The Threat Hunting Route to Predictive Cyber Security
|
|
- Arron Cole
- 5 years ago
- Views:
Transcription
1 The Threat Hutig Route to Predictive Cyber Security Abstract Withi a icreasigly malicious cyber threat ladscape, our defese mechaisms must mature from beig reactive to proactive ad ally, predictive. For the moder security operatios ceter (SOC), cyber threat hutig is the ext step i the evolutio. With eterprises spedig more tha half a millio US dollars to recover from a breach,1 it's time to ivest i capabilities that ca detect ukow threats before alarms are raised. This will ot oly fortify systems but further improve security cotrols. I this paper, we highlight the differet elemets required for developig cyber threat hutig capabilities ad recommed a structured approach for eterprises across idustries.
2 Ulike covetioal IT security methods, cyber threat hutig is more proactive ad iterative whe it comes to searchig etworks ad datasets to detect breaches that would otherwise elude existig automated tools. This huma-led methodology leverages aalytics or a machie learig platform ad a combiatio of techiques to couter threats. Oce a ew or possible security risk has bee ideti ed, these are categorized ad added to a automated security iformatio ad evet maagemet (SIEM) platform. The maturity of cyber threat hutig practices depeds o a eterprise's preset state of IT security, ad it's willigess to ivest i techology, people, ad processes to further its capabilities. Buildig Blocks for Threat Hutig The success of threat hutig depeds largely o the data available to the security aalyst team alog with a ivetory of tools ad platforms that ca assist i visualizig, aalyzig, ad applyig isights. This will allow the team to look for ew threats which ca be behavior or tred based. I order to build such a framework, eterprises must take ote of: Data visibility wherei there are comprehesive security /evets that iclude etwork traf c ad applicatio usage iformatio alog with relevat threat itelligece reports Tools such as SIEM, data ad user behavior aalytics, rewalls, ad ed poit solutios Security itelligece which icludes updated exploit iformatio, attack vectors, idicators of compromise (IOC), relevat risk treds, ad situatioal awareess Skills with respect to foresic aalysis, ability to thik like a hacker, ad opeess to cotiuous learig Broadly speakig, the cyber threat hutig process has four key stages: Hypothesis created by a huma aalyst o the basis of treds, recet security evets, threat itelligece reports, ad isights gaied through visualized data Ivestigatio usig tools ad techiques associated with liked data aalysis, visualizatios, statistical aalysis or machie learig
3 Ucoverig icidet patters ad lateral movemets withi the etwork Performig aalytics to automate the detectio process for similar icidets i the future Cyber threat huters ca leverage Kill Chai, Diamod, or Hopper models which ca aid i idetifyig threats ad itrusio. These models provide ot oly a structured approach for uderstadig the capabilities of cyber crimials but also extract relevat iformatio from the threat itelligece feeds. It's importat to ote that these models o their ow may ot be foolproof. Equifax's recet breach is a great example of how eve the Kill Chai model o its ow proved to be ieffective.2 Most security teams already have too much o their plates ad may at times be usure about what eeds to be prioritized. Perhaps, a more cohesive approach would be to combie these models' stregths. I fact, the Diamod ad Kill Chai aalysis are highly complemetary. Kill Chai allows the security aalyst to target ad egage a adversary ad 'create the desired effects' idetifyig the right set of data alog with high risk idicators. Diamod model applies scieti c priciples to itrusio aalysis ad provides a comprehesive roadmap o how the threat ca be mitigated. Future-Proo g Cyber Security Apparatus As the rst step, eterprises must build a cohesive approach to ehace ad mature their threat hutig capabilities. This must be supported by a proactive threat moitorig methodology leveragig a robust aalytics platform. While this process mostly relies o correlated alerts, through dedicated threat hutig eterprises ca preemptively idetify possible breaches withi the IT eviromet. Newly ideti ed threats ca be categorized ad added to the security maagemet platform (like SIEM) curretly i use. This will help automatically idetify such threats i the future, thereby stregtheig the overall eterprise security posture. This will also help to detect ad address aws i the curret security framework, ad build o existig capabilities rather tha start from scratch each time there's a data breach. Eterprises eed to uderstad their IT ifrastructure hardware, software, ad etwork resources alog with existig security cotrols, people, ad processes before buildig such a approach. As highlighted i Figure 1, the ext steps will iclude:
4 Network /packet Itroducig ad equippig the data aalytics platform with machie learig ad visualizatio features capable of oboardig huge volumes of out-of-the-box data. Supplyig the platform with the right data sets evets, etwork traf c, ed poit ad applicatio iformatio for visualizig ad aalyzig purposes. Erichig the platform by providig idicators, evidecebased kowledge for trackig advace threats. Visualizig data i terms of assets ad users behavior, alog with etwork treds to idetify exact breach patters ad create hypothetical scearios. Creatig a dedicated ad specialized group of experts to address security issues based o these hypothetical scearios missed by existig SOC teams. Oce suspicious behavior is detected, the threat huter will ivestigate, add threat artifacts to better ucover ad mitigate possibilities of future breaches. Evaluatig the extet of threat peetratio ad data ex ltratio withi a compromised IT eviromet. Itegratig the platform with the automatio egie to automate the detectio process. Data Erichmet Threat Detectio Extet of Threat Dashboard Visualizatio Lateral Movemet Data Aalytic Platform (UBA, ML, AI) Alert Tred Compromised Accouts Data Visualizatio Evet Tred Data Exfiltratio Cotext ad Threat Feeds Idetity Edpoit Server Applicatio Others Figure 1: A ed-to-ed cyber threat hutig approach Automatio
5 Cosider a example where high DNS traf c triggered a data ex ltratio alert. Usig the Kill Chai model, a eterprise ca work backwards to hut for the root cause. Figure 2 highlights a ideal sceario to detect data ex ltratio. Hypothesis Searched for outboud DNS traffic observed high DNS request cout from oe source Ivestigate From proxy log idetified large amout of data (~1.5MB) beig trasferred Ivestigated with edpoit evets through sysmo observed that process svchost.exe established outboud coectio This is commo whe data is beig exfiltrated Svchost.exe is a commo widows process but the process path is uusual Malware delivered through phishig mail Suspicious as Svchost.exe process establishes public coectio Cotiued with sysmo that shows process path from user space ad ot from system dir. Alog with the paret process ID pdf reader Further search with the file ame shows that it was delivered through phishig mail as a attachmet Ucover Figure 2: Detectig Data Exfiltratio However, we also eed to keep i mid the lessos leart from Equifax's massive data breach. Most Iteret applicatios (at risk from exteral attackers) are usually placed i a demilitarized zoe (DMZ). Commuicatios betwee these apps ad the eterprise's iteral systems are more predictable, wherei security teams ca ote the frequecy of access, credetials used, volume, ad so o to build a adaptive behavioral pro le. Malicious activities that usually go uoticed ca be tracked usig user ad etity behavioral aalytics (UEBA). Moreover, eterprises must use cotaiers for applicatios, which provide more protectio tha physical servers ad virtual machies. Usig a Docker le, these cotaiers create applicatio images, which ca be scaed easily before deploymet to discover kow vulerabilities. A vulerable applicatio ca the be swapped out seamlessly oce a update patch is available. But these aloe will ot be able to prevet attackers from exploitig the Kill Chai. Herei, a breach ad attack simulatio platform ca help security teams gai a thorough uderstadig of these threat
6 actors. Across the Kill Chai, aalysts ca ote the differet ways a attacker ca i ltrate, move laterally to a deeper part of the etwork, ad ex ltrate data buyig time for security teams to gure out the best way to break the Kill Chai. Oe ca start with segmetatio to stop the lateral movemet, or simply focus o stoppig data ex ltratio with data leakage prevetio (DLP) solutios. A set of deep packet ispectio (DPI)-eabled patter match sigatures ca prevet attacks similar to Equifax's. Geerally, the attack vectors utilize predictable parameters. Geerally, malicious HTTP requests have a shell commad embedded i a XML object or a malformed header. Security teams ca develop sigatures based o these attack patters, while DPI ca help limit false alarms. Fortifyig the Way Forward It's time for eterprises to adopt a cotiuous process of proactively evaluatig threats that may i ltrate their etworks ad systems, rather tha ivestigate whe the eed arises. This will require establishig dedicated teams ad implemetig platforms to ucover ukow threats, ad ot be limited to prede ed alerts usually co gured i SIEM. As the eterprise security posture matures, it will be easier to de e ad follow a foolproof threat hutig roadmap leveragig arti cial itelligece (AI) ad machie learig to detect breaches ad automate the remediatio process. Refereces 1. Kaspersky lab, Damage Cotrol: The Cost of Security Breaches IT Security Risks Special Report Series, accessed o Jauary 10, 2018, 2. Federal Trade Commissio, Cosumer Iformatio, The Equifax Data Breach: What to Do, September 8, 2017, accessed o Jauary 30, 2018,
7 About The Author Prikshit Goel Prikshit Goel heads the Maaged Security Services as part of TCS' Cyber Security Practice. He focuses o providig security ad IT ifrastructure solutios to the customers by leveragig relatioships with strategic parters ad developig ew offerigs i the security space. He is also resposible for developig traiig framework, accelerators ad a effective competecy pla for both solutio desig ad delivery. He has over 17 years of experiece i the IT space with a focus o Iformatio Security ad Networks. He also holds may idustry certificatios such as PMP, Cisco CCNP ad CCNA, ITIL, BAC, CEH, Spluk, Avaya, ITIL, Six Sigma Gree Belt ad ACS ad is traied i security products such as RSA, Symatec, Palo Alto, ad Cisco across various layers. Cotact Visit Cyber Security page o cyber.security@tcs.com Subscribe to TCS White Papers TCS.com RSS: Feedburer: Tata Cosultacy Services is a IT services, cosultig ad busiess solutios orgaizatio that delivers real results to global busiess, esurig a level of certaity o other firm ca match. TCS offers a cosultig-led, itegrated portfolio of IT ad IT-eabled, ifrastructure, egieerig ad assurace services. This is delivered through its uique Global Network Delivery ModelTM, recogized as the bechmark of excellece i software developmet. A part of the Tata Group, Idia s largest idustrial coglomerate, TCS has a global footprit ad is listed o the Natioal Stock Exchage ad Bombay Stock Exchage i Idia. For more iformatio, visit us at All cotet / iformatio preset here is the exclusive property of Tata Cosultacy Services Limited (TCS). The cotet / iformatio cotaied here is correct at the time of publishig. No material from here may be copied, modified, reproduced, republished, uploaded, trasmitted, posted or distributed i ay form without prior writte permissio from TCS. Uauthorized use of the cotet / iformatio appearig here may violate copyright, trademark ad other applicable laws, ad could result i crimial or civil pealties. Copyright 2018 Tata Cosultacy Services Limited TCS Desig Services I M I 02 I 18 About Tata Cosultacy Services Ltd (TCS)
Building Your Security Operations Center and Taking it to the Next Level
Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio
More informationCyber Risk Mitigation for Smart Cities
Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,
More informationShielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework
Shieldig Eterprises from Evolvig Cyber Attacks with a Digital Security Framework Abstract As the IT ladscape evolves, cyber threat actors also mature i respose developig ew techiques to compromise the
More informationDemystifying IaaS Adoption for Enterprise Applications
Demystifyig IaaS Adoptio for Eterprise Applicatios Abstract Despite the growig sped o cloud techologies, eterprises worldwide are plagued with this questio, Which amog the may is the best solutio for us?
More informationStrengthening Privacy Protection with the European General Data Protection Regulation
Stregtheig Privacy Protectio with the Europea Geeral Data Protectio Regulatio Abstract The expoetial growth of digital data has led to a substatial icrease i data breaches. To meet the privacy cocers of
More informationMaking Software Inclusive and Accessible
Makig Software Iclusive ad Accessible Abstract Aroud 650 millio people across the world live with some form of disability, which iadvertetly prevets them from beig able to fully utilize 1 covetioally desiged
More informationServerless Computing: A Compelling Opportunity for Today s Digital Enterprise
Serverless Computig: A Compellig Opportuity for Today s Digital Eterprise Abstract Cloud computig has eabled orgaizatios to focus less o their IT ifrastructure ad more o their core products ad services.
More informationBig Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations
Big Data Capacity Plaig: Achievig Right Sized Hadoop Clusters ad Optimized Operatios Abstract Busiesses are cosiderig more opportuities to leverage data for differet purposes, impactig resources ad resultig
More informationInnovation Labs. White Paper. Accelerate Your Digital API Program
Iovatio Labs White Paper Accelerate Your Digital API Program About the Author Abhishek Seth Abhishek Seth is a Associate Cosultat i the API Program withi the Research ad Iovatio uit at Tata Cosultacy Services
More informationData Governance Simplifying Machine Learning Model Deployment
Data Goverace Simplifyig Machie Learig Model Deploymet Abstract Although machie learig (ML) offers may advatages whe it comes to predictig outcomes ad idetifyig with ovel isights, deployig ML models i
More informationData Protection: Your Choice Is Simple PARTNER LOGO
Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected
More informationLandscape in the Making
Tokeizatio: A Fraudfree Paymets Ladscape i the Makig Abstract Baks are uder pressure to meet customers' demads for coveiet ad frictioless digital paymets. At the same time, they are required to esure the
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationGetting the Most out of IoT with an Effective Data Lifecycle Management Strategy
Gettig the Most out of IoT with a Effective Data Lifecycle Maagemet Strategy Abstract The Iteret of Thigs (IoT) is a rapidly evolvig techology, ad like ay other techology, it ca pose challeges with respect
More informationGaining Ecommerce-like Simplicity within a Drone-As-A-Service Framework
Gaiig Ecommerce-like Simplicity withi a Droe-As-A-Service Framework Abstract Takig ote of the expoetial growth of droe-asas-a-service (DaaS), eterprises are deployig commercial droes for ispectio (ifrastructure,
More informationTransforming Railroad Asset Management: Going Smart with Predictive Maintenance
Trasformig Railroad Asset Maagemet: Goig Smart with Predictive Maiteace Abstract As oe of the most asset-itesive idustries i the world, the rail idustry ivests early 20% of its reveue i asset maiteace
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationLeveraging Meta Data Management: Powering Cognitive Automation in Clinical Trial Processes
Leveragig Meta Data Maagemet: Powerig Cogitive Automatio i Cliical Trial Processes Abstract Today, arti cial itelligece (AI) is trasformig every area of busiess, icludig life scieces, particularly i the
More informationDevice-as-a-Service Model: Key to Workplace Transformation in the High Tech Industry
Device-as-a-Service Model: Key to Workplace Trasformatio i the High Tech Idustry Abstract The emergece of radically ew workig styles ad the eed to provide exceptioal workplace experieces are compellig
More informationSecurity Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team
Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper
More informationContinuity Logic Frontline Live
September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece
More informationCA Top Secret r14 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe
More informationMulti-drone four-dimensional flight constraint management
Multi-droe four-dimesioal flight costrait maagemet Abstract With the emergece of the umaed aerial vehicle (UAV) eco-system for commercial ad eterprise markets, multi-droe traf c maagemet has become critical
More informationBike MS: 2013 Participant Center guide
Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.
More informationBike MS: 2014 Participant Center guide
Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...
More informationRobots in the Back Office: The Future of Recruitment Enterprises
Robots i the Back Office: The Future of Recruitmet Eterprises Abstract As social ad techological chages reshape the busiess ladscape ad ew etrats stiffe the competitio, staffig ad recruitmet eterprises
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationData Warehousing. Paper
Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess
More informationBIKE MS: 2015 PARTICIPANT CENTER GUIDE
BIKE MS: 2015 PARTICIPANT CENTER GUIDE bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...
More informationAddressing SaaS Security
White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationFirewall and IDS. TELE3119: Week8
Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad
More informationUNIVERSITY OF MORATUWA
UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016
More informationSCAN INSPECT TRACK SOLVE
SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.
More informationWeston Anniversary Fund
Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue
More informationSTRATEGIC. alliances & Services
STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884
More informationCA InterTest for CICS r8.5
PRODUCT SHEET: CA INTERTEST FOR CICS CA IterTest for CICS r8.5 CA IterTest for CICS provides testig ad debuggig of IBM CICS Trasactio Server for z/os applicatios writte i COBOL, PL/I, Assembler ad Laguage
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More informationPanel for Adobe Premiere Pro CC Partner Solution
Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationGuide to Applying Online
Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their
More informationTruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information
TruVu 360 User Commuity Cotiuous educatio is importat for a successful o-site lubricat program. With ever growig articles, videos, ad structured learig modules, TruVu 360 user commuity is a digital commuity
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationMANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR
FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationIntelligent Systems in Retail. Powered by Windows Embedded
Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationCustomer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationBuilding the Internet of Everything (IoE) for First Responders
Buildig the Iteret of Everythig (IoE) for First Respoders Robert E. Balfour, Ph.D. Chief Techology Officer V.C.O.R.E. Solutios LLC Bethpage, NY, USA bob.balfour@vcoresolutios.com Abstract The Iteret of
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More information2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com
2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION APICS CSCP Learig System users cosistetly surpass the average CSCP exam pass rate. learcscp.com 2016_APICS_A4_Brochure_parter.idd 1 WHY SEEK
More informationOptimizing Out-of-band Management
> Techical White Paper Optimizig Out-of-bad Maagemet For Solaris Servers ABOUT UPLOGIX // Uplogix provides eterprise edge maagemet solutios for orgaizatios seekig to reduce the cost ad complexity of maagig
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationOutline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs
Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationThreads and Concurrency in Java: Part 1
Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationIncorporatingCluster-BasedRelationshipsin Web Rule Language
IcorporatigCluster-BasedRelatioshipsi Web Rule Laguage Mala Mehrotra Pragati Syergetic ResearchIc. Cupertio. CA mm@pragati-ic.com http://www.pragati-ic.com 1 Itroductio The Sematic Web visio requires rule-based
More informationThreads and Concurrency in Java: Part 1
Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationGoing Mobile with. SYSPRO Espresso
Goig Mobile with SYSPRO Espresso SYSPRO Espresso offers the opportuity for you to brig your busiess ito the 21 st Cetury, takig advatage of mobile techology. www.syspro.com Ulock the world with SYSPRO
More informationBE Software Upgrades to ITALYCS 5. It s in the. Software
BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationHow Deutsche Telekom protects customer data
KEEPING THE CLOUD OF THINGS Secure How Deutsche Telekom protects customer data CotetS Maximum security with the Cloud of Thigs A secure start CONTENTS 1. THE CLOUD OF THINGS IT All starts with access 1.
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationBaan Finance Financial Statements
Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace
More informationPayMobile. Features Overview
PayMobile Features Overview PayMobile Features & Services Subscriber Beefits Immediate oboardig, coveiet ed-user experiece, stimulatio Aget Maagemet Beefits Structure your sales force, supervise, act,
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationIT administrators face a variety of challenges
Flexible Computig Optimized Desktop Ifrastructure Usig Dell Flexible Computig Solutios By Joh Schoute Ramesh Radhakrisha, Ph.D. The Dell Flexible Computig Solutios suite of products ad services is desiged
More informationA Method of Malicious Application Detection
5th Iteratioal Coferece o Educatio, Maagemet, Iformatio ad Medicie (EMIM 2015) A Method of Malicious Applicatio Detectio Xiao Cheg 1,a, Ya Hui Guo 2,b, Qi Li 3,c 1 Xiao Cheg, Beijig Uiv Posts & Telecommu,
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationTTeconomic ties between the two nations. The bilateral relationship flourished after the accession of H.H. Sheikh
www.uibc.org UAE - Idia Bilateral Relatios he Uited Arab Emirates (UAE) ad Idia ejoy strog bods of friedship based o age-old cultural, religious ad TTecoomic ties betwee the two atios. The bilateral relatioship
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationReview: The ACID properties
Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of
More informationCAMPUS OF THE SENSES ERLANGEN
CAMPUS OF THE SENSES ERLANGEN Kick-off 15 th September 2017 istock.com/peopleimages Frauhofer IIS / 1 Huma Sesory Perceptio i the Digital Era istock.com/tscho Huma sesory perceptio is barely uderstood
More informationENTERPRISE ARCHITECTURE TRAINING COURSES to-tonex ( ) International: Fax:
ENTERPRISE ARCHITECTURE TRAINING COURSES 1-888-to-toex (1-888-868-6639) Iteratioal: 1-972-735-8686 Fax: 1-972-692-7492 w w w.t o ex.com TONEX Global Traiig Courses & Semiars Customizatio is Our Secret
More information2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter
2017 LEARNING SYSTEM FOR CLTD CERTIFICATION EXAM PREPARATION CONTACT INFORMATION Joi Holema, VP Educatio APICS DC Metro Chapter Email: educatio@apicsdcmetro.org Phoe: 703-430-4075 learcltd.com THE CLTD
More informationTargetLink. Installation Notes. MATLAB R14SP3 Compatibility Update for TargetLink 2.1
TargetLik Istallatio Notes MATLAB R14SP3 Compatibility Update for TargetLik 2.1 TargetLik 2.1.5 November 2005 ds How to Cotact dspace Mail: Tel.: Fax: E-mail: Web: Geeral Techical Support: TargetLik Support:
More informationModern Systems Analysis and Design Seventh Edition
Moder Systems Aalysis ad Desig Seveth Editio Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Desigig Databases Learig Objectives ü Cocisely defie each of the followig key database desig terms: relatio,
More informationGoals of the Lecture UML Implementation Diagrams
Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from
More informationDesigning a learning system
CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try
More informationWorkflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.
Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their
More informationTHE FUTURE IS EFFICIENT
THE FUTURE IS EFFICIENT KV-S1027C AND KV-S1057C WORKGROUP SCANNER SOLUTIONS Versatile scaig solutios from the world s imagig specialists Paasoic has eared a worldwide reputatio as a leader i imagig techology
More informationLecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV
Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationTHIRD-QUARTER 2017 REVENUES
PRESS RELEASE Paris, November 16, 2017 THIRD-QUARTER 2017 REVENUES Reveues up 6.6% year o year for the first ie moths of 2017, comig i at 3,710 millio 250,000 ew mobile subscribers durig the quarter the
More informationAnalysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c
Advaced Materials Research Olie: 2013-01-25 IN: 1662-8985, Vol. 659, pp 196-201 doi:10.4028/www.scietific.et/amr.659.196 2013 Tras Tech Publicatios, witzerlad Aalysis of Class Desig Couplig Based o Iformatio
More informationChapter 4 The Datapath
The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that
More informationAnti-addiction System Development Based on Android Smartphone. Xiafu Pan
3rd Iteratioal Coferece o Materials Egieerig, Maufacturig Techology ad Cotrol (ICMEMTC 2016) Ati-addictio System Developmet Based o Adroid Smartphoe Xiafu Pa Haia Vocatioal College of Political Sciece
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More information