White Paper KARL STORZ AIDA system

Size: px
Start display at page:

Download "White Paper KARL STORZ AIDA system"

Transcription

1 White Paper KARL STORZ AIDA system

2 Contents 1 Introduction Short description of the AIDA system Definition of an AIDA system regarding IEC and application regarding IEC Purpose of the AIDA system regarding the connection to the hospital network IT-Network Requirements Required characteristics and configuration of the hospital IT network Intended information flow between the AIDA system and the IT hospital network infrastructure Digital Imaging and Communications in Medicine (DICOM) File Transfer Protocol (FTP) Network Share (Server Message Block SMB) HL7 communication (HL7 server / HIS) KARL STORZ OR1 STREAMCONNECT Server Network Printer Software Installation Licensing Model User Rights User Roles System Administrator Application Administrator Settings User User Audit User Super User Security settings Local users Active directory Access rights validation Security risks Availability Remote Maintenance Remote access via Axeda Patch Management EN BA

3 9 Malware / Antivirus Defense Data Protection Delete the sensitive data Data Backup and Recovery Network Load Network Ports, Protocols and Services Conformity Assessment HL7 Conformance Statement DICOM Conformance Statement Test Protocol Cybersecurity Residual Risk and Mitigations (Threat Model) System Schematic References /REF_001/ PI_OR1_92_E_R.PDF (DICOM Conformance Statement) /REF_002/ PI_OR1_93_E_R.PDF (HL7 Interface Description) /REF_003/ AIDA SofB (Software Description) Whitepaper KARL STORZ AIDA sytem 9

4 1 Introduction 1. 1 Short description of the AIDA system AIDA is the name for a product aimed at integrating typical audio-video, documentation and checklist/ workflow requirements, features and functionalities for an OR environment into one single integrated system. The AIDA system is a medical device according to MDD Definition of an AIDA system regarding IEC and application regarding IEC The whole system consists of a combination of networking devices, non-medical devices and ME-systems according to ISO/IEC Part 3.64 (Definition of MEDICAL ELECTRICAL (ME) SYSTEMS): combination, as specified by its MANUFACTURER, of items of equipment, at least one of which is ME EQUIPMENT to be inter-connected by FUNCTIONAL CONNECTION or by use of a MULTIPLE SOCKETOUTLET. As defined in Annex H of ISO/IEC , the AIDA System is a PEMS (Programmable Electrical Medical System). The complete system is isolated from the hospital network via a software firewall. The responsibility for the network of the hospital IT administrator ends at the network port of the AIDA system. A medical system is defined in Clause 16 of ISO/IEC In Chapter 1 Scope of the ISO/IEC Note 4, the manufacturer who specifies a ME system that includes a network is responsible for this complete medical system. This is according to the ISO/IEC Part These combinations are tested and verified as a complete system by KARL STORZ Purpose of the AIDA system regarding the connection to the hospital network The AIDA system is defined to be used in a medical environment, especially in Operating Rooms. Regarding the network topology design in direction to the hospital network, the system is designed to assist in medical interventions in cases of documentation and communication. The following general communications are supported: Storage of still images, streaming media, audio sequences on a Hospital Server DICOM storage and Worklist HL7 Patient query and export of MDM/ORU messages Printing of still images and treatment reports EN BA

5 2 IT-Network Requirements Note: Connection of the KARL STORZ Medical Device to a network/data coupling that includes equipment that is not validated for use with the KARL STORZ equipment could result in previously unidentified risks to patients, or operators. The operator should identify, analyze, and control such risks. This includes any subsequent changes to the network/data coupling introducing new risks and requiring new analysis. Examples of pertinent changes to network/data coupling include: Changes in network/data coupling configuration Connection of additional items to network/data coupling Disconnecting items from network/data coupling Update of equipment connected to network/data coupling Upgrade of equipment connected to network/data coupling 2. 1 Required characteristics and configuration of the hospital IT network The following requirements have to be fulfilled by the customer; otherwise correct function of the AIDA isn t guaranteed: The availability of a gateway and DNS-Server for the AIDA should be ensured A minimum bandwidth of 100Mbit/s has to be guaranteed 2. 2 Intended information flow between the AIDA system and the IT hospital network infrastructure The AIDA system supports six types of external servers in the hospital network Digital Imaging and Communications in Medicine (DICOM) For further information refer to the AIDA DICOM Conformance Statement File Transfer Protocol (FTP) The AIDA system uses passive FTP when exporting data to a FTP server within the IT hospital network infrastructure. That means, all connections are established from the FTP client to the server. The required FTP credentials to connect to the FTP server need to be configured and stored within the AIDA system. Used TCP-Ports 20/21. Please refer to the FTP definition in RFC 959 for more detailed information. FTP-server: e.g. vsftpd, Filezilla FTP server for saving patient data Network Share (Server Message Block SMB) The AIDA system uses the SMB protocol standard when exporting data to a network share on a SMB server within the IT network infrastructure. Hereby all connections are established from the SMB client to the server. Therefore no special firewall configuration of the router is required. The required credentials to connect to the SMB server need to be configured and stored within the AIDA system. New Windows systems use primary TCP-Port 445. Older systems or other compatible Operation Systems (OS) can use different ports. Please refer to the SMB definition by Microsoft under: for more detailed information. SMB-server: e.g. Windows based server (Windows server 2008), Samba (Version 4) for saving patient data. Whitepaper KARL STORZ AIDA sytem 11

6 2.2.4 HL7 communication (HL7 server / HIS) The AIDA system uses the most common HL7 transport method to send HL7 messages, called Lower Layer Protocol (LLP). The Lower Layer Protocol sends unencrypted HL7 messages via TCP/IP over a local area network, such as those found in a hospital. When using LLP, an HL7 message must be wrapped using a header and trailer (also called a footer) to signify the beginning and end of a message KARL STORZ OR1 STREAMCONNECT Server For audio/video communication outside the OR-Environment an additional server platform is available. For further information please refer to the country based assigned Whitepaper: United States / Canada / Mexico: STREAMCONNECT NEO Rest of the world: White Paper OR1 STREAMCONNECT II System Network Printer The AIDA system supports the configuration of network printers that can be used for printing treatment reports or still images. The required resources depend on the concrete network printing infrastructure and drivers that are used. The following protocols are tested and verified: Network Share (Server Message Block SMB) Internet Printing Protocol (IPP) via TCP/UDP-Port 631 Line Printer Daemon protocol / Line Printer Remote protocol (LPD, LPR) via TCP-Port 515 HP-JetDirect via TCP-Port EN BA

7 3 Software Installation System is a delivery of a complete system including hardware and software (AIDA SW and Windows 10 Embedded). 4 Licensing Model There is no dedicated licensing model implemented. 5 User Rights The AIDA system provides flexible user permissions management which allows handling of multiple users and storage of user and group specific settings User Roles User capabilities of the users are role-based. Please consult /REF_003/ for more details. The following standard user roles are available in the AIDA system System Administrator Users with System Administrator rights have access to all windows functionalities. They are able to change the following system settings: Add system to the domain (active directory) Add, edit, and delete local user accounts and assign local users to user groups Change network and time settings Change autologin settings Install/configure printers Access the Windows desktop Update the system / install the patches Application Administrator The access rights of the Application Administrator are restricted only within the AIDA system. Users with AIDA Application Administrator rights can change the following AIDA settings: Settings applied for the local AIDA unit Settings with global impact (settings can be shared between AIDA installations) Settings with impact to the group Settings User Additionally to regular Users, Users with User Settings rights have permissions to access AIDA configuration and change their own user specific settings like print settings and individual keywords User Users with User rights have rights to login to the AIDA system, access own patients data in the filing cabinet, but no rights to change any configuration settings Audit User Users with Audit rights shall have access to see and download the audit logs. They do not have rights to access patient data Super User Users that play the role of Super Users have, unlike users with User roles, access to all patient data in the filing cabinet. Whitepaper KARL STORZ AIDA sytem 13

8 5. 2 Security settings The System Administrator and Application Administrator in the hospital are responsible for configuring the AIDA System for later secure usage. Please consult /REF_003/ and the following subchapters to manage cybersecurity settings corresponding to your requirements Local users AIDA is delivered with default users and passwords (Please refer to /REF_003/). To improve the security of the system, change the administrative password on your device immediately before first usage. You will need to login as System Administrator (OR1 Admin user) to windows and make changes to the windows local user accounts. The process of administrating local users / passwords is not part of the AIDA application Active directory The AIDA system has the option of being added to a domain (active directory). When added to a domain, LDAP will be used for login authentication and authorization, so the user group s membership will be read from LDAP and mapped to AIDA standard user roles. The process of adding the AIDA system to a domain is not a part of the AIDA application Access rights validation AIDA is divided into different security sections. The following access rights validations can be set by the Application Administrator in the AIDA Application. Setting Description Access Roles Default Value Startup If enabled, the user has to be authorized after start All Roles Off of AIDA Patient Import Check access rights for Patient Import (HL7 query User, Super User Off /DICOM worklist) Finish Check access rights to finish the procedure User, Super User Off Open Tasks Check access rights to access data in Open Tasks. Please note, that members of the Super Users User, Super User, Application Administrator role can see tasks of all users and members of the User role only owned tasks. Filing Cabinet Check access rights to access data in the Filing Cabinet. Please note, that members of the Super Users role can see all patients and members of the User role only own patients in the filing cabinet. User, Super User Off Configuration If enabled, the User will be asked for credentials each time they access the configuration. If disabled, credentials of an already logged in User will be reused to access the configuration. Settings User, Application Administrator, System Administrator 5. 3 Security risks Some AIDA settings that can be made by a System/Application Administrator should be configured carefully, due to potential resulting risks. Please consult Chapter 17 Cybersecurity Residual Risk and Mitigations (Threat Model) for more details. 6 Availability KARL STORZ cannot make any statements regarding the safety and availability of devices that the operator has modified without authorization, for instance, by installing printer drivers, additional software, etc. 7 Remote Maintenance Remote maintenance requires network access that connects the device to the hospital network. In accordance with the data protection laws of the respective federal state, KARL STORZ explicitly ensures that external access is established only to the device in question. The individuals accessing the device are all specifically trained and instructed KARL STORZ employees who have confirmed in writing that they have undergone instruction and will apply the corresponding procedures. KARL STORZ guarantees that no patient-related information will be used for service purposes, copied, or used in any other form. On EN BA

9 KARL STORZ will inform the operator by phone or in writing (via with confirmation request) before performing any required remote access. KARL STORZ and the operator will agree on the required modalities, the procedures, the necessary contacts, etc., in advance. These agreements will be made in writing. Three options are available for the actual external access to the device. They are described below Remote access via Axeda By default KARL STORZ offers remote maintenance through its Axeda software for the KARL STORZ devices located in the operating room. Connection between devices in the OR and the Axeda 3 Connected Access Remote Server is established by the device using the https protocol. Further communication between the device and the Axeda Connected Access Remote server uses https tunneling. Remote service requires two outbound ports (443 and 17002) to allow the remote service agent to connect to the remote service backend (currently Axeda ). The remote service agent is installed on the AIDA PC only and therefore only the AIDA PC needs access to the remote service backend. The H-LAN firewall has to allow this traffic to be passed from inside the OR to outside. In addition there are a few network management tools that will be installed on the AIDA PC to allow the network maintenance, monitoring and troubleshooting tasks via remote service. The access to the system via Axeda needs the confirmation of the user. Axeda software requirements can be viewed at 8 Patch Management AIDA system updates always include relevant patches which are tested following regulatory requirements for medical devices. KARL STORZ provides patches and fixes if necessary. Users with User rights have rights to login to the AIDA system, access own patients data in the filing cabinet, but no rights to change any configuration settings. 9 Malware / Antivirus Defense Classic antivirus protection is only effective if the virus definition file (= blacklist) and the program engine are regularly updated. Therefore, users are only protected against threats that are known to the manufacturer. There is a general risk of a faulty update of the antivirus program negatively affecting the system, resulting in problems as severe as total system failure. Therefore, careful checks are indispensable. The patch management solution of the AIDA system is based on Cryptzone SE46, which starts automatically together with the Windows operating system and uses the whitelist approach. When using a whitelist, all executable files that are not listed on the whitelist are blocked from running. As a result, any intruding malware is prevented from negatively affecting the system or changing it. This includes malware such as viruses or Trojans even if they are hidden in other files. Only a KARL STORZ service technician has the privileges to switch the Cryptzone SE46 into the Service Mode, which allows full control and sole authorization to make fundamental modifications to the operating system and installations. This also applies to the release of new system components and updates. SE46 prevents the exploitation of zero days on OS level and other applications. Malware / antivirus protection software may be installed and run under certain conditions. If the operator meets the requirements described below, the appliance s conformity with Medical Device Directive 93/42EEC will remain intact as declared by KARL STORZ. The operator must configure the software such that it does not limit the operation of the appliance. Please take resource intensive processes, such as video storage during surgery and other real-time applications, into consideration. The initial installation as well as the installation of updates or safety patches of anti-malware programs must be tested in advance within the respective environment. Please note that the operator is responsible for malware protection in view of risk management in accordance with IEC Whitepaper KARL STORZ AIDA sytem 15

10 10 Data Protection The AIDA system will be used in secured environments like ORs or doctors' offices. These are environments with reduced access only for selected staff Delete the sensitive data The System Administrator should consider deleting sensitive data located on the D: drive before sending the system for service purposes. Please consult the /REF_003/ for working instructions. 11 Data Backup and Recovery This system is not intended to be used as an archive. The system does not provide a local backup solution. Under normal operating conditions all data will be exported to a defined target after each treatment, which is under customer control as for backups. During a procedure, data is stored locally in a buffer; after the finalization of the treatment an export to predefined targets is initiated. If the export fails, the data export will be resumed after the failure condition has been resolved (e.g. reestablishment of network connectivity etc.) Data of current treatments will remain on the local HDD in case of power failure or other adverse events. 12 Network Load The system can read and write up to 1GBit/sec during storage operations. 13 Network Ports, Protocols and Services Port Protocols / Application Name Application Description Services [445] [TCP / SMB] [Windows Share] [exporting / importing presets] Configurable (Outgoing) TCP DICOM.Service.exe DICOM service (support fo secure transfer via SSL) Dicom store Worklist request Configurable (Ingoing) Dicom MPPS TCP DICOM.Service.exe Dicom service Listening port to receive Storage treatments 20/21 (Outgoing) TCP OR1Desktop.exe Export of procedure files via outgoing FTP connection to export destination 22 (Outgoing TCP OR1Desktop.exe Export of procedure files via secure SSH connection to export destination 445 TCP OR1Desktop.exe Export of procedure files via windows share (smb) protocol Configurable TCP OR1Desktop.exe HL7 query and export (DEM/ ORU) messages via Lower Layer Protocol (LLP) 443 and TCP / UDP 5900 (Ingoing) TCP winvnc.ex Remote access to AIDA system EN BA

11 14 Conformity Assessment HL7 Conformance Statement Refer to /REF_002/ for HL7 Interface Description 15 DICOM Conformance Statement Refer to /REF_001/ for DICOM Conformance Statement document. 16 Test Protocol Under certain prescribed circumstances, the Operator may make changes to the KARL STORZ device (e.g. See Section 10, Malware Defence, above). In all circumstances, the Operator is ultimately responsible for risk management in accordance with IEC Cybersecurity Residual Risk and Mitigations (Threat Model) Residual Risk ID Threat / Vulnerability Mitigation Strategy 1.1 HL7 message via TCP Data transfer between server and the AIDA could be intercepted by a man in the middle attack. Customer is responsible for securing the hospital network from unauthorized access and the communication between AIDA and other systems. AIDA uses Lower Layer Protocol (LLP) which is standard for HL7 communication and not secured by default. In theory, LLP with the TLS (Transport Layer Security) or SSL (Secure Socket Layer) cryptographic protocol is a standard supported by the IHE organization. In practice, it doesn t seem to be used often. Most integration engines have yet to support this standard Manage users/ groups DICOM stream with patient data via TCP/IP Elevation of privilege: Browse buttons can be used to open Windows explorer and access the system with the rights of regular Windows users Data transfer between server and the AIDA could be intercepted by a man in the middle attack To make the communication secure, the Network Administrators should connect the AIDA to trusted networks only, to ensure that it cannot be read by unauthorized users. Network Administrators could consider using VPN, SSH Tunneling to create secure encrypted point to point connection between the AIDA System and HL7 server. Only a System Administrator should be able to make changes to the OS, the user accounts, etc.. Through the vulnerability of browse functionality, it is possible that an Application Administrator (able to change settings for other users within the application) will gain access to the OS. This access is limited to Windows user rights, so the user cannot make significant changes to the system configurations. The hospital administration has to make sure that only qualified and hospital trusted users should play the role of System and Application Administrators. Customer is responsible for securing the hospital network from unauthorized access and for securing the communication between the AIDA and other systems. Application Administrators should consider activating DICOM TLS encryption in the AIDA in case it is supported by the Dicom server vendor. Whitepaper KARL STORZ AIDA sytem 17

12 Residual Risk ID Threat / Vulnerability Mitigation Strategy 3.1. Patient treatment files via FTP Data transfer between server and the AIDA could be intercepted by a man in the middle attack. Customer is responsible for securing the hospital network from unauthorized access and for securing the communication between the AIDA and other systems. Configuration data store 5.2. View remote web site DICOM Worklist flat file data Information Disclosure: Everybody can read unencrypted data DNS Spoofing in hospital network. Can be used for phishing sensitive username/ password information from e.g. STREAMCONNECT Data transfer between server and the AIDA could be intercepted by a man in the middle attack. Application Administrators should consider using SFTP instead of FTP for exporting patient data. Consult also /REF_003. The System Administrator should consider protecting the data drive (PHI data) with any encryption tool from being compromised if the drive is lost or stolen or sent for service purposes. Please also consult the / REF_003/ for PHI data delete instructions. Customer is responsible for securing the hospital network from unauthorized access and for securing the communication between the AIDA and other systems. Application Administrators should only configure https endpoint to avoid Spoofing. Customer is responsible for securing the hospital network from unauthorized access and for securing the communication between the AIDA and other systems. AIDA is delivered in ready to use, but unsecure state Upon first use of the AIDA System, the System Administrator should perform steps to use the system in a hardened state Application Administrators should use secure transfer protocol to transport the flat file to the local AIDA machine. Please consult /REF_003/, this document and this table and follow the hardening steps. UltraVNC Server Unencrypted data session Because of unencrypted data sections, hackers can use sniffer tools to view information (passwords, etc.) that flows over a VNC connection. Hospital System Administrator is responsible for data flow security. VNC should be used only in a DMZ secure environment. Network Administrators could consider setting VNC to be used only when tunneled through SSH or VPN across the DMZ to assure secure encrypted point to point connection. The hospital System Administrator is responsible for setting VNC usage inside the lab, VNC tunneled through SSH across the DMZ, and VNC through a VPN tunnel are acceptable. See alternative solutions below EN BA

13 18 System Schematic TM TM Whitepaper KARL STORZ AIDA sytem 19

14 KARL STORZ SE & Co. KG Dr.-Karl-Storz-Straße Tuttlingen Postfach Tuttlingen Germany Telefon: +49 (0) Telefax: +49 (0)

OR /2017-E. White Paper OR1 StreamConnect II System IEC WHITE PAPER

OR /2017-E. White Paper OR1 StreamConnect II System IEC WHITE PAPER OR1 25 2.1 11/2017-E White Paper OR1 StreamConnect II System IEC 80001 WHITE PAPER Foreword With this document, KARL STORZ supplies the operator with information to be used for the integration of the OR1

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

Easy-to-Use PCI Kit to Enable PCI Compliance Audits

Easy-to-Use PCI Kit to Enable PCI Compliance Audits Easy-to-Use PCI Kit to Enable PCI Compliance Audits Version 2.0 and Above Table of Contents Executive Summary... 3 About This Guide... 3 What Is PCI?... 3 ForeScout CounterACT... 3 PCI Requirements Addressed

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

PCI DSS and VNC Connect

PCI DSS and VNC Connect VNC Connect security whitepaper PCI DSS and VNC Connect Version 1.2 VNC Connect security whitepaper Contents What is PCI DSS?... 3 How does VNC Connect enable PCI compliance?... 4 Build and maintain a

More information

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client. Introduction: Intended Audience The StrideLinx Remote Access Solution is designed to offer safe and secure remote access to industrial equipment worldwide for efficient remote troubleshooting, programming

More information

Attachment 3 (B); Security Exhibit. As of March 29, 2016

Attachment 3 (B); Security Exhibit. As of March 29, 2016 Attachment 3 (B); Security Exhibit As of March 29, 2016 UVA Medical Center (UVaMC) Security Requirements The term System shall mean computer equipment, peripheral equipment, system software, application

More information

The Bomgar Appliance in the Network

The Bomgar Appliance in the Network The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

Network Integration Guide Planning

Network Integration Guide Planning Title page Nortel Application Gateway 2000 Nortel Application Gateway Release 6.3 Network Integration Guide Planning Document Number: NN42360-200 Document Release: Standard 04.01 Date: October 2008 Year

More information

AIDA. More than a medical video recorder. Record. Checklist. Edit. Complete. Patient. Pending Tasks. Reference

AIDA. More than a medical video recorder. Record. Checklist. Edit. Complete. Patient. Pending Tasks. Reference More than a medical video recorder Record Checklist Edit Patient Complete Reference Pending Tasks as part of the KARL STOR stands for the comprehensive implementation of all documentation requirements

More information

The Privileged Remote Access Appliance in the Network

The Privileged Remote Access Appliance in the Network The Privileged Remote Access Appliance in the Network The architecture of the BeyondTrust application environment relies on the BeyondTrust Appliance as a centralized routing point for all communications

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Barracuda Firewall Release Notes 6.6.X

Barracuda Firewall Release Notes 6.6.X Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

RSA Authentication Manager 8.0 Security Configuration Guide

RSA Authentication Manager 8.0 Security Configuration Guide RSA Authentication Manager 8.0 Security Configuration Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

IPM Secure Hardening Guidelines

IPM Secure Hardening Guidelines IPM Secure Hardening Guidelines Introduction Due to rapidly increasing Cyber Threats and cyber warfare on Industrial Control System Devices and applications, Eaton recommends following best practices for

More information

Securing CS-MARS C H A P T E R

Securing CS-MARS C H A P T E R C H A P T E R 4 Securing CS-MARS A Security Information Management (SIM) system can contain a tremendous amount of sensitive information. This is because it receives event logs from security systems throughout

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

CENTRAL COMMUNICATION INTERFACE. Go for simplicity

CENTRAL COMMUNICATION INTERFACE. Go for simplicity CENTRAL COMMUNICATION INTERFACE Go for simplicity SCENARA.CONNECT For hospital staff Reduced complexity Efficiency Safety Scalability Interop made SCENARA.CONNECT KARL STORZ documentation systems with

More information

Recommendations for Device Provisioning Security

Recommendations for Device Provisioning Security Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic

More information

UC for Enterprise (UCE) Management System (UNIVERGE MA4000)

UC for Enterprise (UCE) Management System (UNIVERGE MA4000) UC for Enterprise (UCE) Management System (UNIVERGE MA4000) Security Guidelines NEC NEC Corporation October 2010 NDA-30502, Revision 12 Liability Disclaimer NEC Corporation reserves the right to change

More information

SE420 Software Quality Assurance

SE420 Software Quality Assurance SE420 Software Quality Assurance Encryption Backgrounder September 5, 2014 Sam Siewert Encryption - Substitution Re-map Alphabet, 1-to-1 and On-to (function) A B C D E F G H I J K L M N O P Q R S T U V

More information

Introduction to Information Security Dr. Rick Jerz

Introduction to Information Security Dr. Rick Jerz Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions

More information

Document Number: rev D Intuitive Surgical, Inc. OnSite Overview. for the da Vinci Xi and da Vinci Si Surgical System.

Document Number: rev D Intuitive Surgical, Inc. OnSite Overview. for the da Vinci Xi and da Vinci Si Surgical System. OnSite Overview for the da Vinci Xi and da Vinci Si Surgical System Page 1 Table of Contents 1. OnSite for the da Vinci Xi and Si System Overview... 3 2. Requirements... 5 3. Detailed Hardware, Software

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls

More information

The Privileged Access Appliance in the Network

The Privileged Access Appliance in the Network The Privileged Access Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

KARL STORZ AIDA. Advanced Image and Data Acquisition. Exceptional documentation. Record. Edit. Checklist. Complete. Patient.

KARL STORZ AIDA. Advanced Image and Data Acquisition. Exceptional documentation. Record. Edit. Checklist. Complete. Patient. Advanced Image and Data Acquisition Exceptional documentation Record Checklist Edit Patient Complete Reference Compact I 2.0 1.1 DVD 2006 has been on the market for more than 15 years and today is the

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

ASA/PIX Security Appliance

ASA/PIX Security Appliance I N D E X A AAA, implementing, 27 28 access to ASA/PIX Security Appliance monitoring, 150 151 securing, 147 150 to websites, blocking, 153 155 access control, 30 access policies, creating for web and mail

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Children s Health System. Remote User Policy

Children s Health System. Remote User Policy Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards

More information

Information Security at Veritext Protecting Your Data

Information Security at Veritext Protecting Your Data Information Security at Veritext Protecting Your Data The Veritext Security Model Introduction Information security and privacy are built into the fabric of everything we do at Veritext. Helping to protect

More information

Customer Support: For more information or support, please visit or at Product Release Information...

Customer Support: For more information or support, please visit   or  at Product Release Information... Product Release Information Product: Cyberoam Release Number: 9.3.0 build 5 Release Date: 19th July 2006 Compatible versions: 9.2.0 build 2 Upgrade Mode: Manual 1 Important note Upgrade removes all the

More information

CoreMax Consulting s Cyber Security Roadmap

CoreMax Consulting s Cyber Security Roadmap CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

Securing Access to Network Devices

Securing Access to Network Devices Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard

More information

File Transfer and the GDPR

File Transfer and the GDPR General Data Protection Regulation Article 32 (2): In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from

More information

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines California State Polytechnic University, Pomona Server and Network Security Standard and Guidelines Version 1.7 April 4, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM NETWORK AND SERVER SECURITY

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks

More information

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Reviewer s guide. PureMessage for Windows/Exchange Product tour Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core Version 1.02 POINT TRANSACTION SYSTEMS AB Box 92031,

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

Remote Desktop Security for the SMB

Remote Desktop Security for the SMB A BWW Media Group Brand Petri Webinar Brief October 5th, 2018 Remote Desktop Security for the SMB Presenter: Michael Otey Moderator: Brad Sams, Petri IT Knowledgebase, Executive Editor at Petri.com There

More information

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each. Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Are You Avoiding These Top 10 File Transfer Risks?

Are You Avoiding These Top 10 File Transfer Risks? Are You Avoiding These Top 10 File Transfer Risks? 1. 2. 3. 4. Today s Agenda Introduction 10 Common File Transfer Risks Brief GoAnywhere MFT Overview Question & Answer HelpSystems Corporate Overview.

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

IC32E - Pre-Instructional Survey

IC32E - Pre-Instructional Survey Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51 Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

PrecisionAccess Trusted Access Control

PrecisionAccess Trusted Access Control Data Sheet PrecisionAccess Trusted Access Control Defeats Cyber Attacks Credential Theft: Integrated MFA defeats credential theft. Server Exploitation: Server isolation defeats server exploitation. Compromised

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

Secure Access & SWIFT Customer Security Controls Framework

Secure Access & SWIFT Customer Security Controls Framework Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

PRACTICAL NETWORK DEFENSE VERSION 1

PRACTICAL NETWORK DEFENSE VERSION 1 PRACTICAL NETWORK DEFENSE VERSION 1 The world s premiere online practical network defense course elearnsecurity has been chosen by students in over 140 countries in the world and by leading organizations

More information

Unified Security Platform. Security Center 5.4 Hardening Guide Version: 1.0. Innovative Solutions

Unified Security Platform. Security Center 5.4 Hardening Guide Version: 1.0. Innovative Solutions Unified Security Platform Security Center 5.4 Hardening Guide Version: 1.0 Innovative Solutions 2016 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes

More information

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways Firewalls 1 Overview In old days, brick walls (called firewalls ) built between buildings to prevent fire spreading from building to another Today, when private network (i.e., intranet) connected to public

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Practical Network Defense Labs

Practical Network Defense Labs Practical Network Defense Labs ABOUT This document showcases my practical hands-on engagements in the elearnsecurity HERA labs environment for the Network Defense Professional certification course. I utilized

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 300-206 EXAM QUESTIONS & ANSWERS Number: 300-206 Passing Score: 800 Time Limit: 120 min File Version: 35.2 http://www.gratisexam.com/ Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network

More information

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS SECURITY PLATFORM FOR HEALTHCARE PROVIDERS Hundreds of hospitals, clinics and healthcare networks across the globe prevent successful cyberattacks with our Next-Generation Security Platform. Palo Alto

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....

More information

Five steps to securing personal data online Gary Shipsey Managing Director

Five steps to securing personal data online Gary Shipsey Managing Director Five steps to securing personal data online Gary Shipsey Managing Director 25 September 2014 Agenda Learn from the mistakes of others and protect personal information online. 1 2 Where does your information

More information

Oracle Hospitality OPERA Property Management Security Guide Versions: Part Number: E

Oracle Hospitality OPERA Property Management Security Guide Versions: Part Number: E Oracle Hospitality OPERA Property Management Security Guide Versions: 5.0.05.00 Part Number: E67891-01 May 2016 Copyright 2015, Oracle and/or its affiliates. All rights reserved. This software and related

More information

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CompTIA E2C Security+ (2008 Edition) Exam Exam. CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.

More information

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions 1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler

More information

Knowledge Exchange (KE) V2.0 System Cyber Security Plan

Knowledge Exchange (KE) V2.0 System Cyber Security Plan Knowledge Exchange (KE) V2.0 System Cyber Security Plan INTRODUCTION Olympus Knowledge Exchange System KE (hereinafter KE) connects to Olympus medical devices installed in a healthcare facility, collects

More information