The effect of competition intensity on cybersecurity

Size: px
Start display at page:

Download "The effect of competition intensity on cybersecurity"

Transcription

1 The effect of competition intensity on cybersecurity An empirical analysis of security patch release on the web browser market Telecom ParisTech CRESSE 2016 July 2016

2 A market at the heart of cybersecurity issues A web browser is the principal window of the World Wide Web: the most widely used application to access to web resource. Security issues are all the more important. Ex) Heartbleed SSL vulnerability Its principal component is the rendering engine: a component used by every Web application that displays web resource.

3 The web browser market (1/2) 3 different periods in the Web browser history 1990: Invention of the Web browser : Dominance of Microsoft Internet Explorer Period after 2004: creation of Mozilla Firefox, new browsers and new features, open source rendering engines... From: an application dependent to operation systems Business strategies evolve also: To: a central platform to communicate on the Web Integrated services (ex. Login to Google account when using Chrome) Central role of the rendering engine Influence to the Web standards Bundling and lock-in strategy Ñ Open source strategy Web browsers are subsidized by search engine revenues

4 The web browser market (2/2) Browser Firefox Safari Chrome Internet Explorer Publisher Mozilla Apple Google Microsoft Rendering engine Gecko Webkit Blink (fork of Webkit) Trident License Open source (MPL) Open source rendering engine (GNU LPGL) Open source rendering engine (GNU LPGL) & open source version of browser (Chromium) Proprietary Business model Built-in search engine royalties (ą 90% of all revenues,»100m$) and donations 1B$ of built-in search engine royalties from Google (in 2014) Vertically integrated 90% of ABC(Google) s revenue come from search related ad. Vertically integrated

5 Patching time as a proxy of the security quality Vulnerability life cycle Patching T is a measure of the security quality q V user U f ` U s pqq P and Π publisher Gpqq C f C s pqq with U f, utility from quality of other aspects than security (functionalities, rendering performance..) U s, utilify from security quality P 0 C f, Cost of quality of other aspects than security C f, Cost to provide a security quality q dv user {dq du s {dq ă 0

6 Some theorical framework For a market with n web browsers, V user U f ` U s pqq c t pqq Π publisher Gpq, aq C f Cpqq In a market with a number n of web browsers competing, what is the security quality q the web browser publishers will choose?

7 The empirical model OLS regression We use the number of days to deliver a patch (Patching T ) as a measure of the security quality. One observation = one pair of vulnerability & web browser publisher Explanatory variable of interest: Competition intensity 1 HHI (Herfindahl Index) Control variables: characteristics specific to the vulnerability, to the software and the vendor, information disclosure, time effect. Patching T β 0 ` β 1 Comp ` β2vuln char ` β 3 V &Soft char ` β 4 User ext ` β 5 T effect ` ɛ Patching T β 0 ` β 1a Comp ` β 1b Comp 2 ` β 2 Vuln char ` β 3 V &Soft char ` β 4 User ext ` β 5 T effect ` ɛ Market considered: 1 the web browser market 2 the rendering engine market Variant: browser s market share as main explanatory variable

8 1 Main result: our data supports the idea that concentration and security investment have a positive relationship 2 Independently of competition intensity, some interesting insight on security investment of software editors: Positive effect of the number of users Positive effect of an earlier public disclosure of the vulnerability Web browsers with an open source core (the rendering engine) are patched more quickly

9 Main data 521 vulnerabilities affecting Web browsers, reported from January 2006 to December 2015 from 3 different projects: 10 vulnerabilities from Google Project Zero 454 vulnerabilities from Zero Day Initiative 63 vulnerabilities from idefense Limited the study to the four principal browsers during the last 10 years: Internet Explorer, Safari, Firefox, Chrome. Limited to vulnerabilities assigned to web browser publishers Collected information: Reported date to the vendor, vulnerability details, information about affected browsers and versions Enrichment with other databases: NVD & MITRE: released date on NVD (public disclosure date), severity of the vulnerability, type of vulnerability From each vendor: version release date, vulnerability patching date Statcounter.com: evolution of market share ITU ICT Indicators database : evolution of number of internet users

10 Description of variables Variable Description Dependent variable Patching time (Patching T ) patching time Time spent by the editor to release a patch (unit: number of days) Explanatory variables Competition intensity (Comp) comp intensity 1 - Herfindahl-Hirschman Index, measured by each browser market share at the vulnerability discovery date Market share (M share) market share Market share of each browser at the date when the vulnerability was reported to the vendor Vulnerability specific effects (Vuln char) vulnerability severity Level of severity of the vulnerability (CVSS base score from 1 to 10) vulnerability type Classification of the type of weakness the vulnerability is subject to, such as cross site scripting, SQL injection, Information leak. 12 types of weaknesses. Software and vendor specific effects (V &Soft char) software age Maturity of the software at the time when the vulnerability is discovered (unit: number of days) vendor dummies Dummies for each vendors : Google, Apple, Mozilla, Microsoft (dummies) opensource 1 if the affected web browser engine is open source, 0 if not (dummy) User related externalities (User ext) n users Number of users of the browser on the date on which the vulnerability was reported. (Market share of the browser * number of Internet user) earlier disclosure 1 if the vulnerability was publicly disclosed earlier than the conventional period of time of 90 days, after being notified to the vendor, 0 if not. (dummy) Time effect (T effect) time effect The date on which the vulnerability was reported to the editor (unit: quarterly date)

11 of OLS Regressions Web browser market Rendering eng. market Market share as main var. VARIABLES Linear Quadratic Linear Quadratic Linear Quadratic Competition intensity (Comp) comp intensity 197.2*** 1,486*** 98.48** 1,727** (48.29) (412.5) (45.78) (735.6) pcompetition intensityq 2-1,010*** -1,345** (315.1) (601.3) market share ** (58.44) (306.9) pmarket shareq (234.1) Vulnerability specific effect (Vuln char) vulnerability severity Yes Yes Yes Yes Yes Yes vulnerability type dummies Yes Yes Yes Yes Yes Yes Soft. and vendor specific effect (V &Soft char) (software age, vendor dummies, opensource) Yes Yes Yes Yes Yes Yes User related externalities (User ext) (n users,earlier disclosure) Yes Yes Yes Yes Yes Yes Time effect (T effect) Yes Yes Yes Yes Yes Yes Observations R-squared x-coordinate of Maximum ( β 2 {2β 1 ) N.A.735 N.A.64 N.A N.A Curvature ( β 1 ) N.A 1010 N.A 1344 N.A N.A Robust Standard errors in parentheses *** p ă 0.01, ** p ă 0.05, * p ă 0.1

12 of OLS Regressions Web browser market Rendering eng. market Market share as main var. VARIABLES Linear Quadratic Linear Quadratic Linear Quadratic Competition intensity (Comp) comp intensity 197.2*** 1,486*** 98.48** 1,727** (48.29) (412.5) (45.78) (735.6) pcompetition intensityq 2-1,010*** -1,345** (315.1) (601.3) market share ** (58.44) (306.9) pmarket shareq (234.1) Vulnerability specific effect (Vuln char) vulnerability severity Yes Yes Yes Yes Yes Yes vulnerability type dummies Yes Yes Yes Yes Yes Yes Soft. and vendor specific effect (V &Soft char) (software age, vendor dummies, opensource) Yes Yes Yes Yes Yes Yes User related externalities (User ext) (n users,earlier disclosure) Yes Yes Yes Yes Yes Yes Time effect (T effect) Yes Yes Yes Yes Yes Yes Observations R-squared x-coordinate of Maximum ( β 2 {2β 1 ) N.A.735 N.A.64 N.A N.A Curvature ( β 1 ) N.A 1010 N.A 1344 N.A N.A Robust Standard errors in parentheses *** p ă 0.01, ** p ă 0.05, * p ă 0.1

13 for OLS Regressions, quadratic model VARIABLES Web browser market Rendering eng. market Competition intensity (Comp) comp intensity 1,486*** 1,727** (412.5) (735.6) pcompetition intensityq 2-1,010*** -1,345** (315.1) (601.3) Vulnerability specific effect (Vuln char) vulnerability severity Yes Yes vulnerability type dummies Yes Yes Soft. and vendor specific effect (V &Soft char) (software age, vendor dummies, opensource) Yes Yes User related externalities (User ext) (n users,earlier disclosure) Yes Yes Time effect (T effect) Yes Yes Observations R-squared x-coordinate of Maximum ( β 2 {2β 1 ) Curvature ( β 1 ) Robust Standard errors in parentheses *** p ă 0.01, ** p ă 0.05, * p ă 0.1 Fitting curve for quadratic regressions

14 of OLS Regressions, open source & disclosure variables VARIABLES (1) (2) (3) (4) (5) (6) (7) Competition intensity (Comp) comp intensity 197.2*** 193.7*** 195.1*** 1,486*** 1,492*** 1,741*** 940.5*** (48.29) (48.21) (55.68) (412.5) (413.9) (474.1) (349.1) pcomp intensityq 2-1,010*** -1,017*** -1,212*** *** (315.1) (316.4) (360.9) (295.6) Vulnerability specific effect (Vuln char) Yes Yes Yes Yes Yes Yes Yes Software and vendor specific effect (V &Soft char) software age & vendor dummies Yes Yes Yes Yes Yes Yes Yes open source *** *** *** *** ** (16.78) (19.02) (16.12) (18.28) (15.10) User related externalities (User ext) n users Yes Yes Yes Yes Yes Yes Yes earlier disclosure *** *** *** *** *** (4.199) (4.193) (4.002) (3.995) (4.272) Time effect (T effect) Yes Yes Yes Yes Yes Yes Yes Observations R-squared Robust Standard errors in parentheses *** p ă 0.01, ** p ă 0.05, * p ă 0.1

15 Existing literature The economics of information security Impact of competition intensity on security investment Gal-Or & Ghose. (2005). The economic incentives for sharing security information. Information Systems Research. Arora, Forman, Nandkumar, & Telang. (2010). Competition and patching of security vulnerabilities: An empirical analysis. Information Economics and Policy. Competition and innovation Aghion, Bloom, Blundell, Griffith & Howitt. (2005). Competition and Innovation: An Inverted-U Relationship. The Quarterly Journal of Economics. Competition and quality Waterman. (1989). Diversity and quality of information products in a monopolistically competitive industry. Information Economics and Policy. Further study: first of all, find a analytical model consistent with the empirical results

16 Thank you!

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Carl Sabottke Octavian Suciu Tudor Dumitraș University of Maryland 2 Problem Increasing number

More information

Ranking Vulnerability for Web Application based on Severity Ratings Analysis

Ranking Vulnerability for Web Application based on Severity Ratings Analysis Ranking Vulnerability for Web Application based on Severity Ratings Analysis Nitish Kumar #1, Kumar Rajnish #2 Anil Kumar #3 1,2,3 Department of Computer Science & Engineering, Birla Institute of Technology,

More information

Big Data Analytics In M2M Open Source Editors Formatting Issues

Big Data Analytics In M2M Open Source  Editors Formatting Issues Big Data Analytics In M2M Open Source e-mail Editors Formatting Issues WHITE PAPER Table of Contents Abstract... 3 Abbreviations... 3 Introduction... 4 Some Examples of E-mail Client Formatting Issues...

More information

Mozilla position paper on the legislative proposal for an EU Cybersecurity Act

Mozilla position paper on the legislative proposal for an EU Cybersecurity Act Mozilla position paper on the legislative proposal for an EU Cybersecurity Act Enhancing cybersecurity through government vulnerability disclosure I. INTRODUCTION This paper provides an overview of Mozilla

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites

Reporting Status of Vulnerability-related Information about Software Products and Websites Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 218 (July - September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

An Empirical Study of Vulnerability Rewards Programs

An Empirical Study of Vulnerability Rewards Programs An Empirical Study of Vulnerability Rewards Programs Matthew Finifter, Devdatta Akhawe, David Wagner UC Berkeley security development lifecycle A vulnerability remediation strategy is any systematic approach

More information

Building a Browser for Automotive: Alternatives, Challenges and Recommendations

Building a Browser for Automotive: Alternatives, Challenges and Recommendations Building a Browser for Automotive: Alternatives, Challenges and Recommendations Igalia and Webkit/Chromium Open source consultancy founded in 2001 Igalia is Top 5 contributor to upstream WebKit/Chromium

More information

manaba+r Report Examination Manual [For Students]

manaba+r Report Examination Manual [For Students] manaba+r Report Examination Manual [For Students] Contents 1. Report Examination... 1 1.1. Courses with Report Examinations... 1 1.2. Report Topic Announcement Method... 1 1.3. Report Submission... 1 1.4.

More information

Working with CAIDA s (and other) DATA, Bottlenecks and Affordability a study in Tamil Nadu

Working with CAIDA s (and other) DATA, Bottlenecks and Affordability a study in Tamil Nadu The 8th Workshop on Internet Economics CAIDA and the Massachusetts Institute of Technology (MIT) University of California San Diego 13-14 December 2017 Working with CAIDA s (and other) DATA, Bottlenecks

More information

RBS NetGain Enterprise Manager Multiple Vulnerabilities of 11

RBS NetGain Enterprise Manager Multiple Vulnerabilities of 11 RBS-2018-004 NetGain Enterprise Manager Multiple Vulnerabilities 2018-03-22 1 of 11 Table of Contents Vendor / Product Information 3 Vulnerable Program Details 3 Credits 3 Impact 3 Vulnerability Details

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1 st Quarter of 2012 (January March) -

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1 st Quarter of 2012 (January March) - Reporting Status of Vulnerability- Information about Software Products and Websites - 1 st Quarter of 212 (January March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

User's Guide

User's Guide Project: www.vectronic-wildlife.com Title: User's Guide Last Change: 05.03.2009 1 Login Once the web site has finished loading, its main window shows a two dimensional world map provided by Google Maps

More information

LINK2FEED INSTRUCTION AID TOPIC: (1) User Log In & Password Reset

LINK2FEED INSTRUCTION AID TOPIC: (1) User Log In & Password Reset PURPOSE This instruction aid covers user login and password renewal and password reset. AUDIENCE Agency employees and volunteers who access Link2Feed PREREQUISITES Notification of account creation and

More information

Endpoint Security webrh

Endpoint Security webrh Endpoint Security webrh 3.0 HFA 3 Release Notes 17 January 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

BCW Web Browser Versions and Update Instructions Updated 5/5/2017

BCW Web Browser Versions and Update Instructions Updated 5/5/2017 To remain HIPAA compliant and adhere to DPH security requirements, all BCW providers (public and private) are responsible for ensuring that the web browser on the PC(s) used to access BIBS meet the following

More information

1.2 What Spotlight and Strata users can expect

1.2 What Spotlight and Strata users can expect 1 About 5 About 1.1 What is? is a set of integrated modules that enables your institution to make evidence-based strategic decisions. consists of four modules: Overview - Get an overview of the research

More information

Before you Start! How to set-up Port Forwarding

Before you Start! How to set-up Port Forwarding Before you Start! Port forwarding works best when using Apple Safari, Microsoft Internet Explorer 8, or Mozilla Firefox. Note: Google Chrome and Microsoft Internet Explorer 9 have been identified to have

More information

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)

More information

Web browser architecture

Web browser architecture Web browser architecture Web Oriented Technologies and Systems Master s Degree Course in Computer Engineering - (A.Y. 2017/2018) What is a web browser? A web browser is a program that retrieves documents

More information

BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2

BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2 Browser Policy June 2016 Table of Contents BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 1 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2 SCOPE OF APPLICABILITY

More information

How to Access the Ayers Institute's INVEST Videos

How to Access the Ayers Institute's INVEST Videos How to Access the Ayers Institute's INVEST Videos Introduction A series of lesson-length videos is available from the Ayers Institute for Teacher Learning & Innovation. These videos can be used in teacher

More information

DCOS Workshop: The Intersection of Open ICT Standards, Development, and Public Policy

DCOS Workshop: The Intersection of Open ICT Standards, Development, and Public Policy DCOS Workshop: The Intersection of Open ICT Standards, Development, and Public Policy Thomas Vinje ECIS External Counsel 12 November 2007 Agenda ECIS Overview The European Commission s 2004 Decision and

More information

Testing your TLS version

Testing your TLS version Testing your TLS version If you are not able to access Progressive Leasing websites, you may need to upgrade your web browser or adjust your settings. In order to test your TLS version to see if it is

More information

IGME-330. Rich Media Web Application Development I Week 1

IGME-330. Rich Media Web Application Development I Week 1 IGME-330 Rich Media Web Application Development I Week 1 Developing Rich Media Apps Today s topics Tools we ll use what s the IDE we ll be using? (hint: none) This class is about Rich Media we ll need

More information

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3 rd Quarter of 2015 (July September) -

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3 rd Quarter of 2015 (July September) - Reporting Status of Vulnerability- Information about Software Products and Websites - 3 rd Quarter of 215 (July September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

More information

E-statement Settings Guide

E-statement Settings Guide E-statement Settings Guide Contents Windows PC... 3 Google Chrome... 3 Internet Explorer... 7 Mozilla Firefox... 10 Apple Macintosh... 14 Safari for Mac... 14 Apple ios (iphone/ipad)... 21 Safari for ios

More information

Student Evaluation of Teaching (SET)

Student Evaluation of Teaching (SET) Testing, Evaluation and Research Services Student Evaluation of Teaching (SET) A guide to retrieving your faculty longitudinal report online. FOR ADDITIONAL INFORMATION, PLEASE CONTACT THE SET HELPDESK

More information

Visualizing the Topology

Visualizing the Topology Visualization Overview, page 1 Enabling AutoNetkit Visualization (for Windows Users), page 3 Opening AutoNetkit Visualization, page 5 Using Layers, page 6 Changing the Settings, page 9 Using Search, page

More information

How to install Citrix on Windows XP/Vista/7/8/8.1

How to install Citrix on Windows XP/Vista/7/8/8.1 How to install Citrix on Windows XP/Vista/7/8/8.1 Citrix Receiver Installation 1. Bring up a web browser (ie: Internet Explorer, Firefox, or Google Chrome) and go to http://receiver.citrix.com. 2. Click

More information

ISAAC New Company Inquiry Process

ISAAC New Company Inquiry Process Welcome to the Workforce and Economic Development Network of PA (WEDnetPA) Information Sharing Administration and Analysis Center commonly referred to as ISAAC. This purpose of this document is to assist

More information

Faculté Polytechnique

Faculté Polytechnique Faculté Polytechnique OSS 2013 Identifying Success Factors for the Mozilla Project Dr Ir Robert Viseur Koper - Capodistria (Slovenia), June 25-28, 2013 Summary Motivations. Methodology. Success factors

More information

Student Evaluation of Teaching (SET)

Student Evaluation of Teaching (SET) Testing, Evaluation and Research Services Student Evaluation of Teaching (SET) A guide to retrieving your Chair administrative reports online. FOR ADDITIONAL INFORMATION, PLEASE CONTACT THE SET HELPDESK

More information

Portal Recipient Guide. The Signature Approval Process

Portal Recipient Guide. The Signature Approval Process Portal Recipient Guide The Signature Approval Process Contents 1 Introduction... 3 2 Account Activation... 3 3 Document Signing... Error! Bookmark not defined. 4 Authenticating your Device & Browser...

More information

Security in a Mainframe Emulator. Chaining Security Vulnerabilities Until Disaster Strikes (twice) Author Tim Thurlings & Meiyer Goren

Security in a Mainframe Emulator. Chaining Security Vulnerabilities Until Disaster Strikes (twice) Author Tim Thurlings & Meiyer Goren Security in a Mainframe Emulator Chaining Security Vulnerabilities Until Disaster Strikes (twice) Author Tim Thurlings & Meiyer Goren October 25, 2017 Table of Contents Introduction... 2 About this paper...

More information

Engineering Improvement in Software Assurance: A Landscape Framework

Engineering Improvement in Software Assurance: A Landscape Framework Engineering Improvement in Software Assurance: A Landscape Framework Lisa Brownsword (presenter) Carol C. Woody, PhD Christopher J. Alberts Andrew P. Moore Agenda Terminology and Problem Scope Modeling

More information

Mobile Banking Supported Operating Systems, Browsers, and Networks Phone Channel

Mobile Banking Supported Operating Systems, Browsers, and Networks Phone Channel Mobile Banking ed Operating Systems, Browsers, and Networks Phone Channel ed Operating Systems (October December 2017) The following outlines the scope of ADK on the Go s operating system and network support.

More information

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect NOTHING IS WHAT IT SIEMs: COVER PAGE Simpler Way to Effective Threat Management TEMPLATE Dan Pitman Principal Security Architect Cybersecurity is harder than it should be 2 SIEM can be harder than it should

More information

Windows Authentication for Velocity Web service Client

Windows Authentication for Velocity Web service Client Windows Authentication for Velocity Web service Client Copyright 2019, Identiv. Overview Prior to Velocity 3.7 SP1 releases, the Velocity Web Service Client (VWSC) application used Anonymous Authentication

More information

Version 9.2. SmartPTT Enterprise. Web Client User Guide

Version 9.2. SmartPTT Enterprise. Web Client User Guide Version 9.2 December 2017 Contents Contents 1 Introduction 3 2 SmartPTT Web Client Interface 4 3 Logging in and Changing User 6 4 7 4.1 Making and Receiving Voice Calls 8 4.2 Sending Messages 11 4.3 Finding

More information

LXI Technical Committee Overview

LXI Technical Committee Overview LXI Technical Committee Overview David Owen Technical Committee Chair Technical Committee (TC) Responsible for the creation and maintenance of the LXI standard Managed by the TC Chair reporting to the

More information

Filing the 990-N epostcard for

Filing the 990-N epostcard for Filing the 990-N epostcard for 2015-16 This is your chapter s tax return and is not optional. The IRS will revoke the chapter s tax-exempt status and your chapter will have to reorganize with the IRS.

More information

What are important factors for the successful implementation of IPTV across countries?

What are important factors for the successful implementation of IPTV across countries? What are important factors for the successful implementation of IPTV across countries? Jiwhan Kim*, Changi Nam*, Min Ho Ryu** 0900-1000 *KAIST School of Business and Technology Management *Hoseo University

More information

PRINTING IN ESCRIBE...2

PRINTING IN ESCRIBE...2 PRINTING IN ESCRIBE...2 PRINTING FROM MOZILLA FIREFOX...2 ALLOWING POPUPS IN MOZILLA FIREFOX...3 PRINTING FROM GOOGLE CHROME...4 ALLOWING POPUPS IN GOOGLE CHROME...5 PRINTING FROM APPLE SAFARI...6 ALLOWING

More information

SPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies

SPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies SPAR Workflow for SharePoint 0 ITLAQ Technologies www.itlaq.com Table of Contents I. System Requirements...2 II. Install SPARK Workflow on your environment...2 III. Obtain SPARK Workflow License...7 IV.

More information

McAfee Database Security Insights

McAfee Database Security Insights McAfee Database Security Insights Managing the multitude of alerts, reports, and events and sometimes finding the proverbial needle in a haystack is challenging. Monitoring the activity on busy enterprise

More information

Q Results. Emirates Integrated Telecommunications Company PJSC May 2014

Q Results. Emirates Integrated Telecommunications Company PJSC May 2014 Q1 214 Results Emirates Integrated Telecommunications Company PJSC May 214 Disclaimer Emirates Integrated Telecommunications Company PJSC (hereafter du ) is a telecommunication services provider in the

More information

Browser Bugs & Validation

Browser Bugs & Validation Browser Bugs & Validation SIPB Introduction to Web Design Wednesday, January 20th Jonté Craighead & Cathy Zhang 1 Lecture Overview A Brief Review: Layout Design Browser Bugs Validation Accessibility Site

More information

Setting up to download Grants Group Application Forms

Setting up to download Grants Group Application Forms Setting up to download Grants Group Application Forms Guidance on setting up Adobe Reader Although it is in common use, we recognise that you may not use Adobe Reader as your preferred pdf reader but it

More information

MYOB Enterprise Solutions

MYOB Enterprise Solutions Enterprise Solutions System Requirement Guidelines Last Updated: 16 May 2017 Contents Important Please Read Carefully 4 Quick Links 4 System Requirements 5 Overview... 5 Server Requirements... 6 Server

More information

World Wide Web. World Wide Web - how it works. WWW usage requires a combination of standards and protocols DHCP TCP/IP DNS HTTP HTML MIME

World Wide Web. World Wide Web - how it works. WWW usage requires a combination of standards and protocols DHCP TCP/IP DNS HTTP HTML MIME World Wide Web WWW usage requires a combination of standards and protocols DHCP TCP/IP DNS HTTP HTML MIME World Wide Web - how it works User on a machine somewhere Server machine Being more specific...

More information

Qualys Cloud Platform (VM, PC) v8.x Release Notes

Qualys Cloud Platform (VM, PC) v8.x Release Notes Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.16 December 14, 2018 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.

More information

BenefitFocus/HR InTouch Open Enrollment Instructions

BenefitFocus/HR InTouch Open Enrollment Instructions BenefitFocus/HR InTouch Open Enrollment Instructions To view or make changes to your benefits, you will need to use the HRInTouch/BenefitFocus online enrollment system. Listed below are login instructions

More information

To upgrade the switch firmware: 1. From the side navigation bar, select Unit View > Appliance > Overview to open the Unit Overview window.

To upgrade the switch firmware: 1. From the side navigation bar, select Unit View > Appliance > Overview to open the Unit Overview window. Updating GCM16, GCM32 (1754D1X, 1754D2X) firmware. Visit http://www.ibm.com/support/ and download the latest FLASH firmware from IBM. Save the FLASH upgrade file to the appropriate directory on the TFTP

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 1.0 Document date: May 2011 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Apple Push

More information

SYSTEM REQUIREMENTS M.APP ENTERPRISE

SYSTEM REQUIREMENTS M.APP ENTERPRISE SYSTEM REQUIREMENTS M.APP ENTERPRISE Description or Document Category October 06, 2016 Contents M.App Enterprise Server... 3 Hardware requirements... 3 Disk space requirements... 3 Production environment

More information

Banner Workflow Release Guide. Release 8.3 February 27, 2015

Banner Workflow Release Guide. Release 8.3 February 27, 2015 Banner Workflow Release Guide Release 8.3 February 27, 2015 Without limitation: Ellucian, Banner, Colleague, and Luminis are trademarks of the Ellucian group of companies that are registered in the U.S.

More information

SSL247 SHA-2 MIGRATION

SSL247 SHA-2 MIGRATION SSL247 SHA-2 MIGRATION Table of contents SHA-1 deprecation, moving to SHA-2...1 SHA-2 Compatibility...5 What is SHA-1 and why it is being deprecated?...1 OS, Browser and Server support...5 What is SHA-2?...1

More information

RBS NetGain Enterprise Manager Web Interface Multiple Vulnerabilities of 9

RBS NetGain Enterprise Manager Web Interface Multiple Vulnerabilities of 9 RBS-2017-003 NetGain Enterprise Manager Web Interface Multiple Vulnerabilities 2018-03-22 1 of 9 Table of Contents Vendor / Product Information 3 Vulnerable Program Details 3 Credits 3 Impact 3 Vulnerability

More information

World Broadcasting Unions Cyber Security Recommendations

World Broadcasting Unions Cyber Security Recommendations World Broadcasting Unions Cyber Security Recommendations Content Protection and Cyber Security Summit April 8, 2018 John C. Lee, P. Eng. Chairman, NABA Technical Committee NORTH AMERICAN BROADCASTERS ASSOCIATION

More information

Mapping to the National Broadband Plan

Mapping to the National Broadband Plan The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National

More information

Endpoint Security webrh Framework 3.0 Release Notes

Endpoint Security webrh Framework 3.0 Release Notes Endpoint Security webrh Framework 3.0 Release Notes Revised: May 18, 2010 This Release Notes document provides essential operating requirements and describes known issues for Endpoint Security webrh 3.0.

More information

Adobe Flash Player 12 Problems Windows 7 S

Adobe Flash Player 12 Problems Windows 7 S Adobe Flash Player 12 Problems Windows 7 S Hi all, I have been having trouble trying to install Adobe Flash Player on my new computer lately. The download I'm using Windows 7 Home Premium and I use Firefox

More information

TAG. For Microsoft Dynamics 365 Business Central. Installation Guide

TAG. For Microsoft Dynamics 365 Business Central. Installation Guide TAG For Microsoft Dynamics 365 Business Central Installation Guide Contents Chapter 1 : Introduction to TAG... 3 What s new in this release?.... 3 Chapter 2 : Installation and configuration... 4 Setting

More information

End User System Requirements. Marsh ClearSight, Marsh ClearSight Apps, Enterprise, Stars Discovery, and Stars Intake Release Version: 17.1.

End User System Requirements. Marsh ClearSight, Marsh ClearSight Apps, Enterprise, Stars Discovery, and Stars Intake Release Version: 17.1. End User System Requirements Marsh ClearSight, Marsh ClearSight Apps, Enterprise, Stars Discovery, and Stars Intake Release Version: 17.1.0 Contents Introduction... 4 End User Workstation Components...

More information

Using SQL Reporting Services with isupport

Using SQL Reporting Services with isupport isupport s SQL Reporting functionality is installed via the isupport SQL Reporting Setup Wizard; it includes several report models with isupport database fields, tables, and relationships. isupport includes

More information

CatPlan End User Guide

CatPlan End User Guide CatPlan End User Guide 10/9/2017 1 P age Table of Contents Supported Browsers...3 Logging in to CatPlan...3 Running Reports...5 Viewing Dashboards...8 Entering Data via Forms... 10 10/9/2017 2 P age Supported

More information

INSIGHTS, POWERED BY INSIDEVIEW

INSIGHTS, POWERED BY INSIDEVIEW INSIGHTS, POWERED BY INSIDEVIEW Installation Guide Product Version 4.0.1 MAY, 2017 Table of Contents Chapter 1: Introduction to Insights, powered by InsideView...2 What s New in this Release?... 3 Chapter

More information

Procedures for Units of Government Submitting Your List of Required Filers

Procedures for Units of Government Submitting Your List of Required Filers Procedures for Units of Government Submitting Your List of Required Filers You must use Google Chrome or Mozilla Firefox as your browser for accessing the Online Filing System. Your District will receive

More information

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS MYOB ENTERPRISE SOLUTIONS System Requirement Guidelines Version 2.9 Thursday 1 st May 2014 EXO BUSINESS MYOB ENT ER P R IS E S OLUT IONS Contents Important Please Read Carefully... 3 Quick Links... 3 System

More information

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0 Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the

More information

Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc

Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc This document describes the steps to configure the common web browsers for use with the City of Boise s webbased applications.

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

System requirements for Qlik Sense. Qlik Sense September 2017 Copyright QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense September 2017 Copyright QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense September 2017 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik,

More information

RBS OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution of 5

RBS OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution of 5 RBS-2017-001 OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution 2018-03-22 1 of 5 Vendor / Product Information OpenEMR is a Free and Open Source electronic health records and medical

More information

System requirements for Qlik Sense. Qlik Sense June 2018 Copyright QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense June 2018 Copyright QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense June 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech,

More information

Bell County District Attorney. E-Discovery Portal. Quick Guide for Attorneys. 3/17/2014 Version 1.2

Bell County District Attorney. E-Discovery Portal. Quick Guide for Attorneys. 3/17/2014 Version 1.2 Bell County District Attorney E-Discovery Portal Quick Guide for Attorneys 3/17/2014 Version 1.2 Information and System Requirements The E-Discovery portal has been developed to provide the District Attorney

More information

Nolij Transfer 6 Migration Planning & Preparation. Danielle Whitney Services Product Manager

Nolij Transfer 6 Migration Planning & Preparation. Danielle Whitney Services Product Manager Nolij Transfer 6 Migration Planning & Preparation Danielle Whitney Services Product Manager Introduction Preparation and Planning is key to every successful Nolij Transfer project. In this session we will

More information

Objective % Understand concepts for creating web-based digital media.

Objective % Understand concepts for creating web-based digital media. https://pixabay.com Objective 107.01 5% Understand concepts for creating web-based digital media. ExplorNet s Centers for Quality Teaching and Learning 1 Concepts of Web Design "Web design encompasses

More information

Legacy of Heartbleed: MITM and Revoked Certificates. Alexey Busygin NeoBIT

Legacy of Heartbleed: MITM and Revoked Certificates. Alexey Busygin NeoBIT Legacy of Heartbleed: MITM and Revoked Certificates Alexey Busygin busygin@neobit.ru NeoBIT Notable Private Key Leaks 2010 DigiCert Sdn Bhd. issued certificates with 512-bit keys 2012 Trustwave issued

More information

Jersey City Free Public Library WIFI Hotspot

Jersey City Free Public Library WIFI Hotspot 1. Windows 2000, XP, 7 and Vista Users: a. Select the wireless icon in the system tray. or or or b. Select the SSID of the library you are currently located: JCPL- c. Launch a web browser (Internet Explorer,

More information

Oracle Financial Services Price Creation and Discovery Application Pack

Oracle Financial Services Price Creation and Discovery Application Pack Oracle Financial Services Price Creation and Discovery Application Pack Installation and Configuration Guide Version 8.0.5.1.0 DOCUMENT CONTROL Version Number Revision Date Changes Done 1.0 Created: January

More information

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018 Our Commitment To Privacy PRIVACY POLICY Last Modified July 26, 2018 Please read this Privacy Policy carefully before using this online entertainment service. Access to and use of this online entertainment

More information

Getting Started in We Card Training:

Getting Started in We Card Training: Getting Started in We Card Training: The We Card elearning Center enables you to purchase training for yourself and/or your employees online using a credit card. For each employee, purchase a training

More information

PANNELL KERR FORSTER OF TEXAS, P.C. Client Portal NetClient CS Introduction Guide

PANNELL KERR FORSTER OF TEXAS, P.C. Client Portal NetClient CS Introduction Guide PANNELL KERR FORSTER OF TEXAS, P.C. Client Portal NetClient CS Introduction Guide Introduction to NetClient CS This Guide is designed for a CPA Firm s clients who will have access to the document management

More information

System requirements for Qlik Sense. Qlik Sense April 2018 Copyright QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense April 2018 Copyright QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense April 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech,

More information

INSIGHTS, POWERED BY INSIDEVIEW

INSIGHTS, POWERED BY INSIDEVIEW INSIGHTS, POWERED BY INSIDEVIEW Installation Guide Product Version 4.3 JANUARY, 2019 Table of Contents Chapter 1: Introduction to Insights, powered by InsideView...3 What s New in this Release?... 4 Chapter

More information

Table 1: Operators Authorized to Provide Public Fixed Domestic Telecommunications Services as at 2010

Table 1: Operators Authorized to Provide Public Fixed Domestic Telecommunications Services as at 2010 2. Fixed Telephony Market Data As at December 2010, there were eight (8) operators authorized to provide fixed domestic telecommunications services to the public over wired or wireless facilities. These

More information

Visual HTML5. Human Information Interaction for Knowledge Extraction, Interaction, Utilization, Decision making HI-I-KEIUD

Visual HTML5. Human Information Interaction for Knowledge Extraction, Interaction, Utilization, Decision making HI-I-KEIUD Visual HTML5 1 Overview HTML5 Building apps with HTML5 Visual HTML5 Canvas SVG Scalable Vector Graphics WebGL 2D + 3D libraries 2 HTML5 HTML5 to Mobile + Cloud = Java to desktop computing: cross-platform

More information

BenefitFocus Open Enrollment Instructions

BenefitFocus Open Enrollment Instructions BenefitFocus Open Enrollment Instructions To view or make changes to your benefits, you will need to use the BenefitFocus online enrollment system. Listed below are login instructions and helpful tips

More information

SAS STUDIO. A pretty big deal! Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d.

SAS STUDIO. A pretty big deal! Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. A pretty big deal! 1.12.2014 INTRODUCTION A pretty big deal! Web-based programming interface to SAS It runs in your browser, which means that end users don't have to install anything (when connecting to

More information

An Overview of the New Functionality in Campaign Manager 1.3

An Overview of the New Functionality in  Campaign Manager 1.3 Rev: 8 July 2011 Email Campaign Manager 1.3 What's New? An Overview of the New Functionality in Email Campaign Manager 1.3 Table of Contents Introduction...3 New Features...4 Harnessing Sitecore Engagement

More information

Perceptive Experience Web Scan

Perceptive Experience Web Scan Perceptive Experience Web Scan Technical Specifications Version: 2.2.x Written by: Product Knowledge, R&D Date: Wednesday, April 05, 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark

More information

CSS: Responsive Design, CSS3 and Fallbacks

CSS: Responsive Design, CSS3 and Fallbacks CSS: Responsive Design, CSS3 and Fallbacks CISC 282 October 4, 2017 What is a Mobile Browser? Browser designed for a not-desktop display Phones/PDAs, tablets, anything handheld Challenges and constraints

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation

Stochastic Modelling of Vulnerability Life Cycle and Security Risk Evaluation Journal of Information Security, 016, 7, 69-79 Published Online July 016 in SciRes. http://www.scirp.org/journal/jis http://dx.doi.org/10.436/jis.016.740 Stochastic Modelling of Vulnerability Life Cycle

More information

TLS 1.2 Browser Compatibility

TLS 1.2 Browser Compatibility TLS 1.2 Browser Due to security reasons, CUB Net banking site will be disabled on browser with SSL 1.0, SSL 2.0, SSL3.0 and TLS 1.0. The Net banking site will work on browsers with TLS 1.2 support. If

More information

UPLOADING AN IMAGE TO FACEBOOK AND MAKING IT YOUR PROFILE PICTURE

UPLOADING AN IMAGE TO FACEBOOK AND MAKING IT YOUR PROFILE PICTURE UPLOADING AN IMAGE TO FACEBOOK AND MAKING IT YOUR PROFILE PICTURE PART 1: UPLOADING AN IMAGE TO FACEBOOK 1. Open your web browser. This will most likely be Internet Explorer, Mozilla Firefox, Google Chrome

More information

Ruckus Wireless Security Advisory ID FAQ

Ruckus Wireless Security Advisory ID FAQ Multiple Vulnerabilities in DNSMASQ (CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, CVE-2017-14495, CVE-2017-14496, CVE-2017-13704, CVE-2015-3294) Initial Internal Release Date: 11/27/2017

More information

Portal Recipient Guide For Virtual Cabinet

Portal Recipient Guide For Virtual Cabinet Portal Recipient Guide For Virtual Cabinet Contents 1 Introduction... 3 2 Account Activation... 3 3 Forgotten Password... 6 4 Authenticating your Device & Browser... 9 5 Troubleshooting... 13 Page 2 of

More information

BRINGING OPENWRT TO MARKET

BRINGING OPENWRT TO MARKET BRINGING OPENWRT TO MARKET OPENWRT SUMMIT 2017 technicolor.com Introducing Technicolor We are known for Entertainment (film processing, special effects ) We also design and manufacture equipment for the

More information