Information Technology Security Handbook

Total Page:16

File Type:pdf, Size:1020Kb

Information Technology Security Handbook IT-SECURITY INFORMATION TECHNOLOGY SECURITY HANDBOOK by George Sadowsky James X. Dempsey Alan Greenberg Barbara J. Mack Alan Schwartz © 2003 The International Bank for Reconstruction and Development / The World Bank 1818 H Street, NW Washington, DC 20433 Telephone 202-473-1000 Internet www.worldbank.org E-mail [email protected] All rights reserved. The findings, interpretations, and conclusions expressed herein are those of the author(s) and do not necessarily reflect the views of the Board of Executive Directors of the World Bank or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of the World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries. This Handbook is distributed on the understanding that if legal or other expert assistance is required in any particular case, readers should not rely on statements made in this Handbook, but should seek the services of a competent professional. Neither the authors, nor the reviewers or The World Bank Group accepts responsibility for the consequences of actions taken by readers who do not seek necessary advice from competent professionals, on legal or other matters that require expert advice. Rights and Permissions The material in this work is copyrighted. Copying and/or transmitting portions or all of this work without permission may be a violation of applicable law. The World Bank encourages dissemination of its work and will normally grant permission promptly. Portions of this publication have been extracted, with permission of the publisher, from Simson Garfinkel, Gene Spafford, and Alan Schwartz, Practical Unix and Internet Security, 3rd edition, © O'Reilly & Associates, Inc., February 2003, and Simson Garfinkel and Gene Spafford, Web Security, Privacy and Commerce, 2nd edition, © O'Reilly & Associates, Inc., January 2002. For permission to photocopy or reprint any part of this work, please send a request with complete information to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA, telephone 978-750-8400, fax 978-750-4470, www.copyright.com. All other queries on rights and licenses, including subsidiary rights, should be addressed to the Office of the Publisher, World Bank, 1818 H Street NW, Washington, DC 20433, USA, fax 202-522-2422, e-mail [email protected]. Design: Studio Grafik, Herndon, VA GLOBAL INFORMATION AND COMMUNICATION TECHNOLOGIES DEPARTMENT THE WORLD BANK 1818 H STREET · NW WASHINGTON · DC 20433 USA telephone 202.458.5153 facsimile 202.522.3186 email [email protected] website infodev.org ISBN 0-9747888-0-5 INFORMATION FOR DEVELOPMENT PROGRAM A CRONYMS ICT Information and Communication Technology OECD DAC Organization for Economic Cooperation and Development's Development Assistance Committee MDGs Millennium Development Goals NGO Non–Government-Organization WSIS World Summit on the Information Society DotForce Digital Opportunity Task Force of the G8 states. G8 Major industrial democracies have been meeting annually since 1975 to deal with the major economic and political issues facing their domestic societies and the international community as a whole. These states – the G8 – contain France, USA, Germany, Japan, Italy, Great Britain, Canada and – since the Birmingham Summit in 1998 - Russia. UN ICT Task Force United Nations Information and Communication Technology Task Force PDA Personal Digital Assistant SME’s Small and Medium Enterprises HIPC Highly Indebted Poor Countries FDI Foreign Direct Investment OECD Organization for Economic Cooperation and Development DFID Department for International Development ITDG Intermediate Technologies Development Group VoIP Voice-over-Internet-Protocol Information Technology Security Handbook iii CONTENTS 1 PREFACE 125 CHAPTER 9. COMPUTER CRIME 130 CHAPTER 10. MOBILE RISK MANAGEMENT 7 EXECUTIVE SUMMARY 139 CHAPTER 11. BEST PRACTICES: BUILDING SECURITY CULTURE 144 CHAPTER 12. GENERAL RULES FOR 13 PART 1. INTRODUCTION COMPUTER USERS 14 CHAPTER 1. IT SECURITY IN THE DIGITAL AGE 150 CHAPTER 13. GLOBAL DIALOGUES ON SECURITY 29 PART 2. SECURITY FOR INDIVIDUALS 163 PART 4. INFORMATION SECURITY AND 30 CHAPTER 1. INTRODUCTION TO SECURITY GOVERNMENT POLICIES FOR INDIVIDUALS 164 CHAPTER 1. INTRODUCTION 31 CHAPTER 2. UNDERSTANDING AND 167 CHAPTER 2. PROTECTING GOVERNMENT SYSTEMS ADDRESSING SECURITY 174 CHAPTER 3. THE ROLE OF LAW AND GOVERNMENT 35 CHAPTER 3. KEEPING YOUR COMPUTER POLICY VIS A VIS THE PRIVATE SECTOR AND DATA SECURE 176 CHAPTER 4. GOVERNMENT 43 CHAPTER 4. KEEPING YOUR CYBER-SECURITY POLICIES OPERATING SYSTEM AND APPLICATION SOFTWARE SECURE 47 CHAPTER 5. MALICIOUS SOFTWARE 189 PART 5. IT SECURITY FOR 53 CHAPTER 6. SECURING SERVICES OVER NETWORKS TECHNICAL ADMINISTRATORS 63 CHAPTER 7. TOOLS TO ENHANCE SECURITY 190 CHAPTER 1. BACKGROUND 68 CHAPTER 8. PLATFORM SPECIFIC ISSUES 196 CHAPTER 2. SECURITY FOR ADMINISTRATORS 73 ADDENDUM 1. INTRODUCTION TO ENCODING 209 CHAPTER 3. PHYSICAL SECURITY AND ENCRYPTION 220 CHAPTER 4. INFORMATION SECURITY 77 ADDENDUM 2. TCP/IP 238 CHAPTER 5. IDENTIFICATION AND AUTHENTICATION 79 ADDENDUM 3. MINI-GLOSSARY OF TECHNICAL TERMS 266 CHAPTER 6. SERVER SECURITY 288 CHAPTER 7. NETWORK SECURITY 314 CHAPTER 8. ATTACKS AND DEFENSES 81 PART 3. SECURITY FOR ORGANIZATIONS 326 CHAPTER 9. DETECTING AND MANAGING A BREAK-IN 82 CHAPTER 1. INTRODUCTION 341 CHAPTER 10. SYSTEM-SPECIFIC GUIDELINES 86 CHAPTER 2. OVERVIEW OF E-SECURITY RISK MITIGATION 94 CHAPTER 3. RISK EVALUATION AND LOSS ANALYSIS 351 ANNEXES 101 CHAPTER 4. PLANNING YOUR SECURITY NEEDS 352 ANNEX 1. GLOSSARY 105 CHAPTER 5. ORGANIZATIONAL SECURITY POLICY 362 ANNEX 2. BIBLIOGRAPHY AND PREVENTION 371 ANNEX 3. ELECTRONIC RESOURCES 112 CHAPTER 6. PERSONNEL SECURITY 378 ANNEX 4. SECURITY ORGANIZATIONS 117 CHAPTER 7. SECURITY OUTSOURCING 384 ANNEX 5. PRINT RESOURCES 122 CHAPTER 8. PRIVACY POLICIES LEGISLATION, AND GOVERNMENT REGULATION Information Technology Security Handbook v FORWARD he Preparation of this book was fully funded by a grant from the infoDev Program of the World Bank Group. The topic of Information Technology (IT) security has been growing in importance in the last few years, and Twell recognized by infoDev Technical Advisory Panel. We would like to thank the State Secretariat of Economic Affairs of Switzerland (SECO) for having been instrumental not only in providing the funding for this project, but also in recognizing the urgency of the matter and allowing this book to come to fruition. We recognize the fundamental role of Informational and Communication Technologies (ICT) for social and economic development. Similarly, we recognize that there cannot be an effective use of ICT in the absence of a safe and trusted ICT environment. Thus, IT security plays a prime role in helping creating the environment needed to set the ground for implementing successful national ICT plans, e-Government or e-Commerce activities, as well as sectoral projects, such as, for example, in the areas of education, health, or finance. IT security is a complex topic and evolves almost as fast as technology does. The authors have succeeded in providing technology-independent best practices, as well as recommendations for particular IT environments. As technology evolves, the accompanying web site (www.infodev-security.net) will provide updates as appropriate, allowing for a constant dissemination of developments in the field of IT security. While the opinions and recommen- dations made in this book do not necessarily reflect the views of infoDev or The World Bank Group, we believe that the combination of the book and its supporting web site will make a valuable contribution to the understanding of IT security around the globe. The book is composed of five parts, each of which can be read independently. After an introduction to general issues of IT security, the book addresses issues relevant specifically to individuals, small and medium organizations, government, and technical administrators. Although most of the research and publications on IT security comes from developed countries, the authors have attempted to provide practical guidance applicable anywhere and to include examples from developing countries. We hope that this book and its supporting web site will provide the beginning of an interactive process, where the content and best practices will evolve overtime as technology advances, but more importantly, as readers will share their experiences and best practices with their peers. Mohsen A. Khalil Director, Global Information and Communication Technologies Department The World Bank Group Bruno Lanvin Program Manager, infoDev Program The World Bank Group Michel H. Maechler InfoDev Task Manager Senior Informatics Specialist The World Bank Group vi Walter Duss Bertrand Livinec, CISA Review Vice President, Practice Lead Sub-Saharan swiss interactive media and Francophone Africa Region Committee software association (simsa) Group Risk Management Solutions Managing Director, (GRMS) Members ASP Konsortium Switzerland PriceWaterhouseCoopers Wilen, Switzerland Paris, France Information Technology Kurt Haering Michel Maechler, CISA, CISM Security Handbook President Senior Informatics Specialist EFSI AG Global Information and Basel, Switzerland Communications Technology, Policy (Formerly President of Division Infosurance, Zürich, The World Bank Switzerland) Washington, DC, USA Thomas
Recommended publications
  • July 18, 2012 Chairman Julius Genachowski Federal Communications Commission 445 12Th Street SW Washington, DC 20554 Re
    July 18, 2012 Chairman Julius Genachowski Federal Communications Commission 445 12th Street SW Washington, DC 20554 Re: Letter, CG Docket No. 09-158, CC Docket No. 98-170, WC Docket No. 04-36 Dear Chairman Genachowski, Open data and an independent, transparent measurement framework must be the cornerstones of any scientifically credible broadband Internet access measurement program. The undersigned members of the academic and research communities therefore respectfully ask the Commission to remain committed to the principles of openness and transparency and to allow the scientific process to serve as the foundation of the broadband measurement program. Measuring network performance is complex. Even among those of us who focus on this topic as our life’s work, there are disagreements. The scientific process happens best in the sunlight and that can only happen when as many eyes as possible are able to look at a shared set of data, work to replicate results, and assess its meaning and impact. This ensures the conclusions from the broadband measurement allow for meaningful, data-driven policy making. Since the inception of the broadband measurement program, those of us who work on Internet research have lauded its precedent-setting commitment to open-data and transparency. Many of us have engaged with this program, advising on network transparency and measurement methodology and using the openly-released raw data as a part of our research. However, we understand that some participants in the program have proposed significant changes that would transform an open measurement process into a closed one. Specifically, that the Federal Communications Commission (FCC) is considering a proposal to replace the Measurement Lab server infrastructure with closed infrastructure, run by the participating Internet service providers (ISPs) whose own speeds are being measured.
    [Show full text]
  • Internet Hall of Fame Announces 2013 Inductees
    Internet Hall of Fame Announces 2013 Inductees Influential engineers, activists, and entrepreneurs changed history through their vision and determination Ceremony to be held 3 August in Berlin, Germany [Washington, D.C. and Geneva, Switzerland -- 26 June 2013] The Internet Society today announced the names of the 32 individuals who have been selected for induction into the Internet Hall of Fame. Honored for their groundbreaking contributions to the global Internet, this year’s inductees comprise some of the world’s most influential engineers, activists, innovators, and entrepreneurs. The Internet Hall of Fame celebrates Internet visionaries, innovators, and leaders from around the world who believed in the design and potential of an open Internet and, through their work, helped change the way we live and work today. The 2013 Internet Hall of Fame inductees are: Pioneers Circle – Recognizing individuals who were instrumental in the early design and development of the Internet: David Clark, David Farber, Howard Frank, Kanchana Kanchanasut, J.C.R. Licklider (posthumous), Bob Metcalfe, Jun Murai, Kees Neggers, Nii Narku Quaynor, Glenn Ricart, Robert Taylor, Stephen Wolff, Werner Zorn Innovators – Recognizing individuals who made outstanding technological, commercial, or policy advances and helped to expand the Internet’s reach: Marc Andreessen, John Perry Barlow, Anne-Marie Eklund Löwinder, François Flückiger, Stephen Kent, Henning Schulzrinne, Richard Stallman, Aaron Swartz (posthumous), Jimmy Wales Global Connectors – Recognizing individuals from around the world who have made significant contributions to the global growth and use of the Internet: Karen Banks, Gihan Dias, Anriette Esterhuysen, Steven Goldstein, Teus Hagen, Ida Holz, Qiheng Hu, Haruhisa Ishida (posthumous), Barry Leiner (posthumous), George Sadowsky “This year’s inductees represent a group of people as diverse and dynamic as the Internet itself,” noted Internet Society President and CEO Lynn St.
    [Show full text]
  • Download File
    INTERNET FOR ALL Proceedings of the Third Internet Governance Forum Hyderabad, India 3-6 December 2008 Edited by Don MacLean General Table of Contents Message by Sha Zukang, Under-Secretary-General, United Nations Department of Economic and Social Affairs (UNDESA) ……………………..i Introduction……………………………………………………………...……….ii Preface ......................................................................................................... 1 Setting the Scene ....................................................................................... 5 Opening Ceremony, 3 December 2008.....................................................6 Opening Session, 3 December 2008.......................................................16 Part 1 – Reaching the Next Billion.............................................................. 34 Chairman’s Summary of the Main Sessions..........................................35 Panel Discussion on Realizing a Multilingual Internet .........................39 Panel Discussion on Access...................................................................50 Open Dialogue on Reaching the Next Billion ........................................67 Reports of Workshops, Best Practice Forums, Open Forums and Dynamic Coalitions ..................................................................................84 Part 2 – Promoting Cyber-security and Trust ........................................... 117 Chairman’s Summary of Main Sessions ..............................................118 Panel Discussion on Dimensions of Cyber-security
    [Show full text]
  • The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World’S Data Protection Authorities
    The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World’s Data Protection Authorities by Stephanie E. Perrin A thesis submitted in conformity with the requirements for the degree of degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Stephanie E. Perrin 2018 The Struggle for WHOIS Privacy: Understanding the Standoff Between ICANN and the World’s Data Protection Authorities Stephanie E. Perrin Doctor of Philosophy Faculty of Information University of Toronto 2018 Abstract This dissertation examines the struggle over privacy rights in WHOIS, the public directory of registrants of Internet domain names. ICANN, the Internet Corporation for Assigned Names and Numbers, is the non-profit corporation established by the U.S. government to run the Domain Name System and the Internet Assigned Numbers Authority, functions essential for Internet operations. Through contractual obligation, ICANN requires registrars to collect and publish personal data in the WHOIS directory, contravening many national data protection laws. My research first asked how ICANN managed to avoid the demands of authorities mandated to enforce data protection laws. Analyzing extensive documentary records maintained by ICANN, I demonstrate that the organization refused to effectively accommodate privacy concerns in their policies. I found that, since its inception, ICANN rebuffed repeated complaints by data protection authorities that WHOIS requirements violate national laws and continue to avoid privacy compliance. I provide evidence of a clash of values in the emerging commercial Internet. Business enterprises with strong intellectual property interests, supported by the U.S. ii government, initiated the focus on an open WHOIS policy to ensure they could identify suspected copyright and trademark violators.
    [Show full text]
  • Civil Society in a Global Multistakeholder Policy‑Making Process : the Case of the Internet and Netmundial
    This document is downloaded from DR‑NTU (https://dr.ntu.edu.sg) Nanyang Technological University, Singapore. Civil society in a global multistakeholder policy‑making process : the case of the internet and netmundial Haristya, Sherly 2019 Haristya, S. (2019). Civil society in a global multistakeholder policy‑making process : the case of the internet and netmundial. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/105945 https://doi.org/10.32657/10220/48832 Downloaded on 04 Oct 2021 15:30:32 SGT CIVIL SOCIETY IN A GLOBAL MULTISTAKEHOLDER POLICY MULTISTAKEHOLDER GLOBAL A IN SOCIETY CIVIL THECASE OF THE INTERNET AND NETMUNDIAL - MAKING PROCESS: MAKING CIVIL SOCIETY IN A GLOBAL MULTISTAKEHOLDER POLICY-MAKING PROCESS: THE CASE OF THE INTERNET AND NETMUNDIAL SHERLYHARISTYA SHERLY HARISTYA WEE KIM WEE SCHOOL OF COMMUNICATION AND INFORMATION 2019 2019 ! CIVIL SOCIETY IN A GLOBAL MULTISTAKEHOLDER POLICY-MAKING PROCESS: THE CASE OF THE INTERNET AND NETMUNDIAL SHERLY HARISTYA Wee Kim Wee School of Communication & Information A thesis submitted to the Nanyang Technological University in partial fulfillment of the requirement for the degree of Doctor of Philosophy 2019 Statement of Originality I certify that all work submitted for this thesis is my original work. I declare that no other person's work has been used without due acknowledgement. Except where it is clearly stated that I have used some of this material elsewhere, this work has not been presented by me for assessment in any other institution or University. I certify that the data collected for this project are authentic and the investigations were conducted in accordance with the ethics policies and integrity standards of Nanyang Technological University and that the research data are presented honestly and without prejudice.
    [Show full text]
  • ICT4D - Information and Communication Technologies for Development ICT4D - Information and Communication Technologies for Development
    ICT4D - Information and Communication Technologies for Development ICT4D - Information and Communication Technologies for Development Self-Paced Learning Materials Developed by Barbara Fillip This work is licensed under a Creative Commons License . Welcome to the self-paced learning materials for the ICT4D course. My name is Barbara Fillip. I have taught the ICTs for Development course since 1999 and it has evolved quite a lot over the past few years. It started as a traditional face-to-face course in a classroom and it later evolved into an online course with participants around the world Barbara Fillip Next http://www.knowledgefordevelopment.com/ICT4D03SP/pub/Testing_2.htm [09/06/2005 20:01:01] eClass Tutorial eClass Tutorial View Presentation Click on "View Presentation"above to click through a short presentation to help you learn how to navigate the CD-ROM. If you cannot view it, try this alternate format (PDF file). © 2003 Knowledge for Development, LLC Back Next http://www.knowledgefordevelopment.com/ICT4D03SP/pub/eClass_Tutorial.htm [09/06/2005 20:01:00] Course Information Course Information *** YOU CAN ACCESS THIS NOTE AS A SINGLE FILE (PDF FORMAT) *** This section is meant to give you all the essential information you will need to effectively participate in the course and make the most of it. It is the equivalent of a course syllabus and it includes the following sub-sections. You will find the links to each of these sub-sections in the frame to the left of this text. You should go through all the pages within this section before moving on to the modules themselves.
    [Show full text]
  • Internet of Things: Network Deployment Is Taking Place in Most Parts of the World
    December 2015 Volume 18, Number 4 A Quarterly Technical Publication for From The Editor Internet and Intranet Professionals The Internet continues to grow at an amazing pace. WiFi access to the Internet is now almost standard in every hotel room, business, In This Issue home, and even onboard many airplanes. Mobile operators are offer- ing improved Internet access for smartphones and tablets as well as “personal hotspots” through deployment of emerging Long Term From the Editor ...................... 1 Evolution (LTE) standards. Several of the Regional Internet Registries (RIRs) have now depleted their available IPv4 address pool, and IPv6 Internet of Things: Network deployment is taking place in most parts of the world. and Security Architecture........ 2 This growth of the Internet is not only the result of more people using the network, but also the result of more Internet-aware things being RFCs Beyond ASCII ............. 25 connected. These things can be anything from traditional computer systems and peripherals to home security systems, vehicles, sensors of all kinds, and even light bulbs. Collectively referred to as The Internet Fragments ............................. 28 of Things (IoT), this emerging area of technology is receiving much attention, and efforts are underway to standardize the communica- tion protocols used in IoT. William Stallings gives an overview of Call for Papers ...................... 30 these efforts in our first article. Supporters and Sponsors ...... 31 As with most emerging technologies, the potential
    [Show full text]
  • Thesis. 11 Figure 2 Structure of Part II of This Thesis
    Intervention or Collaboration? INTERVENTION OR COLLABORATION? Redesigning Information and Communication Technologies for Development dissertation to obtain the degree of Doctor at Maastricht University on the authority of the Rector Magnificus, Prof. Dr. Rianne M. Letschert in accordance with the decision of the Board of Deans to be defended in public on Tuesday 15 December 2020 at 13.00 hours by anna bon supervisors: Prof. Dr. Sally Wyatt Prof. Dr. Hans Akkermans (Vrije Universiteit Amsterdam) assessment committee: Prof. Dr. Wiebe E. Bijker (Chairman) Prof. Dr. Cyrus C.M. Mody Prof. Dr. Adele Botha (University of South Africa) Prof. Dr. Roel Wieringa (University of Twente) Graduate School of Arts & Social Sciences Faculty of Arts and Social Sciences Maastricht University SIKS Dissertation Series No. 2020–34 The research reported in this thesis has been carried out under the auspices of SIKS, the Dutch Research School for Information and Knowledge Systems. To Bruno, Paloma and Leeuw colophon Intervention or Collaboration? Redesigning Information and Communication Technologies for Development copyright: c Anna Bon 2020 published by: Pangea, Amsterdam December 2020, in the series of W4RA books https://w4ra.org cover design: Anna Bon typography style adapted after: André Miede http://www.miede.de isbn paperback 978-90-78289-24-1 isbn pdf-version 978-90-78289-25-8 nur 980 SUMMARY How can we design and build digital technologies to support people in poor and low- resource environments to achieve their objectives? And how can we do this inclusively and ethically, while considering the complexity of their living and working environ- ments? This is the central question in my research.
    [Show full text]
  • Internet for All. Proceedings of the Third Internet Governance Forum
    INTERNET FOR ALL Proceedings of the Third Internet Governance Forum Hyderabad, India 3-6 December 2008 Edited by Don MacLean Файл загружен с http://www.ifap.ru General Table of Contents Message by Sha Zukang, Under-Secretary-General, United Nations Department of Economic and Social Affairs (UNDESA) ……………………..i Introduction……………………………………………………………...……….ii Preface ......................................................................................................... 1 Setting the Scene ....................................................................................... 5 Opening Ceremony, 3 December 2008.....................................................6 Opening Session, 3 December 2008.......................................................16 Part 1 – Reaching the Next Billion.............................................................. 34 Chairman’s Summary of the Main Sessions..........................................35 Panel Discussion on Realizing a Multilingual Internet .........................39 Panel Discussion on Access...................................................................50 Open Dialogue on Reaching the Next Billion ........................................67 Reports of Workshops, Best Practice Forums, Open Forums and Dynamic Coalitions ..................................................................................84 Part 2 – Promoting Cyber-security and Trust ........................................... 117 Chairman’s Summary of Main Sessions ..............................................118 Panel Discussion
    [Show full text]
  • A Bibliography of Publications in Communications of the ACM : 1990–1999
    A Bibliography of Publications in Communications of the ACM : 1990{1999 Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 20 March 2020 Version 2.87 Title word cross-reference 4 [439]. 400 [918]. 47s [1833]. 5 [582]. 50th [980]. '89 [26]. $150 [1852]. 3 [1862]. N [24]. O2 [226]. p × 64 [164]. '90s [1203]. '92 [39]. '95 [779]. '96 [965]. 9X [398, 399, 397]. -Fold [24]. = [1396, 186]. 1 [1302]. 12 [488]. 1989 [276]. 1989-1990 [275]. 1990s [444, 135, 214]. Abandoned [1385]. Above [834]. Abstract [1179]. abstracting [1442]. abstractions 2 [1187]. 20/20 [1581]. 2000 [1865]. abuses [1866]. academe [1488, 1476, 1309]. 20th [71]. 21st [1313, 1808]. Academic [241, 1661, 1239, 1421, 468, 1116]. 22nd [646, 262, 1459, 1846, 1549, 60]. [401]. Academic-Industry [262]. Acadia [1458]. acceleration [317]. acceptance [1490]. 3.0 [1650]. 3D [1689, 331, 458]. 1 2 Access Aggravation [348]. Aglets [1751]. agora [736, 1070, 1454, 1326, 234, 1459, 11, 1520, [1463]. agreed [1377]. agreed-upon [1377]. 1721, 1513, 1591, 1518, 205, 475, 826, 1146]. ahead [982, 1207, 1662]. AI Accessing [1512]. Accidental [222, 375]. [937, 593, 941, 625, 932, 49, 1344]. AI-based Accountability [958, 606]. accounting [49]. Aid [243]. Aids [992]. aim [88]. Air [1482]. Accreditation [259]. Accredited [622]. AK [1833]. AK-47s [1833]. Alan [55].
    [Show full text]
  • Internet Governance Forum 2012 Panellists Biographies
    INTERNET GOVERNANCE FORUM 2012 PANELLISTS BIOGRAPHIES Table of contents Abdul Rahim Rinalia (Ms) ....................................................................................................................... 9 Abou Zahra Shadi (Mr) .......................................................................................................................... 10 Abraham Sunil (Mr) ............................................................................................................................... 10 Acuña Antonio (Mr) ............................................................................................................................... 11 Adeleye Peter Olugbenga (Mr) .............................................................................................................. 11 Afonso Carlos (Mr) ................................................................................................................................ 12 Aguerre Carolina (Ms) ........................................................................................................................... 13 Aguirre Carlos Dionisio (Mr) ................................................................................................................. 14 Ahmad Shahzad (Mr) ............................................................................................................................. 16 Aizu Izumi (Mr) ..................................................................................................................................... 16 Akoh
    [Show full text]
  • Conference Program INET 2001, 6-8 Juni a Net Odyssey Mobility and the Internet
    10 ANNONS HELA DENNA BILAGA Ä R EN ANNONS FRÅ N EXPONOVA ANNONS Conference program INET 2001, 6-8 juni A Net Odyssey Mobility and the Internet T Technology Summit G Governance Legislation and Regulation Summit U Uses of the Internet Summit Tuesday 5 June 11.00-12.30 Content Regulation and the Internet comm Incorporated, Use of RSIP within GPRS Networks, Senthil Sengodan, Nokia, USA Chair / Moderator: Peng Hwa Ang, Nanyang Technological Stockholm City Hall Univ. Singapore Panelists: Peter Coroneos, Internet Industry Assn, Australia 16.00-17.30 Virtual Private Networks Jacques Berleur, Institut d’Informatique, Cellule interfacul- Chair / Moderator: Marco Carugi, France Telecom taire de Technology Assessment (CITA), BELGIUM T 19.00-21.00 Opening reception Introduction and overview of standardisation on IP VPNs, Richard Swetenham, European Commission, Information Marco Carugi, France Telecom Society DG, Luxemburg Kireeti Kompella, Juniper, U.S.A Parry Aftab, Cyberangels USA Layer 3 Network Based VPNs based on the BGP/MPLS Michael Geist, Univ. of Ottawa, Canada approach, Jean Philippe Vasseur, Cisco Systems, France Wednesday 6 June Layer 3 Network Based VPNs based on the Virtual Router 12.30-14.00 Lunch break approach, Hamid Ould-Brahim, Nortel Networks, Canada Stockholm International Fairs CPE-based VPNs (GRE, L2TP, IPSEC, etc.), Jeremy De Clercq, Alcatel, Belgium 14.00-15.30 Where am I and who’s with me? Chair / Moderator: Patrik Fältström, Cisco Systems 16.00-17.00 Advanced Networking and the Arts: Innova- 07.30-18.00 Registration T LocaPhone
    [Show full text]