such as international conferences) could pool their experiences by sharing their document files by means of P2P systems. In the same vein, different people suffering from the same disease could share information concerning several kinds of medical treatments with each other. Users can easily remain anonymous by not mentioning any personally identifiable information in that file. In practical scenarios, determining the source of any given file in a P2P system (in the absence of personally identifiable information in the shared file) is extremely challenging primarily because several different peers could store replicas of the same file and replication can occur aggressively, especially for hot files. Consequently, user privacy would not be a significant concern in such cases. A legitimate concern with using P2P-related data is that some users may intentionally or unintentionally provide inaccurate information. This concern also arises for the Internet since not all websites provide correct information. However, even with inaccuracies, the vast majority of websites do provide the big picture reasonably well. The same would most likely also be applicable to P2P systems. Notably, we do not claim that P2P interactions should be used as a substitute for services provided by real-estate agencies, event organizers and medical personnel. Instead, we believe that P2P interactions should be used to complement the above services to deliver the best possible information to users Applications for Mobile P2P systems Proliferation of mobile devices (e.g., laptops, PDAs, mobile phones) coupled with the ever-increasing popularity of the P2P paradigm strongly motivate Mobile-P2P (M- P2P) network applications such as customers in a shopping mall sharing information about the cheapest available Levis jeans and swapping shopping catalogues on-the-fly using mobile devices [11]. During lunch-time, mobile users could share information about the cheapest price of steak across different nearby restaurants and exchange restaurant menus with each other. Visitors to a museum could request images/video-clips of different rooms of the museum to decide which room they will visit first. They could share songs and historical data about the museum. They could even request the museum s path information from other visitors as in virtual reality applications. Such P2P interactions among mobile users are generally not freely supported by existing mobile communication infrastructures. Notably, in these applications, the mobile devices are distributively owned and accountability is typically non-existent. Thus, trust, security and privacy issues would need to be adequately addressed for such applications to work effectively in practice. M-P2P network applications could also be collaborative in nature such as zoological and disaster-recovery applications. These applications are collaborative in the sense that all the mobile users are working towards a common goal. Imagine a group of zoologists looking for habitat information about amoeba in a remote forest, where communication infrastructures (e.g., base stations) do not exist. They could share data with each other using mobile devices in a P2P fashion. Notably, data being shared must be validated by an authority figure (e.g., a supervisor) to prevent collection of erroneous data. Similarly, workers in disaster recovery scenarios (e.g., earthquakes, tsunamis) also need to share data (e.g., number of injured people, number of fatalities) with each other using mobile devices. For such

5 applications, trust, security and privacy issues would not be a significant consideration due to the controlled nature of the environment, which facilitates accountability. 4. Related Work Research concerning privacy, security and trust in P2P systems draws upon the expertise of the distributed computing community as well as the sociology community. Since trust is generally related to reputation, several works [4, 13, 9] have examined reputation-related issues in general computing environments. In the context of P2P environments, reputation-based trust issues have been investigated in [14, 1, 3, 7]. Even though the proposed trust models in these works make significant contributions to trustrelated issues in P2P systems, it is important to note that none of these models can be expected to provide absolute trust guarantees essentially because the P2P environment is itself untrustworthy and also due to the fact these models have certain underlying assumptions, which may not always hold good in practical scenarios. As a single instance, the approach in [7] assumes certain pre-trusted peers in the network. However, this assumption may not be valid in case of large-scale massively distributed P2P systems, where the availability of pre-trusted peers would be highly unlikely. For detailed investigation of privacy issues in P2P systems, we refer interested readers to the work in [6]. Furthermore, the proposal in [2] can be referred to for a comprehensive discussion concerning anonymity issues in P2P systems. 5. Conclusion This paper has examined our perspectives on open research issues concerning trust, security and privacy in P2P environments with the objective of identifying future P2P applications. We summarize our perspectives on future P2P applications as follows: 1. Future applications on P2P systems are more likely to depend upon user perception of risk associated with using such applications. 2. Over the course of time and as larger number of users use such applications, user trust will grow. This would, in turn, significantly improve the popularity of these applications. 3. Effective trust models can facilitate in improving user trust in P2P applications. It is precisely here that research on trust, security and privacy issues can contribute to more powerful P2P applications. 4. Altruistic behaviour definitely exists in P2P environments. If this was not the case, P2P systems would never have become popular in the first place. Hence, trust models for P2P systems should not be too strict lest they scare away the very users that they are trying to attract. 5. Trust, security and privacy issues should be researched extensively for P2P networks, while considering the possibilities of future P2P applications, which would potentially allow users to optimally exploit the power of the P2P paradigm. 6. Trade-offs involving the importance of user freedom and the need for addressing trust, security and privacy issues should be considered meticulously, the objective being to provide P2P users adequate freedom at minimal estimated risks. In conclusion, we believe that P2P applications should be able to go well beyond the traditional file-sharing applications, as long as trust, security and privacy issues are adequately addressed for new application domains. References [1] K. Aberer and Z. Despotovic. Managing trust in a peer-topeer information system. Proc. CIKM, [2] I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. Proc. ICSI Workshop on Design Issues in Anonymity and Unobservability, [3] F. Cornelli, E. Damiani, S. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a P2P network. Proc. WWW, [4] C. Dellarocas. The digitization of word-of-mouth: Promise and challenges of online reputation mechanism. Proc. Management Science, 49(10), [5] Gnutella. [6] N. Good and A. Krekelberg. Usability and privacy: a study of kazaa P2P file-sharing. Proc. CHI, [7] S. Kamvar, M. Scholsser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. Proc. WWW, [8] Kazaa. [9] D. Kreps and R. Wilson. Reputation and imperfect information. Proc. Journal of Economic Theory, 27, [10] A. Mondal, Y. Lifu, and M. Kitsuregawa. P2PR-tree: An R-tree-based spatial index for Peer-to-Peer environments. Proc. P2PDB, [11] A. Mondal, S. K. Madria, and M. Kitsuregawa. CLEAR: An efficient qos-based dynamic replication scheme for mobilep2p networks. To appear in Proc. DEXA, [12] Morpheus. [13] L. Mui, M. Mohtashemi, and A. Halberstadt. Notions of reputation in multi-agent systems: A review. Proc. Autonomous Agents and Multiagent Systems, [14] L. Xiong and L. Liu. Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. Proc. IEEE TKDE, 16(7), 2004.

Open Issues for Effective Dynamic Replication in Wide-Area Network Environments

Open Issues for Effective Dynamic Replication in Wide-Area Network Environments Open Issues for Effective Dynamic Replication in Wide-Area Network Environments Anirban Mondal Masaru Kitsuregawa Institute of Industrial Science, University of Tokyo, JAPAN. {anirban, kitsure}@tkl.iis.u-tokyo.ac.jp

More information

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented

More information

Technical Brief. NVIDIA Storage Technology Confidently Store Your Digital Assets

Technical Brief. NVIDIA Storage Technology Confidently Store Your Digital Assets Technical Brief NVIDIA Storage Technology Confidently Store Your Digital Assets Confidently Store Your Digital Assets The massive growth in broadband connections is fast enabling consumers to turn to legal

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems E. Latha M.Tech, Dept of Software Engineering (SE), Vinuthna Institute of Technology & Sciences. Abstract: This paper

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

Designated Cyber Security Protection Solution for Medical Devices

Designated Cyber Security Protection Solution for Medical Devices Designated Cyber Security Protection Solution for Medical s The Challenge Types of Cyber Attacks Against In recent years, cyber threats have become Medical s increasingly sophisticated in terms of attack

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information

Key Protection for Endpoint, Cloud and Data Center

Key Protection for Endpoint, Cloud and Data Center Key Protection for Endpoint, Cloud and Data Center ENCRYPTION IS ONLY AS SECURE AS ITS LEAST SECURE KEY Encryption is undoubtedly one of the pillars of information security. It is used everywhere today:

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps Position Paper Gökhan Bal, Kai Rannenberg Goethe University Frankfurt

More information

Continuous Processing versus Oracle RAC: An Analyst s Review

Continuous Processing versus Oracle RAC: An Analyst s Review Continuous Processing versus Oracle RAC: An Analyst s Review EXECUTIVE SUMMARY By Dan Kusnetzky, Distinguished Analyst Most organizations have become so totally reliant on information technology solutions

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

The case for cloud-based data backup

The case for cloud-based data backup IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

More information

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL Coordinating Conferencing and Collaboration Vital unified communications capabilities offer a solid foundation for an integrated view of the collaborative environment. To make the most of the opportunities

More information

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY 2005. PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. BY : UGANDA COMMUNICATIONS COMMISSION 1.0: Background Uganda, like

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

FUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network

FUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network 8th Netties Conference Technische Universität Ilmenau September 30th to October 2nd 2002 T. Zahn / H. Ritter / J. Schiller / H. Schweppe FUtella Analysis and Implementation of a Content- Based Peer-to-Peer

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

CISCO HYPERFLEX SYSTEMS FROM KEYINFO. Bring the potential of hyperconvergence to a wide range of workloads and use cases

CISCO HYPERFLEX SYSTEMS FROM KEYINFO. Bring the potential of hyperconvergence to a wide range of workloads and use cases CISCO HYPERFLEX SYSTEMS FROM KEYINFO Bring the potential of hyperconvergence to a wide range of workloads and use cases Digital transformation demands unprecedented flexibility and agility in the data

More information

GoldSim: Using Simulation to Move Beyond the Limitations of Spreadsheet Models

GoldSim: Using Simulation to Move Beyond the Limitations of Spreadsheet Models GoldSim: Using Simulation to Move Beyond the Limitations of Spreadsheet Models White Paper Abstract While spreadsheets are appropriate for many types of applications, due to a number of inherent limitations

More information

Reasons to Deploy Oracle on EMC Symmetrix VMAX

Reasons to Deploy Oracle on EMC Symmetrix VMAX Enterprises are under growing urgency to optimize the efficiency of their Oracle databases. IT decision-makers and business leaders are constantly pushing the boundaries of their infrastructures and applications

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

P2P Contents Distribution System with Routing and Trust Management

P2P Contents Distribution System with Routing and Trust Management The Sixth International Symposium on Operations Research and Its Applications (ISORA 06) Xinjiang, China, August 8 12, 2006 Copyright 2006 ORSC & APORC pp. 319 326 P2P Contents Distribution System with

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

Application Oriented Networks: An SOA Perspective

Application Oriented Networks: An SOA Perspective Oriented s: An SOA Perspective www.thbs.com Introduction Service Oriented Architecture is the hot topic of discussion in IT circles today. So much so, in fact, that SOA is being seen by many as the future

More information

CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions

CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions CommScope Multi-Tenant Data Center Solutions: A solid advantage from the critical infrastructure experts. Data Center Solutions Multi-tenant data centers are changing business for the better. Businesses

More information

Business Success Through Embedded Communication Technology

Business Success Through Embedded Communication Technology Business Success Through Embedded Communication Technology How WebRTC Delivers Value To Organizations Today GET STARTED Released May 2016 1 2 Introduction More and more activities in our day-to-day lives

More information

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this

More information

BYOD: A Risk analysis grid for large corporates Corix Partners

BYOD: A Risk analysis grid for large corporates Corix Partners BYOD: A Risk analysis grid for large corporates 2013 Corix Partners 1 BYOD: A complex topic for large corporates A large proportion of staff bring personal devices to the office everyday, and use them

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

READYNAS SOLUTIONS SERIES. Simplifying Backups. Infrant Technologies, Inc Skyway Court, Fremont, CA

READYNAS SOLUTIONS SERIES. Simplifying Backups. Infrant Technologies, Inc Skyway Court, Fremont, CA READYNAS SOLUTIONS SERIES Simplifying Backups Infrant Technologies, Inc. 3065 Skyway Court, Fremont, CA 94539 www.infrant.com Introduction Backup arguably the single most confused and ignored subject in

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

RippleMatch Privacy Policy

RippleMatch Privacy Policy RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Whitepaper Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments

Whitepaper Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Whitepaper Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Table of Contents Why choose virtualization?... 3 What is

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

CHAPTER 10 KNOWLEDGE TRANSFER IN THE E-WORLD

CHAPTER 10 KNOWLEDGE TRANSFER IN THE E-WORLD TEST YOUR UNDERSTANDING 1. What is the e-commerce? How does it relate to knowledge management, knowledge transfer, knowledge sharing? E-commerce is the ability to conduct business via electronic networks

More information

Automating VPN Management

Automating VPN Management Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

ARCHIVE ESSENTIALS

ARCHIVE ESSENTIALS EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has

More information

Solution Brief. Bridging the Infrastructure Gap for Unstructured Data with Object Storage. 89 Fifth Avenue, 7th Floor. New York, NY 10003

Solution Brief. Bridging the Infrastructure Gap for Unstructured Data with Object Storage. 89 Fifth Avenue, 7th Floor. New York, NY 10003 89 Fifth Avenue, 7th Floor New York, NY 10003 www.theedison.com @EdisonGroupInc 212.367.7400 Solution Brief Bridging the Infrastructure Gap for Unstructured Data with Object Storage Printed in the United

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Bisnode View Why is it so damn hard to piece together information across the enterprise?

Bisnode View Why is it so damn hard to piece together information across the enterprise? Bisnode View Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Why is it so damn hard to piece together information across the enterprise? By Pär Österlund Creating

More information

Content. Privacy Policy

Content. Privacy Policy Content 1. Introduction...2 2. Scope...2 3. Application...3 4. Information Required...3 5. The Use of Personal Information...3 6. Third Parties...4 7. Security...5 8. Updating Client s Information...5

More information

A Ready Business rises above infrastructure limitations. Vodacom Power to you

A Ready Business rises above infrastructure limitations. Vodacom Power to you A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic

More information

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note:

SWIFT Response to the Committee on Payments and Market Infrastructures discussion note: SWIFT Response to the Committee on Payments and Market Infrastructures discussion note: Reducing the risk of wholesale payments fraud related to endpoint security 28 November 2017 SWIFT thanks the Committee

More information

CLOUND COMPUTING II STUDY NOTES. Unit 1. Introduction to Cloud Computing

CLOUND COMPUTING II STUDY NOTES. Unit 1. Introduction to Cloud Computing CLOUND COMPUTING II STUDY NOTES Introduction to Cloud Computing Unit 1 Cloud computing will change the way you use your computer and the Internet. Instead of running programs and data on an individual

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Competitive Analysis. Version 1.0. February 2017

Competitive Analysis. Version 1.0. February 2017 Competitive Analysis Version 1.0 February 2017 WWW.SOLIDASYSTEMS.COM Introduction This document discusses competitive advantages between Systems security appliances and other security solutions in the

More information

Dell Storage Point of View: Optimize your data everywhere

Dell Storage Point of View: Optimize your data everywhere Dell Storage Point of View: Optimize your data everywhere Fluid Data Architecture Dell Point of View 1 Executive summary Business moves faster every day. The volume, velocity and value of the data you

More information

The power management skills gap

The power management skills gap The power management skills gap Do you have the knowledge and expertise to keep energy flowing around your datacentre environment? A recent survey by Freeform Dynamics of 320 senior data centre professionals

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

An Architecture. What the MEC? for 5G

An Architecture. What the MEC? for 5G An Architecture What the MEC? for 5G What the MEC? An architecture for 5G As we stated in the first e-book in this series, the evolution from LTE to 5G will be the most profound transformation on the wireless

More information

THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP!

THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! Latest Macrium survey results take a detailed look into the backup and recovery space. INTRODUCTION WHO DID WE SPEAK TO? Where are you responsible

More information

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

The Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER

The Bizarre Truth! Automating the Automation. Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER The Bizarre Truth! Complicated & Confusing taxonomy of Model Based Testing approach A CONFORMIQ WHITEPAPER By Kimmo Nupponen 1 TABLE OF CONTENTS 1. The context Introduction 2. The approach Know the difference

More information

Integrated Data Management:

Integrated Data Management: Integrated Data Management: An Innovative Approach to Improved IT Productivity and Flexibility VS Joshi, Ravi Chalaka, Network Appliance, April 2006, TR-3467 Executive Summary Typical IT organizations

More information

Get Ready for the Revival of Large Data Centers

Get Ready for the Revival of Large Data Centers Research Publication Date: 4 August 2006 ID Number: G00142079 Get Ready for the Revival of Large Centers Rakesh Kumar Although large data centers declined in importance in recent years, they will return

More information

Public and Private Interdependencies Filling a Gap in Most Continuity Plans

Public and Private Interdependencies Filling a Gap in Most Continuity Plans Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement

More information

Telecom Italia response. to the BEREC public consultation on

Telecom Italia response. to the BEREC public consultation on Telecom Italia response to the BEREC public consultation on Guidelines on Net Neutrality and Transparency: Best practise and recommended approaches - BOR (11) 44 (2 November 2011) Telecom Italia response

More information

Financial Services Solutions

Financial Services Solutions Financial Services Solutions Financial Services Communications the challenges Financial organisations are looking to create flexible, efficient client focused organisations by changing the way people work.

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

Frontline Interoperability Test Team Case Studies

Frontline Interoperability Test Team Case Studies Frontline Interoperability Test Team Case Studies Frontline IOT Means Maximum Device Compatibility Case Summary A large Bluetooth developer (Customer X) created a new Bluetooth-enabled phone for commercial

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional

More information

BIG DATA INDUSTRY PAPER

BIG DATA INDUSTRY PAPER BIG DATA INDUSTRY PAPER Encryption Key Management INFORMATION-RICH BIG DATA IS UNDER INCREASING THREAT OF THEFT AND BUSINESS DISRUPTION. AS THE NETWORKS AND TECHNOLOGIES THAT ENABLE BIG DATA COLLECTION,

More information

Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether.

Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether. Website ADA Compliance Made Easy: How to Respond to Legal Demand Letters or Avoid Them, Altogether. Legal Demand Letters. Solved. Background Across the country, thousands of businesses and organizations,

More information

Intermedia s Private Cloud Exchange

Intermedia s Private Cloud Exchange Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading

More information

Cloud-based data backup: a buyer s guide

Cloud-based data backup: a buyer s guide IBM Global Technology Services IBM SmartCloud IBM Managed Backupi Cloud-based data backup: a buyer s guide How to choose a third-party provider to develop, implement and manage your data backup solution

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

Cyber Security: Exploring the Human Element

Cyber Security: Exploring the Human Element Cyber Security: Exploring the Human Element Summary of Proceedings Cyber Security: Exploring the Human Element Institute of Homeland Security Solutions March 8, 2011 National Press Club Introduction A

More information

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts.

Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. Lies, Damned Lies and Statistics Using Data Mining Techniques to Find the True Facts. BY SCOTT A. BARNES, CPA, CFF, CGMA The adversarial nature of the American legal system creates a natural conflict between

More information

Geolocation and Application Delivery

Geolocation and Application Delivery F5 White Paper Geolocation and Application Delivery The data from geolocation providers offers highly valuable data to a variety of stakeholders and is no longer just for advertising. by Lori MacVittie

More information

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE

HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE HOW A CLOUD COMMUNICATIONS SYSTEM UNIQUELY SUPPORTS YOUR MOBILE WORKFORCE Table of contents 3 How a UCaaS platform empowers your mobile workforce with a phone system and much more 4 6 11 A cloud phone

More information

PALANTIR CYBERMESH INTRODUCTION

PALANTIR CYBERMESH INTRODUCTION 100 Hamilton Avenue Palo Alto, California 94301 PALANTIR CYBERMESH INTRODUCTION Cyber attacks expose organizations to significant security, regulatory, and reputational risks, including the potential for

More information

PPKM: Preserving Privacy in Knowledge Management

PPKM: Preserving Privacy in Knowledge Management PPKM: Preserving Privacy in Knowledge Management N. Maheswari (Corresponding Author) P.G. Department of Computer Science Kongu Arts and Science College, Erode-638-107, Tamil Nadu, India E-mail: mahii_14@yahoo.com

More information

Turning Risk into Advantage

Turning Risk into Advantage Turning Risk into Advantage How Enterprise Wide Risk Management is helping customers succeed in turbulent times and increase their competitiveness Glenn Tjon Partner KPMG Advisory Presentation Overview

More information