The Threat Hunting Route to Predictive Cyber Security

Size: px
Start display at page:

Download "The Threat Hunting Route to Predictive Cyber Security"

Transcription

1 The Threat Hutig Route to Predictive Cyber Security Abstract Withi a icreasigly malicious cyber threat ladscape, our defese mechaisms must mature from beig reactive to proactive ad ally, predictive. For the moder security operatios ceter (SOC), cyber threat hutig is the ext step i the evolutio. With eterprises spedig more tha half a millio US dollars to recover from a breach,1 it's time to ivest i capabilities that ca detect ukow threats before alarms are raised. This will ot oly fortify systems but further improve security cotrols. I this paper, we highlight the differet elemets required for developig cyber threat hutig capabilities ad recommed a structured approach for eterprises across idustries.

2 Ulike covetioal IT security methods, cyber threat hutig is more proactive ad iterative whe it comes to searchig etworks ad datasets to detect breaches that would otherwise elude existig automated tools. This huma-led methodology leverages aalytics or a machie learig platform ad a combiatio of techiques to couter threats. Oce a ew or possible security risk has bee ideti ed, these are categorized ad added to a automated security iformatio ad evet maagemet (SIEM) platform. The maturity of cyber threat hutig practices depeds o a eterprise's preset state of IT security, ad it's willigess to ivest i techology, people, ad processes to further its capabilities. Buildig Blocks for Threat Hutig The success of threat hutig depeds largely o the data available to the security aalyst team alog with a ivetory of tools ad platforms that ca assist i visualizig, aalyzig, ad applyig isights. This will allow the team to look for ew threats which ca be behavior or tred based. I order to build such a framework, eterprises must take ote of: Data visibility wherei there are comprehesive security /evets that iclude etwork traf c ad applicatio usage iformatio alog with relevat threat itelligece reports Tools such as SIEM, data ad user behavior aalytics, rewalls, ad ed poit solutios Security itelligece which icludes updated exploit iformatio, attack vectors, idicators of compromise (IOC), relevat risk treds, ad situatioal awareess Skills with respect to foresic aalysis, ability to thik like a hacker, ad opeess to cotiuous learig Broadly speakig, the cyber threat hutig process has four key stages: Hypothesis created by a huma aalyst o the basis of treds, recet security evets, threat itelligece reports, ad isights gaied through visualized data Ivestigatio usig tools ad techiques associated with liked data aalysis, visualizatios, statistical aalysis or machie learig

3 Ucoverig icidet patters ad lateral movemets withi the etwork Performig aalytics to automate the detectio process for similar icidets i the future Cyber threat huters ca leverage Kill Chai, Diamod, or Hopper models which ca aid i idetifyig threats ad itrusio. These models provide ot oly a structured approach for uderstadig the capabilities of cyber crimials but also extract relevat iformatio from the threat itelligece feeds. It's importat to ote that these models o their ow may ot be foolproof. Equifax's recet breach is a great example of how eve the Kill Chai model o its ow proved to be ieffective.2 Most security teams already have too much o their plates ad may at times be usure about what eeds to be prioritized. Perhaps, a more cohesive approach would be to combie these models' stregths. I fact, the Diamod ad Kill Chai aalysis are highly complemetary. Kill Chai allows the security aalyst to target ad egage a adversary ad 'create the desired effects' idetifyig the right set of data alog with high risk idicators. Diamod model applies scieti c priciples to itrusio aalysis ad provides a comprehesive roadmap o how the threat ca be mitigated. Future-Proo g Cyber Security Apparatus As the rst step, eterprises must build a cohesive approach to ehace ad mature their threat hutig capabilities. This must be supported by a proactive threat moitorig methodology leveragig a robust aalytics platform. While this process mostly relies o correlated alerts, through dedicated threat hutig eterprises ca preemptively idetify possible breaches withi the IT eviromet. Newly ideti ed threats ca be categorized ad added to the security maagemet platform (like SIEM) curretly i use. This will help automatically idetify such threats i the future, thereby stregtheig the overall eterprise security posture. This will also help to detect ad address aws i the curret security framework, ad build o existig capabilities rather tha start from scratch each time there's a data breach. Eterprises eed to uderstad their IT ifrastructure hardware, software, ad etwork resources alog with existig security cotrols, people, ad processes before buildig such a approach. As highlighted i Figure 1, the ext steps will iclude:

4 Network /packet Itroducig ad equippig the data aalytics platform with machie learig ad visualizatio features capable of oboardig huge volumes of out-of-the-box data. Supplyig the platform with the right data sets evets, etwork traf c, ed poit ad applicatio iformatio for visualizig ad aalyzig purposes. Erichig the platform by providig idicators, evidecebased kowledge for trackig advace threats. Visualizig data i terms of assets ad users behavior, alog with etwork treds to idetify exact breach patters ad create hypothetical scearios. Creatig a dedicated ad specialized group of experts to address security issues based o these hypothetical scearios missed by existig SOC teams. Oce suspicious behavior is detected, the threat huter will ivestigate, add threat artifacts to better ucover ad mitigate possibilities of future breaches. Evaluatig the extet of threat peetratio ad data ex ltratio withi a compromised IT eviromet. Itegratig the platform with the automatio egie to automate the detectio process. Data Erichmet Threat Detectio Extet of Threat Dashboard Visualizatio Lateral Movemet Data Aalytic Platform (UBA, ML, AI) Alert Tred Compromised Accouts Data Visualizatio Evet Tred Data Exfiltratio Cotext ad Threat Feeds Idetity Edpoit Server Applicatio Others Figure 1: A ed-to-ed cyber threat hutig approach Automatio

5 Cosider a example where high DNS traf c triggered a data ex ltratio alert. Usig the Kill Chai model, a eterprise ca work backwards to hut for the root cause. Figure 2 highlights a ideal sceario to detect data ex ltratio. Hypothesis Searched for outboud DNS traffic observed high DNS request cout from oe source Ivestigate From proxy log idetified large amout of data (~1.5MB) beig trasferred Ivestigated with edpoit evets through sysmo observed that process svchost.exe established outboud coectio This is commo whe data is beig exfiltrated Svchost.exe is a commo widows process but the process path is uusual Malware delivered through phishig mail Suspicious as Svchost.exe process establishes public coectio Cotiued with sysmo that shows process path from user space ad ot from system dir. Alog with the paret process ID pdf reader Further search with the file ame shows that it was delivered through phishig mail as a attachmet Ucover Figure 2: Detectig Data Exfiltratio However, we also eed to keep i mid the lessos leart from Equifax's massive data breach. Most Iteret applicatios (at risk from exteral attackers) are usually placed i a demilitarized zoe (DMZ). Commuicatios betwee these apps ad the eterprise's iteral systems are more predictable, wherei security teams ca ote the frequecy of access, credetials used, volume, ad so o to build a adaptive behavioral pro le. Malicious activities that usually go uoticed ca be tracked usig user ad etity behavioral aalytics (UEBA). Moreover, eterprises must use cotaiers for applicatios, which provide more protectio tha physical servers ad virtual machies. Usig a Docker le, these cotaiers create applicatio images, which ca be scaed easily before deploymet to discover kow vulerabilities. A vulerable applicatio ca the be swapped out seamlessly oce a update patch is available. But these aloe will ot be able to prevet attackers from exploitig the Kill Chai. Herei, a breach ad attack simulatio platform ca help security teams gai a thorough uderstadig of these threat

6 actors. Across the Kill Chai, aalysts ca ote the differet ways a attacker ca i ltrate, move laterally to a deeper part of the etwork, ad ex ltrate data buyig time for security teams to gure out the best way to break the Kill Chai. Oe ca start with segmetatio to stop the lateral movemet, or simply focus o stoppig data ex ltratio with data leakage prevetio (DLP) solutios. A set of deep packet ispectio (DPI)-eabled patter match sigatures ca prevet attacks similar to Equifax's. Geerally, the attack vectors utilize predictable parameters. Geerally, malicious HTTP requests have a shell commad embedded i a XML object or a malformed header. Security teams ca develop sigatures based o these attack patters, while DPI ca help limit false alarms. Fortifyig the Way Forward It's time for eterprises to adopt a cotiuous process of proactively evaluatig threats that may i ltrate their etworks ad systems, rather tha ivestigate whe the eed arises. This will require establishig dedicated teams ad implemetig platforms to ucover ukow threats, ad ot be limited to prede ed alerts usually co gured i SIEM. As the eterprise security posture matures, it will be easier to de e ad follow a foolproof threat hutig roadmap leveragig arti cial itelligece (AI) ad machie learig to detect breaches ad automate the remediatio process. Refereces 1. Kaspersky lab, Damage Cotrol: The Cost of Security Breaches IT Security Risks Special Report Series, accessed o Jauary 10, 2018, 2. Federal Trade Commissio, Cosumer Iformatio, The Equifax Data Breach: What to Do, September 8, 2017, accessed o Jauary 30, 2018,

7 About The Author Prikshit Goel Prikshit Goel heads the Maaged Security Services as part of TCS' Cyber Security Practice. He focuses o providig security ad IT ifrastructure solutios to the customers by leveragig relatioships with strategic parters ad developig ew offerigs i the security space. He is also resposible for developig traiig framework, accelerators ad a effective competecy pla for both solutio desig ad delivery. He has over 17 years of experiece i the IT space with a focus o Iformatio Security ad Networks. He also holds may idustry certificatios such as PMP, Cisco CCNP ad CCNA, ITIL, BAC, CEH, Spluk, Avaya, ITIL, Six Sigma Gree Belt ad ACS ad is traied i security products such as RSA, Symatec, Palo Alto, ad Cisco across various layers. Cotact Visit Cyber Security page o cyber.security@tcs.com Subscribe to TCS White Papers TCS.com RSS: Feedburer: Tata Cosultacy Services is a IT services, cosultig ad busiess solutios orgaizatio that delivers real results to global busiess, esurig a level of certaity o other firm ca match. TCS offers a cosultig-led, itegrated portfolio of IT ad IT-eabled, ifrastructure, egieerig ad assurace services. This is delivered through its uique Global Network Delivery ModelTM, recogized as the bechmark of excellece i software developmet. A part of the Tata Group, Idia s largest idustrial coglomerate, TCS has a global footprit ad is listed o the Natioal Stock Exchage ad Bombay Stock Exchage i Idia. For more iformatio, visit us at All cotet / iformatio preset here is the exclusive property of Tata Cosultacy Services Limited (TCS). The cotet / iformatio cotaied here is correct at the time of publishig. No material from here may be copied, modified, reproduced, republished, uploaded, trasmitted, posted or distributed i ay form without prior writte permissio from TCS. Uauthorized use of the cotet / iformatio appearig here may violate copyright, trademark ad other applicable laws, ad could result i crimial or civil pealties. Copyright 2018 Tata Cosultacy Services Limited TCS Desig Services I M I 02 I 18 About Tata Cosultacy Services Ltd (TCS)

Building Your Security Operations Center and Taking it to the Next Level

Building Your Security Operations Center and Taking it to the Next Level Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio

More information

Cyber Risk Mitigation for Smart Cities

Cyber Risk Mitigation for Smart Cities Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,

More information

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework Shieldig Eterprises from Evolvig Cyber Attacks with a Digital Security Framework Abstract As the IT ladscape evolves, cyber threat actors also mature i respose developig ew techiques to compromise the

More information

Demystifying IaaS Adoption for Enterprise Applications

Demystifying IaaS Adoption for Enterprise Applications Demystifyig IaaS Adoptio for Eterprise Applicatios Abstract Despite the growig sped o cloud techologies, eterprises worldwide are plagued with this questio, Which amog the may is the best solutio for us?

More information

Strengthening Privacy Protection with the European General Data Protection Regulation

Strengthening Privacy Protection with the European General Data Protection Regulation Stregtheig Privacy Protectio with the Europea Geeral Data Protectio Regulatio Abstract The expoetial growth of digital data has led to a substatial icrease i data breaches. To meet the privacy cocers of

More information

Making Software Inclusive and Accessible

Making Software Inclusive and Accessible Makig Software Iclusive ad Accessible Abstract Aroud 650 millio people across the world live with some form of disability, which iadvertetly prevets them from beig able to fully utilize 1 covetioally desiged

More information

Serverless Computing: A Compelling Opportunity for Today s Digital Enterprise

Serverless Computing: A Compelling Opportunity for Today s Digital Enterprise Serverless Computig: A Compellig Opportuity for Today s Digital Eterprise Abstract Cloud computig has eabled orgaizatios to focus less o their IT ifrastructure ad more o their core products ad services.

More information

Big Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations

Big Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations Big Data Capacity Plaig: Achievig Right Sized Hadoop Clusters ad Optimized Operatios Abstract Busiesses are cosiderig more opportuities to leverage data for differet purposes, impactig resources ad resultig

More information

Innovation Labs. White Paper. Accelerate Your Digital API Program

Innovation Labs. White Paper. Accelerate Your Digital API Program Iovatio Labs White Paper Accelerate Your Digital API Program About the Author Abhishek Seth Abhishek Seth is a Associate Cosultat i the API Program withi the Research ad Iovatio uit at Tata Cosultacy Services

More information

Data Governance Simplifying Machine Learning Model Deployment

Data Governance Simplifying Machine Learning Model Deployment Data Goverace Simplifyig Machie Learig Model Deploymet Abstract Although machie learig (ML) offers may advatages whe it comes to predictig outcomes ad idetifyig with ovel isights, deployig ML models i

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

Landscape in the Making

Landscape in the Making Tokeizatio: A Fraudfree Paymets Ladscape i the Makig Abstract Baks are uder pressure to meet customers' demads for coveiet ad frictioless digital paymets. At the same time, they are required to esure the

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Getting the Most out of IoT with an Effective Data Lifecycle Management Strategy

Getting the Most out of IoT with an Effective Data Lifecycle Management Strategy Gettig the Most out of IoT with a Effective Data Lifecycle Maagemet Strategy Abstract The Iteret of Thigs (IoT) is a rapidly evolvig techology, ad like ay other techology, it ca pose challeges with respect

More information

Gaining Ecommerce-like Simplicity within a Drone-As-A-Service Framework

Gaining Ecommerce-like Simplicity within a Drone-As-A-Service Framework Gaiig Ecommerce-like Simplicity withi a Droe-As-A-Service Framework Abstract Takig ote of the expoetial growth of droe-asas-a-service (DaaS), eterprises are deployig commercial droes for ispectio (ifrastructure,

More information

Transforming Railroad Asset Management: Going Smart with Predictive Maintenance

Transforming Railroad Asset Management: Going Smart with Predictive Maintenance Trasformig Railroad Asset Maagemet: Goig Smart with Predictive Maiteace Abstract As oe of the most asset-itesive idustries i the world, the rail idustry ivests early 20% of its reveue i asset maiteace

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Leveraging Meta Data Management: Powering Cognitive Automation in Clinical Trial Processes

Leveraging Meta Data Management: Powering Cognitive Automation in Clinical Trial Processes Leveragig Meta Data Maagemet: Powerig Cogitive Automatio i Cliical Trial Processes Abstract Today, arti cial itelligece (AI) is trasformig every area of busiess, icludig life scieces, particularly i the

More information

Device-as-a-Service Model: Key to Workplace Transformation in the High Tech Industry

Device-as-a-Service Model: Key to Workplace Transformation in the High Tech Industry Device-as-a-Service Model: Key to Workplace Trasformatio i the High Tech Idustry Abstract The emergece of radically ew workig styles ad the eed to provide exceptioal workplace experieces are compellig

More information

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper

More information

Continuity Logic Frontline Live

Continuity Logic Frontline Live September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

Multi-drone four-dimensional flight constraint management

Multi-drone four-dimensional flight constraint management Multi-droe four-dimesioal flight costrait maagemet Abstract With the emergece of the umaed aerial vehicle (UAV) eco-system for commercial ad eterprise markets, multi-droe traf c maagemet has become critical

More information

Bike MS: 2013 Participant Center guide

Bike MS: 2013 Participant Center guide Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.

More information

Bike MS: 2014 Participant Center guide

Bike MS: 2014 Participant Center guide Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

Robots in the Back Office: The Future of Recruitment Enterprises

Robots in the Back Office: The Future of Recruitment Enterprises Robots i the Back Office: The Future of Recruitmet Eterprises Abstract As social ad techological chages reshape the busiess ladscape ad ew etrats stiffe the competitio, staffig ad recruitmet eterprises

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Data Warehousing. Paper

Data Warehousing. Paper Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess

More information

BIKE MS: 2015 PARTICIPANT CENTER GUIDE

BIKE MS: 2015 PARTICIPANT CENTER GUIDE BIKE MS: 2015 PARTICIPANT CENTER GUIDE bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

Addressing SaaS Security

Addressing SaaS Security White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

SCAN INSPECT TRACK SOLVE

SCAN INSPECT TRACK SOLVE SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

STRATEGIC. alliances & Services

STRATEGIC. alliances & Services STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884

More information

CA InterTest for CICS r8.5

CA InterTest for CICS r8.5 PRODUCT SHEET: CA INTERTEST FOR CICS CA IterTest for CICS r8.5 CA IterTest for CICS provides testig ad debuggig of IBM CICS Trasactio Server for z/os applicatios writte i COBOL, PL/I, Assembler ad Laguage

More information

What are Information Systems?

What are Information Systems? Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Guide to Applying Online

Guide to Applying Online Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their

More information

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information TruVu 360 User Commuity Cotiuous educatio is importat for a successful o-site lubricat program. With ever growig articles, videos, ad structured learig modules, TruVu 360 user commuity is a digital commuity

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Intelligent Systems in Retail. Powered by Windows Embedded

Intelligent Systems in Retail. Powered by Windows Embedded Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Building the Internet of Everything (IoE) for First Responders

Building the Internet of Everything (IoE) for First Responders Buildig the Iteret of Everythig (IoE) for First Respoders Robert E. Balfour, Ph.D. Chief Techology Officer V.C.O.R.E. Solutios LLC Bethpage, NY, USA bob.balfour@vcoresolutios.com Abstract The Iteret of

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com 2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION APICS CSCP Learig System users cosistetly surpass the average CSCP exam pass rate. learcscp.com 2016_APICS_A4_Brochure_parter.idd 1 WHY SEEK

More information

Optimizing Out-of-band Management

Optimizing Out-of-band Management > Techical White Paper Optimizig Out-of-bad Maagemet For Solaris Servers ABOUT UPLOGIX // Uplogix provides eterprise edge maagemet solutios for orgaizatios seekig to reduce the cost ad complexity of maagig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

IncorporatingCluster-BasedRelationshipsin Web Rule Language

IncorporatingCluster-BasedRelationshipsin Web Rule Language IcorporatigCluster-BasedRelatioshipsi Web Rule Laguage Mala Mehrotra Pragati Syergetic ResearchIc. Cupertio. CA mm@pragati-ic.com http://www.pragati-ic.com 1 Itroductio The Sematic Web visio requires rule-based

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

Going Mobile with. SYSPRO Espresso

Going Mobile with. SYSPRO Espresso Goig Mobile with SYSPRO Espresso SYSPRO Espresso offers the opportuity for you to brig your busiess ito the 21 st Cetury, takig advatage of mobile techology. www.syspro.com Ulock the world with SYSPRO

More information

BE Software Upgrades to ITALYCS 5. It s in the. Software

BE Software Upgrades to ITALYCS 5. It s in the. Software BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

How Deutsche Telekom protects customer data

How Deutsche Telekom protects customer data KEEPING THE CLOUD OF THINGS Secure How Deutsche Telekom protects customer data CotetS Maximum security with the Cloud of Thigs A secure start CONTENTS 1. THE CLOUD OF THINGS IT All starts with access 1.

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

PayMobile. Features Overview

PayMobile. Features Overview PayMobile Features Overview PayMobile Features & Services Subscriber Beefits Immediate oboardig, coveiet ed-user experiece, stimulatio Aget Maagemet Beefits Structure your sales force, supervise, act,

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

IT administrators face a variety of challenges

IT administrators face a variety of challenges Flexible Computig Optimized Desktop Ifrastructure Usig Dell Flexible Computig Solutios By Joh Schoute Ramesh Radhakrisha, Ph.D. The Dell Flexible Computig Solutios suite of products ad services is desiged

More information

A Method of Malicious Application Detection

A Method of Malicious Application Detection 5th Iteratioal Coferece o Educatio, Maagemet, Iformatio ad Medicie (EMIM 2015) A Method of Malicious Applicatio Detectio Xiao Cheg 1,a, Ya Hui Guo 2,b, Qi Li 3,c 1 Xiao Cheg, Beijig Uiv Posts & Telecommu,

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

TTeconomic ties between the two nations. The bilateral relationship flourished after the accession of H.H. Sheikh

TTeconomic ties between the two nations. The bilateral relationship flourished after the accession of H.H. Sheikh www.uibc.org UAE - Idia Bilateral Relatios he Uited Arab Emirates (UAE) ad Idia ejoy strog bods of friedship based o age-old cultural, religious ad TTecoomic ties betwee the two atios. The bilateral relatioship

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of

More information

CAMPUS OF THE SENSES ERLANGEN

CAMPUS OF THE SENSES ERLANGEN CAMPUS OF THE SENSES ERLANGEN Kick-off 15 th September 2017 istock.com/peopleimages Frauhofer IIS / 1 Huma Sesory Perceptio i the Digital Era istock.com/tscho Huma sesory perceptio is barely uderstood

More information

ENTERPRISE ARCHITECTURE TRAINING COURSES to-tonex ( ) International: Fax:

ENTERPRISE ARCHITECTURE TRAINING COURSES to-tonex ( ) International: Fax: ENTERPRISE ARCHITECTURE TRAINING COURSES 1-888-to-toex (1-888-868-6639) Iteratioal: 1-972-735-8686 Fax: 1-972-692-7492 w w w.t o ex.com TONEX Global Traiig Courses & Semiars Customizatio is Our Secret

More information

2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter

2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter 2017 LEARNING SYSTEM FOR CLTD CERTIFICATION EXAM PREPARATION CONTACT INFORMATION Joi Holema, VP Educatio APICS DC Metro Chapter Email: educatio@apicsdcmetro.org Phoe: 703-430-4075 learcltd.com THE CLTD

More information

TargetLink. Installation Notes. MATLAB R14SP3 Compatibility Update for TargetLink 2.1

TargetLink. Installation Notes. MATLAB R14SP3 Compatibility Update for TargetLink 2.1 TargetLik Istallatio Notes MATLAB R14SP3 Compatibility Update for TargetLik 2.1 TargetLik 2.1.5 November 2005 ds How to Cotact dspace Mail: Tel.: Fax: E-mail: Web: Geeral Techical Support: TargetLik Support:

More information

Modern Systems Analysis and Design Seventh Edition

Modern Systems Analysis and Design Seventh Edition Moder Systems Aalysis ad Desig Seveth Editio Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Desigig Databases Learig Objectives ü Cocisely defie each of the followig key database desig terms: relatio,

More information

Goals of the Lecture UML Implementation Diagrams

Goals of the Lecture UML Implementation Diagrams Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately. Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their

More information

THE FUTURE IS EFFICIENT

THE FUTURE IS EFFICIENT THE FUTURE IS EFFICIENT KV-S1027C AND KV-S1057C WORKGROUP SCANNER SOLUTIONS Versatile scaig solutios from the world s imagig specialists Paasoic has eared a worldwide reputatio as a leader i imagig techology

More information

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

THIRD-QUARTER 2017 REVENUES

THIRD-QUARTER 2017 REVENUES PRESS RELEASE Paris, November 16, 2017 THIRD-QUARTER 2017 REVENUES Reveues up 6.6% year o year for the first ie moths of 2017, comig i at 3,710 millio 250,000 ew mobile subscribers durig the quarter the

More information

Analysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c

Analysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c Advaced Materials Research Olie: 2013-01-25 IN: 1662-8985, Vol. 659, pp 196-201 doi:10.4028/www.scietific.et/amr.659.196 2013 Tras Tech Publicatios, witzerlad Aalysis of Class Desig Couplig Based o Iformatio

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

Anti-addiction System Development Based on Android Smartphone. Xiafu Pan

Anti-addiction System Development Based on Android Smartphone. Xiafu Pan 3rd Iteratioal Coferece o Materials Egieerig, Maufacturig Techology ad Cotrol (ICMEMTC 2016) Ati-addictio System Developmet Based o Adroid Smartphoe Xiafu Pa Haia Vocatioal College of Political Sciece

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information