Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework
|
|
- Jeffrey Welch
- 6 years ago
- Views:
Transcription
1 Shieldig Eterprises from Evolvig Cyber Attacks with a Digital Security Framework Abstract As the IT ladscape evolves, cyber threat actors also mature i respose developig ew techiques to compromise the security posture of eterprises. Some compaies take a proactive stace agaist these breaches, while most adopt reactioary oe-off measures. This begs the questio: will a predictive approach be more effective? Armed with a well-de ed strategy, compaies ca build a digital security fortress while esurig their IT ifrastructure cotiues to mature ad stregthe i the face of potetial threats. Ulike most oe-stop solutios, such a process-orieted jourey starts with due diligece, moves ito thorough security testig, creates a auditory framework, ad ally trasforms ito a robust goverace model.
2 From Reactive to Proactive ad Predictive Cyber Security I recet times, a umber of eterprises have falle prey to cyber-attacks, ad reportedly, the damages caused are i expected to reach USD 6 millio aually by For hackers, the focus has shifted from targetig etwork ad system level vulerabilities to ruig applicatio level exploits across idustries, particularly i the acial sectorii. Rather tha ivestig i itrusio detectio systems (IDS), eterprises should implemet a holistic vulerability maagemet program that esures fewer security breaches. Traditioal security tools, such as IDS ad rewalls, have so far bee ieffective i prevetig DoS attacks despite regular scas of applicatios ad the overall IT ifrastructure. These systems cotiue to exhibit security defects like cross site scriptig (XSS) aws. These issues are further exacerbated with orgaizatios diversifyig their IT portfolio ad lies of busiess, wherei cyber security takes precedece oly durig the al stages of 'go live' movig the applicatios from the testig to productio eviromet. To de e, build, ad implemet a ef ciet ad effective eterprise security strategy, orgaizatios will eed to formulate strog delivery ad operatioal models. These models must have a suitable auditory ad goverace framework that esures effective implemetatio, ideti es gaps, ad recommeds steps for improvig the security posture. Such a eterprise security maagemet program should largely have four stages: Stage 1: Security Cosultig (Due Diligece) Also kow as the 'as is study' ad 'process de ig' phase, the rst step is to correctly asses the eterprise security posture ad study existig processes ad cotrols i lie with various idustry stadards such as Natioal Istitute of Stadards ad Techology (NIST). The ext step ivolves developig a detailed threat pro le that best suits the eterprise's IT ladscape, lies of busiess, ad the overall idustry. This will act as the baselie to assess, aalyze, ad categorize IT assets with respect to potetial attack risks ad damages. Orgaizatios ca the prioritize those assets that require more time ad ivestmet. This will help i formulatig a prioritized security assessmet pla that covers the etire IT
3 portfolio, ad also de es speci c delivery models for uique test cases (Figure 1). Scope Fializa o Defie i-scope ad out of scope for the due diligece activity Idetify key stakeholders Defie assessmet pla, schedule ad deliverables Scope validatio ad sig off Iforma o Gatherig Assessmet & Aalysis Gather iformatio o all i-scope asset ivetory Gai uderstadig of the techical, fuctioal ad busiess requiremets Formulate assumptios, prerequisites ad depedecies Formulate threat profile Assess asset ivetory/ladscape Aalyze process from security perspective Idetify gaps, formulate pla for security assessmet/testig As-Is Study A Risk-Based Approach Figure 1: Steps for Due Diligece Stage 2: Security Assessmet ad Testig This stage ivolves code reviews ad tests to idetify performace, security, or reliability aws i applicatios before they go live. Eterprises will eed to perform periodic automated vulerability scas ad maual tests to discover security defects ad de e remediatio measures. Security testig eeds to be a methodical approach cosiderig the busiess, fuctioal, ad techical priorities of the i-scope IT elemets, which icludes web-facig applicatios, thick cliets, desktop applicatio, work statios, ad so o. With the help of a detailed assessmet report, eterprises will gai a better uderstadig of the curret security posture ad gai isights ito speci c issues ad their respective severity levels, issue reproductio steps, ad remediatio measures to be implemeted. Stage 3: Auditig, Moitorig, ad Traiig While periodic assessmet ad testig is coducted, it is imperative to evaluate the effectiveess of these activities ad idetify gaps, if ay. The auditig process must be i lie with idustry stadards such as Federal Iformatio Security Maagemet Act (FISMA), ad the guidelies ad scopes will deped o the lie of busiess or idustry. Each ideti ed gap must have a correspodig corrective measure alog with a speci c implemetatio timelie. This will esure a holistic closure of the issue ot just for the ideti ed istace but also at the applicatio's code or framework level. This would the be revalidated ad co rmed by the iteral security testig ad audit team. The primary aim is to re e ad ehace the curret testig or assessmet activity ad improvise.
4 Based o the digs from these audits, eterprises ca pla ad coduct security awareess sessios, classroom or web traiig, ad certi catio programs. These should cover: Ethical hackig Secure SDLC Secure codig OWASP top 10 OSSTMM BSSIMM Agile security DevOps Cloud security Stage 4: Security Goverace The ext step is to establish a robust goverace program usig the ope software assurace maturity model (ope SAMM) as the baselie (Figure 2). This model will help de e the broad busiess fuctios ad the associated security policies ad frameworks, which ca be customized as per requiremets. This will be followed by formulatig detailed security stadards ad guidelies for every process or work stream accordig to idustry stadards. SAMM Overview Software Developmet Busiess Fuctios Goverace Strategy & Metrics Educatio & Guidace Policy & Compliace Costructio Security Requiremets Threat Assessmet Veri catio Desig Review Secure Architecture Security Practices Figure 2: SAMM Overviewiii Threat Assessmet Secure Architecture Deploymet Eviromet Hardeig Opera oal Eablemet Vulerability Maagemet
5 I order to achieve applicatio security maturity, orgaizatios will require policies ad guidelies caterig to secure SDLC cosultig ad implemetatio, as well as agile ad DevOps security maagemet as per NIST, ISO, BSSIMM, OSSTMM, ad similar stadards. Similarly, the ifrastructure elemets will eed to establish security priciples based o NIST, ISACA ad ISO. The ext step would be to strategize ad establish a eterprise wide vulerability maagemet program which icludes IT security risk assessmet ad maagemet, vulerability maagemet addressig the applicatio ladscape, ad ifrastructure elemets. This eterprise security goverace ad compliace strategy must be approved ad subsequetly supported by seior maagemet for effective implemetatio. The goverig body overseeig the audit ad moitorig activities should ideally be accoutable to the CISO ad the board of directors. Implemetig the Right Delivery Models The success of such a strategy depeds o the effective implemetatio of a layered delivery mode (Figure 3), supported by either a dedicated team or through SLA-drive shared services. Shared Model Maagemet Layer Customer-owed or Self-owed Tools Aalysis Layer Sca Layer Shared Model Customer 1 Customer 2 Customer 1 Customer 2 Customer 3 Customer 3 Dedicated Team Dedicated Team Dedicated Team Dedicated Tools Dedicated Tools Dedicated Tools Delivery SPOC Delivery SPOC Delivery SPOC Figure 3: A Layered Delivery Model
6 Each layer core operatioal, fuctioal, ad strategic should be staffed per the skills required to execute the required activities. For hadlig oe-off tasks, idividuals with the ecessary capabilities ca be deployed while for larger programs, a etire team ca be assiged. While formulatig the delivery model, eterprises must factor i cost, quality, ad turaroud time. Joureyig through the Stages of Security Maturity For ay orgaizatio, the mai objective will be to trasitio from a reactive to predictive maagemet of iformatio security. The reactive approach teds to be more evet-drive, where oe establishes a defese mechaism after a breach or attack has occurred. Istead, eterprises eed to be more proactive, implemet layered security solutios, coduct periodic assessmets, ad close the gaps before the systems are breached. This will evetually help them move to a predictive model aalyzig threat vectors ad metrics, ad focusig o buildig ad implemetig a more cohesive security solutio. These stages have bee highlighted i Figure 4. Reactive (Evet Drive) Defesive strategy Log aalysis Perimeter moitorig solutios Evet drive ad retrospective metrics Proactive (Defese i Depth) Layered ad itegrated solutio Automated scas ad aalysis, secure code reviews Risk, audit, ad compliace maagemet Predictive (Predictive & Prospective) Offesive ad cotextual approach Predictive aalysis ad modelig Threat itelligece Patter drive ad prospective metrics Figure 3: A Layered Delivery Model Securig the Road Ahead The security uit withi ay orgaizatio must be empowered with the ability to either remediate or root out cases of ocompliace. This uit must be moitored ad complemeted by a equally strog audit ad goverace team, which directly works with ad reports to seior maagemet. Eterprises with
7 a global footprit operatig multiple lies of busiess should adopt a top-dow approach to successfully implemet such strategies. While there is o silver bullet whe it comes to esurig security, the battle agaist cyber threats ca be wo through meticulous strategic plaig. Refereces i] gures-adstatistics-for-2017.html ii] iii]
8 About The Author Diesh Sawriraja Diesh Sawriraja is a Iformatio Security Cosultat ad Delivery Lead with the Cyber Security Practice at Tata Cosultacy Services (TCS). He has more tha ie years of experiece i applicatio security, risk maagemet, ad data security. He has worked with may leadig eterprises icludig oe of the Big Four audit ad cosultig firms, a major Australia retailer, ad for the British govermet. Diesh is a mechaical egieer ad has a double masters i Maagemet Operatios, ad Marketig ad Fiace Cotact Visit the TCS Cyber Security page o cyber.security@tcs.com Subscribe to TCS White Papers TCS.com RSS: Feedburer: Tata Cosultacy Services is a IT services, cosultig ad busiess solutios orgaizatio that delivers real results to global busiess, esurig a level of certaity o other firm ca match. TCS offers a cosultig-led, itegrated portfolio of IT ad IT-eabled, ifrastructure, egieerig ad assurace services. This is delivered through its uique Global Network Delivery ModelTM, recogized as the bechmark of excellece i software developmet. A part of the Tata Group, Idia s largest idustrial coglomerate, TCS has a global footprit ad is listed o the Natioal Stock Exchage ad Bombay Stock Exchage i Idia. For more iformatio, visit us at All cotet / iformatio preset here is the exclusive property of Tata Cosultacy Services Limited (TCS). The cotet / iformatio cotaied here is correct at the time of publishig. No material from here may be copied, modified, reproduced, republished, uploaded, trasmitted, posted or distributed i ay form without prior writte permissio from TCS. Uauthorized use of the cotet / iformatio appearig here may violate copyright, trademark ad other applicable laws, ad could result i crimial or civil pealties. Copyright 2018 Tata Cosultacy Services Limited TCS Desig Services I M I 01 I 18 About Tata Cosultacy Services Ltd (TCS)
Building Your Security Operations Center and Taking it to the Next Level
Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio
More informationDemystifying IaaS Adoption for Enterprise Applications
Demystifyig IaaS Adoptio for Eterprise Applicatios Abstract Despite the growig sped o cloud techologies, eterprises worldwide are plagued with this questio, Which amog the may is the best solutio for us?
More informationCyber Risk Mitigation for Smart Cities
Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,
More informationStrengthening Privacy Protection with the European General Data Protection Regulation
Stregtheig Privacy Protectio with the Europea Geeral Data Protectio Regulatio Abstract The expoetial growth of digital data has led to a substatial icrease i data breaches. To meet the privacy cocers of
More informationTransforming Railroad Asset Management: Going Smart with Predictive Maintenance
Trasformig Railroad Asset Maagemet: Goig Smart with Predictive Maiteace Abstract As oe of the most asset-itesive idustries i the world, the rail idustry ivests early 20% of its reveue i asset maiteace
More informationData Governance Simplifying Machine Learning Model Deployment
Data Goverace Simplifyig Machie Learig Model Deploymet Abstract Although machie learig (ML) offers may advatages whe it comes to predictig outcomes ad idetifyig with ovel isights, deployig ML models i
More informationThe Threat Hunting Route to Predictive Cyber Security
The Threat Hutig Route to Predictive Cyber Security Abstract Withi a icreasigly malicious cyber threat ladscape, our defese mechaisms must mature from beig reactive to proactive ad ally, predictive. For
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationLandscape in the Making
Tokeizatio: A Fraudfree Paymets Ladscape i the Makig Abstract Baks are uder pressure to meet customers' demads for coveiet ad frictioless digital paymets. At the same time, they are required to esure the
More informationInnovation Labs. White Paper. Accelerate Your Digital API Program
Iovatio Labs White Paper Accelerate Your Digital API Program About the Author Abhishek Seth Abhishek Seth is a Associate Cosultat i the API Program withi the Research ad Iovatio uit at Tata Cosultacy Services
More informationBig Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations
Big Data Capacity Plaig: Achievig Right Sized Hadoop Clusters ad Optimized Operatios Abstract Busiesses are cosiderig more opportuities to leverage data for differet purposes, impactig resources ad resultig
More informationMaking Software Inclusive and Accessible
Makig Software Iclusive ad Accessible Abstract Aroud 650 millio people across the world live with some form of disability, which iadvertetly prevets them from beig able to fully utilize 1 covetioally desiged
More informationServerless Computing: A Compelling Opportunity for Today s Digital Enterprise
Serverless Computig: A Compellig Opportuity for Today s Digital Eterprise Abstract Cloud computig has eabled orgaizatios to focus less o their IT ifrastructure ad more o their core products ad services.
More informationGetting the Most out of IoT with an Effective Data Lifecycle Management Strategy
Gettig the Most out of IoT with a Effective Data Lifecycle Maagemet Strategy Abstract The Iteret of Thigs (IoT) is a rapidly evolvig techology, ad like ay other techology, it ca pose challeges with respect
More informationLeveraging Meta Data Management: Powering Cognitive Automation in Clinical Trial Processes
Leveragig Meta Data Maagemet: Powerig Cogitive Automatio i Cliical Trial Processes Abstract Today, arti cial itelligece (AI) is trasformig every area of busiess, icludig life scieces, particularly i the
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationMulti-drone four-dimensional flight constraint management
Multi-droe four-dimesioal flight costrait maagemet Abstract With the emergece of the umaed aerial vehicle (UAV) eco-system for commercial ad eterprise markets, multi-droe traf c maagemet has become critical
More informationContinuity Logic Frontline Live
September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece
More informationRobots in the Back Office: The Future of Recruitment Enterprises
Robots i the Back Office: The Future of Recruitmet Eterprises Abstract As social ad techological chages reshape the busiess ladscape ad ew etrats stiffe the competitio, staffig ad recruitmet eterprises
More informationData Protection: Your Choice Is Simple PARTNER LOGO
Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected
More informationDevice-as-a-Service Model: Key to Workplace Transformation in the High Tech Industry
Device-as-a-Service Model: Key to Workplace Trasformatio i the High Tech Idustry Abstract The emergece of radically ew workig styles ad the eed to provide exceptioal workplace experieces are compellig
More informationGaining Ecommerce-like Simplicity within a Drone-As-A-Service Framework
Gaiig Ecommerce-like Simplicity withi a Droe-As-A-Service Framework Abstract Takig ote of the expoetial growth of droe-asas-a-service (DaaS), eterprises are deployig commercial droes for ispectio (ifrastructure,
More informationAddressing SaaS Security
White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address
More informationAir Force Data Reference Architecture and Platform
Headquarters U.S. Air Force Air Force Data Referece Architecture ad Platform Ms. Jackie Murray 11 Oct 2018 1 AF Data Challeges Large umber of legacy systems with umerous poit-to-poit iterfaces that are
More informationCA Top Secret r14 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe
More informationSTRATEGIC. alliances & Services
STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884
More informationMANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR
FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports
More informationPanel for Adobe Premiere Pro CC Partner Solution
Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationCustomer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More informationData Warehousing. Paper
Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial
More informationSecurity Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team
Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationBE Software Upgrades to ITALYCS 5. It s in the. Software
BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the
More informationSCAN INSPECT TRACK SOLVE
SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.
More informationAnti-addiction System Development Based on Android Smartphone. Xiafu Pan
3rd Iteratioal Coferece o Materials Egieerig, Maufacturig Techology ad Cotrol (ICMEMTC 2016) Ati-addictio System Developmet Based o Adroid Smartphoe Xiafu Pa Haia Vocatioal College of Political Sciece
More informationNational strength. Regional knowledge. Industry expertise.
parterships parterships Natioal stregth. Regioal kowledge. Idustry expertise. Thic is a leadig, idepedet maagemet cosultacy, specialisig i projects. We advise o ad deliver a rage of projects across the
More informationDesign and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance
Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 10463-10472 Research Idia Publicatios http://www.ripublicatio.com Desig ad Implemetatio of Itegrated Testig
More informationENTERPRISE ARCHITECTURE TRAINING COURSES to-tonex ( ) International: Fax:
ENTERPRISE ARCHITECTURE TRAINING COURSES 1-888-to-toex (1-888-868-6639) Iteratioal: 1-972-735-8686 Fax: 1-972-692-7492 w w w.t o ex.com TONEX Global Traiig Courses & Semiars Customizatio is Our Secret
More informationCapabilities Briefing AAMCORE, Inc. SDVO Company
AAMCORE Ic. Capabilities Briefig AAMCORE, Ic. SDVO Compay 15-Mar-18 AAMCORE, Ic. Proprietary Iformatio 1 AAMCORE Ic. Missio Statemet Provide our parters with reliable, high-quality professioal services
More informationThe Software Delivery Experts. Agile, DevOps & QA Conference
The Software Delivery Experts Agile, DevOps & QA Coferece The Software Delivery Experts Settig Agile-Cetric Release Criteria Aka Doe-Ness or Defiitio of Doe (DoD) Bob Gale Director of Agile Practices Outlie
More informationUnderstanding the Federal IT Security Professional (FITSP) Certification
Uderstadig the Federal IT Security Professioal (FITSP) Certificatio ISSA-Natioal Capital Chapter Ceter for America Progress September 20th, 2016 Jim Wiggis Executive Director Federal IT Security Istitute
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationSecurity and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms
Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationIntelligent Systems in Retail. Powered by Windows Embedded
Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber
More informationInnovative. Pharma-Tech Process Services is a high-energy, schedule-driven, technical service provider. Our innovative consulting services cover
Iovative S o l u t i o s Pharma-Tech Process Services is a high-eergy, schedule-drive, techical service provider. Our iovative cosultig services cover Commissioig, Validatio ad Costructio Period Services
More informationUNIVERSITY OF MORATUWA
UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016
More informationGoing Mobile with. SYSPRO Espresso
Goig Mobile with SYSPRO Espresso SYSPRO Espresso offers the opportuity for you to brig your busiess ito the 21 st Cetury, takig advatage of mobile techology. www.syspro.com Ulock the world with SYSPRO
More informationBaan Finance Financial Statements
Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace
More informationBAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8
BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More informationCORD Test Project in Okinawa Open Laboratory
CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationThe Implementation of the National Probation Service Information Systems Strategy
Home Office The Implemetatio of the Natioal Probatio Service Iformatio Systems Strategy REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 401 Sessio 2000-2001: 26 April 2001 LONDON: The Statioery Office
More informationMindmapping: A General Purpose (Test) Planning Tool
W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage
More informationEmpirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic.
Empirical Validate C&K Suite for Predict Fault-Proeess of Object-Orieted Classes Developed Usig Fuzzy Logic. Mohammad Amro 1, Moataz Ahmed 1, Kaaa Faisal 2 1 Iformatio ad Computer Sciece Departmet, Kig
More informationOracle Process Manufacturing
Oracle Process Maufacturig Product Developmet Recipe API User s Guide Release 11i Part No. A97387-04 Jauary 2005 Oracle Process Maufacturig Product Developmet Recipe API User s Guide, Release 11i Part
More informationTruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information
TruVu 360 User Commuity Cotiuous educatio is importat for a successful o-site lubricat program. With ever growig articles, videos, ad structured learig modules, TruVu 360 user commuity is a digital commuity
More informationTHE FUTURE IS EFFICIENT
THE FUTURE IS EFFICIENT KV-S1027C AND KV-S1057C WORKGROUP SCANNER SOLUTIONS Versatile scaig solutios from the world s imagig specialists Paasoic has eared a worldwide reputatio as a leader i imagig techology
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationGAAFR. Supplement. Now Available. Covering: pronouncements: Statement Nos. 67, 68, 69, and 70
Govermet Fiace Officers Associatio Now Available i both E-BOOK ad PRINT form GAAFR Govermetal Accoutig, Auditig ad Fiacial Reportig Supplemet Coverig: GASB s four ew prooucemets: Statemet Nos. 67, 68,
More informationBike MS: 2013 Participant Center guide
Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.
More informationBike MS: 2014 Participant Center guide
Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More information2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter
2017 LEARNING SYSTEM FOR CLTD CERTIFICATION EXAM PREPARATION CONTACT INFORMATION Joi Holema, VP Educatio APICS DC Metro Chapter Email: educatio@apicsdcmetro.org Phoe: 703-430-4075 learcltd.com THE CLTD
More informationOptimizing Out-of-band Management
> Techical White Paper Optimizig Out-of-bad Maagemet For Solaris Servers ABOUT UPLOGIX // Uplogix provides eterprise edge maagemet solutios for orgaizatios seekig to reduce the cost ad complexity of maagig
More informationSFP1215W Forensic Pouch E V A L U A T I O N R E P O R T
E V A L U A T I O N R E P O R T April 2012 NIJ Electroic Crime Techology Ceter of Excellece 550 Marshall St., Suite B Phillipsburg, NJ 08865 www.ectcoe.org NIJ ECTCOE TESTING AND EVALUATION PROJECT STAFF
More information2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com
2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION APICS CSCP Learig System users cosistetly surpass the average CSCP exam pass rate. learcscp.com 2016_APICS_A4_Brochure_parter.idd 1 WHY SEEK
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationReaching for the Sky: Using Drones to Propel the Mining Industry Forward
Reachig for the Sky: Usig Droes to Propel the Miig Idustry Forward Abstract Droes are becomig icreasigly pervasive across idustries. Use of droes i the Metals & Miig (M&M) idustry is curretly cetered o
More informationBIKE MS: 2015 PARTICIPANT CENTER GUIDE
BIKE MS: 2015 PARTICIPANT CENTER GUIDE bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...
More informationYour support connection
Ao Risk Solutios Global Risk Cosultig Your support coectio Cosultig ad outsourced support for isurace ad reisurace compaies Cosultig ad outsourced support for isurace ad reisurace compaies Providig flexibility
More informationData Structures and Algorithms. Analysis of Algorithms
Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access
More informationRunning Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The
More informationOracle Process Manufacturing
Oracle Process Maufacturig Process Executio API User s Guide Release 11i Part No. A97388-04 August 2004 Oracle Process Maufacturig Process Executio API User s Guide, Release 11i Part No. A97388-04 Copyright
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationAnalysis of Algorithms
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationChapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationIsn t It Time You Got Faster, Quicker?
Is t It Time You Got Faster, Quicker? AltiVec Techology At-a-Glace OVERVIEW Motorola s advaced AltiVec techology is desiged to eable host processors compatible with the PowerPC istructio-set architecture
More informationProject Management Best Practice Training and Certifications. Clement Pereira Head of elearning SPOCE Project Management Ltd.
Project Maagemet Best Practice Traiig ad Certificatios Clemet Pereira Head of elearig SPOCE Project Maagemet Ltd. Some Reasos Why Projects Fail Products ot defied i sufficiet detail before startig work
More informationOracle Balanced Scorecard
Oracle Balaced Scorecard User Guide Release 4.5 July 2001 Part No. A90873-01 Oracle Balaced Scorecard User Guide, Release 4.5 Part No. A90873-01 Copyright 1999, 2000, 2001, Oracle Corporatio. All rights
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationExtending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis
Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationAnalysis of Algorithms
Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Aalysis of Algorithms Iput 2015 Goodrich ad Tamassia Algorithm Aalysis of Algorithms
More informationGoals of the Lecture UML Implementation Diagrams
Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationAnti Fraud Services Founding Member Associate Member of..
Ati Fraud Services Foudig Member Associate Member of.. Ati Fraud Overview BTS prides itself o its developmet ad deploymet of its Ati-Fraud services. Its Fraud prevetio services provide a seamless fraud
More informationCA InterTest for CICS r8.5
PRODUCT SHEET: CA INTERTEST FOR CICS CA IterTest for CICS r8.5 CA IterTest for CICS provides testig ad debuggig of IBM CICS Trasactio Server for z/os applicatios writte i COBOL, PL/I, Assembler ad Laguage
More information