Defining a Model for Defense in Depth
|
|
- Hugo Martin
- 5 years ago
- Views:
Transcription
1 Defining a Model for Defense in Depth James Sullivan, Michael Locasto University of Calgary LAW 2015 Sullivan / Locasto Modelling Defense in Depth LAW / 33
2 Introduction Key Problem Problem: What is the ideal way to arrange and configure a set of security mechanisms? What security mechanisms should be included? What should their layout be? How fail-safe is the arrangement? Cost-benefit analysis budgets are finite Sullivan / Locasto Modelling Defense in Depth LAW / 33
3 Introduction Challenges Why is this hard? There are many different flavors of security products, and most of them claim to be better than the rest Protect your devices with the best free antivirus on the market. Avast Antivirus, 2015 Buy now the best antivirus program for all your devices. Panda Security, award-winning FREE antivirus, spyware, & malware protection... AVG, award-winning security technologies that protect against the very latest threats... Kaspersky Security, 2015 Protects better and faster than the competition. Symantec, 2015 Sullivan / Locasto Modelling Defense in Depth LAW / 33
4 Introduction Challenges Why is this hard? System can be arranged in many ways
5 Introduction Challenges Why is this hard? Some mechanisms may negatively interfere with one another, and this is hard to predict.... it is possible to connect two systems, both of which are judged to be secure, such that the composite system is not secure. D. McCullough, D. McCullough. Noninterference and the composability of security properties. In: Security and Privacy, Proceedings., 1988 IEEE Symposium on. 1988, pp doi: /SECPRI Sullivan / Locasto Modelling Defense in Depth LAW / 33
6 Motivation Antivirus Composition Study Even if security mechanisms work well by themselves, there is no guarantee that they won t interfere with each other. A case study demonstrated this: Pairs of commodity Antiviruses installed on a single host Standard set of AMTSO 2 tests performed on the system Expected: Both Antiviruses pass the AMTSO tests (identifying and quarantining the malicious files), despite the other s presence. Actual: Some Antiviruses prevented the other from passing the EICAR tests. In some cases, both products failed the test simultaneously. 2 AMTSO Feature Settings Check. AMTSO. Sullivan / Locasto Modelling Defense in Depth LAW / 33
7 Motivation Antivirus Composition Study Structure of Study Results Five of the most popular commodity AVs installed pairwise in each order of installation AMTSO tests performed multiple times on the system with each pair Normalize by eliminating AVs that did not pass a given test in isolation (i.e. non-amtso-compliant AVs) Frequency of one AV failing to identify a file: 5.3% Frequency of both AVs failing to quarantine a file: 10.7% Sullivan / Locasto Modelling Defense in Depth LAW / 33
8 Approaches to System Design What techniques do we have to aid secure system design? 1 Trial and Error (Live testing) 2 Simulation 3 Modelling Sullivan / Locasto Modelling Defense in Depth LAW / 33
9 Approaches Trial and Error Set up a security configuration and measure its effectiveness. Gives the most accurate view of the effectiveness of the configuration Reactive security. Find a mistake, fix mistake, goto 1. Mistakes are expensive: Ideally, holes are found before the system is live Sullivan / Locasto Modelling Defense in Depth LAW / 33
10 Approaches Simulation Perform simulations of the system to measure its effectiveness. Simulation results can be close enough to actual results to make informed decisions How accurate does the simulation need to be? How to balance cost and accuracy? Where does input to the simulation come from? Canned traffic Live traffic (honeypots) Sullivan / Locasto Modelling Defense in Depth LAW / 33
11 Approaches Modelling Construct a simplified model of the system to analyze. Often the cheapest way to get information about a system A good model will both predict system properties and explain system behavior. Details are lost: How much information loss is acceptable? Sullivan / Locasto Modelling Defense in Depth LAW / 33
12 Approaches Ideally, some combination of these approaches is used to make informed decisions. Modeling Simulation Live Testing Quickly analyze many configurations Test select number of configurations Get live results about chosen configuration The sooner we find system flaws, the cheaper they are to fix. Sullivan / Locasto Modelling Defense in Depth LAW / 33
13 Approaches Our Contribution Defense Graphs: a modelling technique to aid secure system design. Complementary to simulation and live testing Provides quick analytical results about system behaviour Formalizes intuitions and best practices about system design Sullivan / Locasto Modelling Defense in Depth LAW / 33
14 Model Definitions Defense Graph: A directed, acyclic graph D representing a system of composed security mechanisms. Vertices: Security Mechanisms or Policy Selectors. Edges: Data path between vertices. A Defense graph has a unique entry point α and a unique target β. α is connected to all vertices and β is reachable from all vertices. Sullivan / Locasto Modelling Defense in Depth LAW / 33
15 Model Definitions Security Mechanism: An automaton that interprets some input language I and enforces a policy on it, emitting an output language O. We say that a mechanism accepts an input i I when i O. Conversely, a mechanism rejects an input i I if i O. Sullivan / Locasto Modelling Defense in Depth LAW / 33
16 Model Definitions Policy Selector: A point at which: Data is redirected or multiplexed (e.g. a switch) Host A Switch Internal GW External GW Firewall Server A number of independent data streams are combined and some decision is made based on their contents (e.g. all-or-nothing) Reject Accept Reject Accept Sullivan / Locasto Modelling Defense in Depth LAW / 33
17 Model Definitions Composition: Two mechanisms are composed if there is direct data path from one to the other. Two types of composition: Deterministic: Consistent order of operation on data stream. Non-Deterministic: Inconsistent order of operation. Treated as one mechanism n ij with a known input language I i I j but unknown output language. Deterministic Composition Mechanism Mechanism Non-Deterministic Composition Mechanism Mechanism Sullivan / Locasto Modelling Defense in Depth LAW / 33
18 Model Examples of Composition Deterministic Composition The typical case for a well-structured network E.g. An external firewall filters traffic before the internal IDS audits it Non-Deterministic Composition More commonly seen on single-host systems Race conditions on data access AV case study these constructs are unreliable and can cause strange failures in the mechanisms. Either can cause incorrect policy enforcement. Sullivan / Locasto Modelling Defense in Depth LAW / 33
19 Properties of Defense Graphs We define several properties which can be used to reason about Defense Graphs. Coverage: What type of input is instrumented? Redundancy: What proportion of that input is instrumented multiple times? Independence: Do mechanisms depend on each other to work properly? Are compositions present? Cost: What does the whole configuration cost? (Performance, budget, etc.) Sullivan / Locasto Modelling Defense in Depth LAW / 33
20 Properties Coverage Coverage refers to the types of inputs which the system can make policy decisions about. Each mechanism m has coverage C(m) = I. The entire system s coverage is: C(D) = M i=0 C(m i ) Or the union of all of the mechanisms coverage. Sullivan / Locasto Modelling Defense in Depth LAW / 33
21 Properties Redundancy Redundancy between two mechanisms is the proportion of the overlap in their coverage sets. Mechanisms m 1, m 2 have redundancy R(m 1, m 2 ) = C(m 1) C(m 2 ) C(m 1 ) C(m 2 ). The entire system s redundancy is the total overlap between all pairs. R(D) = 2 M M R(m i, m j ) i=0 j i M 2 M Sullivan / Locasto Modelling Defense in Depth LAW / 33
22 Properties Independence Independence means that a mechanism does not rely on the correct output of another mechanism. If there is a walk from one mechanism to another, then the output of the first mechanism decides the input to the next thus, there is dependency. { 0 : w = (α,..., m 1 ) with m 2 w I (m 1, m 2 ) = 1 : otherwise The independence of the system is the proportion of independent pairs to the total number of pairs: I (D) = M 2 M i=0 j=0,j i M 2 M I (m i, m j ) Sullivan / Locasto Modelling Defense in Depth LAW / 33
23 Intuition about Independence Independence is a desirable property of a system. Prevents mechanism composition m i, m j are composed = I (m i, m j ) = 0 or I (m j, m i ) = 0 I (m i, m j ) = 1 or I (m j, m i ) = 1 = m i, m j are not composed. Incorrect decisions by one mechanism don t affect the other However, dependence is a natural property of linear data processing, and of layering security mechanisms in sequence. Sullivan / Locasto Modelling Defense in Depth LAW / 33
24 Dependency Hurts... i f ( ( e r r = SSLHashSHA1. update (&hashctx, &serverrandom ) )!= 0) goto f a i l ; i f ( ( e r r = SSLHashSHA1. update (&hashctx, &signedparams ) )!= 0) goto f a i l ; goto f a i l ; i f ( ( e r r = SSLHashSHA1. f i n a l (&hashctx, &hashout ) )!= 0) goto f a i l ;... Empty if Entry if if s All input fail Sullivan / Locasto Modelling Defense in Depth LAW / 33
25 Properties Cost Cost is some measurement of the expense of a set of mechanisms and their arrangement. A number of possible metrics: Performance of the system (packet throughput) Resource Consumption of the system Financial Cost For example, if J is a set of computational tasks and T (D, J) is the total time taken to run the task by a system with defense graph D, then cost is given by: P(D) = J i=0 Where D 0 is the unprotected system. T (D, j i ) T (D 0, j i ) Sullivan / Locasto Modelling Defense in Depth LAW / 33
26 The Optimal Configuration We can derive a configuration that maximizes the C,R,I properties: Entry Selector Mechanism 1 Mechanism 2... Mechanism n AND Clearly, this isn t what our systems look like. But this configuration prevents any interference between policy decisions. Target Sullivan / Locasto Modelling Defense in Depth LAW / 33
27 Applying Defense Graphs A model should be able to satisfy two requirements: Explanatory: The model should be able to explain phenomena and observations about a system within its own language. Predictive: The model should also be able to predict some properties about an underlying system. We demonstrate the explanatory abilities of our model showing its predictive abilities requires further work. Sullivan / Locasto Modelling Defense in Depth LAW / 33
28 Saltzer & Schroeder s Principles Saltzer and Schroeder defined well-known security principles in We can express these security principles in the Defense Graph model. Economy of Mechanism: Keep the design as simple and small as possible. Complex structures (such as non-deterministic compositions) should be avoided in a Defense Graph in favour of simple and reliable constructs. More mechanisms may not give more security (and can increase the dependencies in the system). 3 Jerome H Saltzer and Michael D Schroeder. The protection of information in computer systems. In: Proceedings of the IEEE 63.9 (1975), pp Sullivan / Locasto Modelling Defense in Depth LAW / 33
29 Saltzer & Schroeder s Principles Complete Mediation: Every access to every object must be checked for authority. If the coverage of the system is low, there will be many inputs to the system that have no policies enforced on them, exposing the target to arbitrary data. Sullivan / Locasto Modelling Defense in Depth LAW / 33
30 Contributions of Defense Graphs Defense Graphs are: A tool to identify regions of complexity and composition in a system A tool to make dependency relationships explicit in a system A tool to analyze and predict basic properties of a system arising from its layout Defense Graphs are not: A tool to determine what will happen when two mechanisms compose Instead, they tell us which mechanisms are at risk of composition A tool to determine the Optimal layout of a system But we can eliminate anti-patterns or encourage stronger patterns A replacement for other analysis techniques Complementary to testing, static analysis, simulation, etc. Sullivan / Locasto Modelling Defense in Depth LAW / 33
31 Conclusion Defense Graphs are a formal modelling tool which put the focus on the layout of security mechanisms. Makes anti-patterns and points of composition apparent in the system Allows for simple analysis of properties of a system Can be used to re-define intuitions about security, and some known principles Sullivan / Locasto Modelling Defense in Depth LAW / 33
32 Future Work Model building is iterative, and there are many areas to expand on. Capture other types of security mechanisms Analyze the ability of the model to predict properties of systems Identify some common anti-patterns in insecure systems Develop tools to automate the generation and analysis of Defense Graphs Sullivan / Locasto Modelling Defense in Depth LAW / 33
33 Questions? Sullivan / Locasto Modelling Defense in Depth LAW / 33
Free antivirus software download
Cari untuk: Cari Cari Free antivirus software download 3-11-2015 Avast has one of the most popular antivirus apps around, due in part to offering a free version, and it's one that performs respectably.
More informationFree Download BitDefender Client Security 1 Year 50 PCs softwares download ]
Free Download BitDefender Client Security 1 Year 50 PCs softwares download ] Description: The foundation of business security The security requirements for any new or existing company no matter how large
More informationFree antivirus software download windows 10
Free antivirus software download windows 10 Search Free software download,the biggest software directory for freeware and shareware download at brothersoft.com. 2-3-2018 Protect your devices with the best
More informationFirewall Antivirus For Windows Xp Avast 2012 With Key
Firewall Antivirus For Windows Xp Avast 2012 With Key Provides also antispam and firewall protection from latest internet threats. You need at least Windows XP (with SP2) installed. Windows Vista, 7, 8,
More informationRemove Mcafee Antivirus Plus 2013 Link Version For 90 Days
Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days Meanwhile McAfee Antivirus Plus insisted that my AV subscription expired, and I am getting tech help to remove it and put Microsoft essentials
More informationReview antivirus software for windows 7. Review antivirus software for windows 7.zip
Review antivirus software for windows 7 Review antivirus software for windows 7.zip 5 days ago Don't rely on Microsoft's very own Windows Defender to keep you safe. I recently registered on their Zone
More informationCracked BitDefender Client Security 2 Years 20 PCs lowest price software ]
Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ] Description: The foundation of business security The security requirements for any new or existing company no matter how large
More informationMIS Week 6. Operating System Security. Windows Antivirus
MIS 5170 Operating System Security Week 6 Windows Antivirus Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Malware/Spyware Detection tools Antivirus Sniffers Assignment 3 Overview
More informationDownload antivirus free
Download antivirus free The Borg System is 100 % Download antivirus free ransomware and other threats. Download for free. DOWNLOAD YOUR KASPERSKY ANTIVIRUS FREE TRIAL. Enjoy the 30-day free trial of Kaspersky
More informationHow To Remove Personal Antivirus Security Pro Virus
How To Remove Personal Antivirus Security Pro Virus When hackers break into government servers to steal your personal data, there's not a The independent labs uniformly heap praise on Kaspersky Anti-Virus
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationHow To Remove A Virus Manually Windows 7 Without Antivirus Security Pro
How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro Security Defender is a fake antivirus program, it should not be trusted, since it is a The program usually installs on PCs without
More informationSecond International Barometer of Security in SMBs
1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.
More informationFirewall Antivirus For Windows Xp Full Version 2013
Firewall Antivirus For Windows Xp Full Version 2013 Advanced Firewall, Antivirus & Anti-spyware Engine, Advanced Real-Time Antivirus, Enhanced Browser Protection, Identity Protection, Anti-Keylogging,
More informationManual Update Avg Antivirus 2012 Full Version For Windows 7
Manual Update Avg Antivirus 2012 Full Version For Windows 7 AVG Antivirus software updates. Stay secure by Implemented support for Windows 10. Program Fixed issue with setup freeze during the process of
More informationModelling Cyber Security Risk Across the Organization Hierarchy
Modelling Cyber Security Risk Across the Organization Hierarchy Security issues have different causes and effects at different layers within the organization one size most definitely does not fit all.
More informationHow To Remove Personal Antivirus Security Pro Virus Manually
How To Remove Personal Antivirus Security Pro Virus Manually Uninstall Antivirus Pro 2017 Virus (Manual Removal Guide) This type of virus uses false scan results and fake security alerts to scare computer
More informationNorton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best
Norton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best Search 4 days ago. However, Windows antivirus tools still play an important role in the enterprise security strategy..
More informationHow To Remove Personal Antivirus Security Pro From Registry
How To Remove Personal Antivirus Security Pro From Registry This page contains step by step instructions on how to remove Malware Defender 2015 to remove the viruses you will be submitting your personal
More informationGet BitDefender Client Security 2 Years 30 PCs software suite ]
Get BitDefender Client Security 2 Years 30 PCs software suite ] Description: The foundation of business security The security requirements for any new or existing company no matter how large or small -
More informationAnti-Virus Comparative
Anti-Virus Comparative Malware Protection Test Consumer Products File Detection Test with Execution including false alarm test Language: English March 2018 Last Revision: 13 th April 2018 Table of Contents
More informationCS6501: Great Works in Computer Science
CS6501: Great Works in Computer Science Jan. 29th 2013 Longze Chen The Protection of Information in Computer Systems Jerome H. Saltzer and Michael D. Schroeder Jerry Saltzer Michael Schroeder 1 The Meaning
More informationWhy Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER
Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware WHITE PAPER Introduction Machine Learning (ML) is based around the idea machines can learn from data. ML techniques have been around
More informationCERT C++ COMPLIANCE ENFORCEMENT
CERT C++ COMPLIANCE ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO MAINTAIN COMPLIANCE SIMPLIFY AND STREAMLINE CERT C++ COMPLIANCE The CERT C++ compliance module reports on dataflow problems, software defects,
More informationMIS Week 6. Operating System Security. Windows Antivirus
MIS 5170 Operating System Security Week 6 Windows Antivirus Tonight s Plan 2 Questions from Last Week Review on-line posts In The News Malware/Spyware Detection tools Antivirus Sniffers Assignment 3 Overview
More informationAvast Anti Virus Manual Guide 2013 Full Version
Avast Anti Virus Manual Guide 2013 Full Version Usually, with a new version, the End User License Agreement (EULA) is also updated. You may read it in full PDF version, but in short Avast collects information
More informationCSC D70: Compiler Optimization Register Allocation
CSC D70: Compiler Optimization Register Allocation Prof. Gennady Pekhimenko University of Toronto Winter 2018 The content of this lecture is adapted from the lectures of Todd Mowry and Phillip Gibbons
More informationReview Kaspersky Internet Security - multi-device 2015 online software downloader ]
Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Description: Benefits Protecting all your connected devices the one-licence, easy-touse solution Kaspersky Internet Security
More informationDEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER
DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER D-Zone DNS Firewall 18-10-20171 EXECUTIVE SUMMARY Cyber attacks continue to grow at an alarming rate with ransomware
More informationSecuring the SMB Cloud Generation
Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product
More informationSecuring Your Business Against the Diversifying Targeted Attacks Leonard Sim
Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2
More informationUnderstanding and Automatically Preventing Injection Attacks on Node.js
Understanding and Automatically Preventing Injection Attacks on Node.js Michael Pradel TU Darmstadt Joint work with Cristian Staicu (TU Darmstadt) and Ben Livshits (Microsoft Research, Redmond) 1 Why JavaScript?
More informationFIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?
WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take
More informationTesting Exploit-Prevention Mechanisms in Anti-Malware Products
Testing Exploit-Prevention Mechanisms in Anti-Malware Products Andreas Marx & Maik Morgenstern AV-Test GmbH, Magdeburg, Germany http://www.av-test.org Presented at the CARO Workshop 2009 in Budapest, Hungary
More informationBASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide
BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...
More informationSingle Product Review. escan Internet Security 11. Language: English September 2010 Last revision: 13 nd October
Single Product Review escan Internet Security 11 Language: English September 2010 Last revision: 13 nd October 2010-1 - Content Downloading and installing the trial version... 3 Post-installation... 4
More informationReview BitDefender Business Security 2 Years 1000 PCs free pc software downloading sites ]
Review BitDefender Business Security 2 Years 1000 PCs free pc software downloading sites ] Description: BitDefender Business Security is a robust and easy to use business security and management solution
More informationSE Labs Test Plan for Q Endpoint Protection : Enterprise, Small Business, and Consumer
Keywords: anti-malware; compliance; assessment; testing; test plan; template; endpoint; security; SE Labs SE Labs and AMTSO Preparation Date : December 18, 2017 Version 1.2 SE Labs Test Plan for Q1 2018
More informationProxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking
NETWORK MANAGEMENT II Proxy Servers Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking resources from the other
More informationDigital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS
Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS Digital Forensics Readiness: PREPARE BEFORE AN INCIDENT HAPPENS 2 Digital Forensics Readiness The idea that all networks can be compromised
More informationLecture 6. Register Allocation. I. Introduction. II. Abstraction and the Problem III. Algorithm
I. Introduction Lecture 6 Register Allocation II. Abstraction and the Problem III. Algorithm Reading: Chapter 8.8.4 Before next class: Chapter 10.1-10.2 CS243: Register Allocation 1 I. Motivation Problem
More informationIn this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,
In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided
More informationInsecurity in Security Software
Insecurity in Security Software Maik Morgenstern Andreas Marx AV-Test GmbH http://www.av-test.org Virus Bulletin 2005 Conference presentation about Insecurity in Security Software Copyright 2005 AV-Test
More informationAmbiguous Grammars and Compactification
Ambiguous Grammars and Compactification Mridul Aanjaneya Stanford University July 17, 2012 Mridul Aanjaneya Automata Theory 1/ 44 Midterm Review Mathematical Induction and Pigeonhole Principle Finite Automata
More informationOptimization of Firewall Rules
Optimization of Firewall Rules Tihomir Katić Predrag Pale Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia tihomir.katic@fer.hr predrag.pale@fer.hr
More informationMRG Effitas Real Time Protection Test Project, First Quarter Q MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)
MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013) 1 Contents: Introduction 3 Security Applications Tested 3 Methodology used in the Test 4 Samples Used 5 Test Results 6 Conclusions
More informationSymantec Antivirus Manual Removal Tool Corporate Edition 10.x
Symantec Antivirus Manual Removal Tool Corporate Edition 10.x Learn how to download and run the Norton Removal Tool to uninstall the Norton products from your Looking for a free Virus and Spyware removal
More informationPAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) Table of Contents Introduction 03 Who is affected by PCI DSS? 05 Why should my organization comply 06 with PCI DSS? Email security requirements 08
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationRTTL Certification Test - March Language: English. March Last Revision: 8 th April
RTTL Certification Test March 2016 Language: English March 2016 Last Revision: 8 th April 2016-1 - Introduction 1 st AMTSO Real Time Threat List (RTTL) based certification test What is the RTTL? The Real-Time
More informationCoupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ]
Coupon BitDefender Corporate Security 3 Years 10 PCs internet download software for pc ] Description: BitDefender Corporate Security is a robust and easy to use business security and management solution
More informationHow To Removing Personal Antivirus Security Pro From Windows 8
How To Removing Personal Antivirus Security Pro From Windows 8 Antivirus Action, Antivirus Monitor, Antivirus 7 or Antivirus5, Antivirus 8, Antivirus 8 Fast Windows Antivirus 2011, Fix Clean Repair, Flu
More informationKaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,
Among the several Internet Security Suites available for the Windows operating system, is Kaspersky Internet Security (KIS). The latest version Kaspersky Internet Security is pretty impressive in terms
More informationHow To Remove Xp Internet Security 2011 Virus Manually
How To Remove Xp Internet Security 2011 Virus Manually Contact your anti-malware vendor for assistance with identifying or removing virus or worm infections. If you need more help with malware removal
More informationIdentity-Based Cyber Defense. March 2017
Identity-Based Cyber Defense March 2017 Attackers Continue to Have Success Current security products are necessary but not sufficient Assumption is you are or will be breached Focus on monitoring, detecting
More informationIntroduction to Assurance
Introduction to Assurance Overview Why assurance? Trust and assurance Life cycle and assurance April 1, 2015 Slide #1 Overview Trust Problems from lack of assurance Types of assurance Life cycle and assurance
More informationComponent Protection Metrics for Security Product Development: CheckVir Endpoint Test Battery
Component Protection Metrics for Security Product Development: CheckVir Endpoint Test Battery Ferenc Leitold Veszprog Ltd. fleitold@veszprog.hu Kai Yu Trend Micro, China kai_yu@trendmicro.com.cn Anthony
More informationPrevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,
Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationWebroot SecureAnywhere Business Endpoint Protection
Single Product Test Head-to-Head Comparison VIPRE Endpoint Security - Cloud Edition Webroot SecureAnywhere Business Endpoint Protection Language: English October 2017 Last revision: 3 rd November 2017-1
More informationAvast Antivirus 2013 Full Version With Key For Windows 7 Ultimate 32 Bit
Avast Antivirus 2013 Full Version With Key For Windows 7 Ultimate 32 Bit Avast Free Antivirus 2015 has added utilities to an already comprehensive set of It also finds software updates for installed programs,
More informationWindows Server Network Access Protection. Richard Chiu
Windows Server 2008 Network Access Protection Richard Chiu Network Access Protection Solution Overview Policy Validation Determines whether the computers are compliant with the company s security policy.
More informationKaspersky Small Office Security 5. Product presentation
Kaspersky Small Office Security 5 Product presentation CONTENTS 1 Target audience challenges and product info 3 Selling tips 2 4 Product overview Competitive overview 2 SMALL COMPANIES CHALLENGES General
More informationThe Internet of Things. Steven M. Bellovin November 24,
The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)
More informationHow to develop a website content evaluation plan
How to develop a website content evaluation plan Realistically, content evaluation isn t a top priority for website owners. Finding the time to produce new content is hard enough. But we are missing a
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Host Intrusion The Host Intrusion employs a response to a perceived incident of interference on a host-based system
More informationHow to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis
White paper How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis AhnLab, Inc. Table of Contents Introduction... 1 Multidimensional Analysis... 1 Cloud-based Analysis...
More informationHow To Remove Personal Antivirus Security Pro Virus Windows 8
How To Remove Personal Antivirus Security Pro Virus Windows 8 When hackers break into government servers to steal your personal data, there's As for just relying on the antivirus built into Windows 8.x,
More informationAvast Anti Virus Manual Guide 2013 Full Version For Windows Xp
Avast Anti Virus Manual Guide 2013 Full Version For Windows Xp Maximum virus and anti-spyware security solution for your Windows desktop. Provides Avast Free Antivirus Use our secure personal firewall
More informationSchematic Antivirus For Windows Bit Full Version
Schematic Antivirus For Windows 8.1 64 Bit Full Version Windows 8.1 except RT and Starter Edition (32 or 64-bit), Windows 8 except RT and Avast Free Antivirus 2015 is not supported on Microsoft Windows
More informationAvg Antivirus For Windows Xp Full Version 2013 With Key
Avg Antivirus For Windows Xp Full Version 2013 With Key AVG AntiVirus FREE 2013 provides advanced protection for web surfing, 2000, Windows XP, Windows Vista, Windows 7, Windows 7 x64, Windows Vista x64,
More informationMRG Effitas 360 Degree Assessment & Certification Q1 2018
MRG Effitas 360 Degree Assessment & Certification Q1 2018 1 Contents Introduction... 3 Executive Summary... 3 Certification... 4 The Purpose of this Report... 5 Tests Employed... 6 Security Applications
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationSpecialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com
Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting
More informationCYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION
SELF-AUDIT GUIDE CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION A Primer for Moving Beyond AV and Firewalls 1 The Problem As software systems become more distributed and interactive
More informationSoftware-Defined Secure Networks. Sergei Gotchev April 2016
Software-Defined Secure Networks Sergei Gotchev April 2016 Security Trends Today Network security landscape has changed. CISOs Treading Water Pouring money into security, yet not any more secure - Average
More informationBitcoin, Security for Cloud & Big Data
Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).
More informationACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems
ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been
More informationMRG Effitas 360 Degree Assessment & Certification Q4 2017
MRG Effitas 360 Degree Assessment & Certification Q4 2017 1 Contents Introduction... 3 Executive Summary... 3 Certification... 4 The Purpose of this Report... 5 Tests Employed... 6 Security Applications
More informationHow To Remove Live Security Platinum Virus Using Mcafee
How To Remove Live Security Platinum Virus Using Mcafee This article helps you determine what to do if you discover or suspect a virus For current information about viruses and threats, always use the
More informationWho We Are.. ideras Features. Benefits
:: Protecting your infrastructure :: Who We Are.. ideras Features Benefits Q&A Infosys Gateway Sdn Bhd. Incorporated in 2007 Bumiputra owned Company MSC Status Company Registered with Ministry of Finance
More informationQuestions to Add to Your Network Access Control Request for Proposal
Questions to Add to Your Network Access Control Request for Proposal Complete and real-time NAC is achievable if you ask the right questions September 2006 United States 1 Blue Hill Plaza Pearl River,
More informationManaging Network Bandwidth to Maximize Performance
Managing Network Bandwidth to Maximize Performance With increasing bandwidth demands, network professionals are constantly looking to optimize network resources, ensure adequate bandwidth, and deliver
More informationAvg Antivirus Manual Latest Version 2012 Offline Installer
Avg Antivirus Manual Latest Version 2012 Offline Installer 13 Mar 2010 How to manually update AVG Free Anti Virus: Brought to you by How 15 Sep 2014 Download AVG 2015 Offline Installer using the direct
More informationQUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server Click here to download the most recent version of this document
QUICK START GUIDE Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011 Click here to download the most recent version of this document ESET NOD32 ANTIVIRUS PROVIDES STATE-OF-THE-ART PROTECTION
More informationUP L13: Leveraging the full protection of SEP 12.1.x
UP L13: Leveraging the full protection of SEP 12.1.x Hands on lab Description In this hands on lab you will learn about the different protection technologies bundled in SEP 12.1.x and see how they complement
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationHow To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program
How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program How to find out if malware--a Trojan, virus, or worm got past your anti-virus and firewall, how to remove the malicious code manually.
More informationGet Max Internet Security where to buy software for students ]
Get Max Internet Security where to buy software for students ] Description: Features of Max Secure Internet Security 2013 Exciting, Easy to understand GUI Easy, Quick installation Get immediate protection
More informationBrief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation.
Brief to the House of Commons Standing Committee on Industry, Science and Technology on the review of Canada s Anti-Spam Legislation October 5, 2017 1. Introduction The Email Sender and Provider Coalition
More informationHome Anti-Virus Protection
Home Anti-Virus Protection JULY - SEPT 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware products
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More informationIntroduction. The Safe-T Solution
Secure Internal File Access Product Brief Contents Introduction 2 The Safe-T Solution 2 How It Works 3 Capabilities 4 Benefits 5 5 Access Component 5 Data Exchange Component 8 Introduction Sensitive data
More informationHome Anti-Virus Protection
Home Anti-Virus Protection OCTOBER - DECEMBER 2013 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationAnti-Virus Comparative Summary Report 2008
Anti-Virus Comparative Summary Report 2008 Awards, winners, comments Date: December 2008 Last revision: 9 th December 2008 Website: http://www.av-comparatives.org 1. Introduction At the end of every year,
More informationFOR macos. Quick Start Guide. Click here to download the most recent version of this document
FOR macos Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based
More informationCIS 5373 Systems Security
CIS 5373 Systems Security Topic 3.1: OS Security Basics of secure design Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Dan Boneh (Stanford)
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More informationEnterprise Anti-Virus Protection
Enterprise Anti-Virus Protection JANUARY - MARCH 2014 Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to compare the effectiveness of anti-malware
More information