Apta Ss-Ccs-Rp-001-10
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Undergraduate Report
UNDERGRADUATE REPORT Attack Evolution: Identifying Attack Evolution Characteristics to Predict Future Attacks by MaryTheresa Monahan-Pendergast Advisor: UG 2006-6 IINSTITUTE FOR SYSTEMSR RESEARCH ISR develops, applies and teaches advanced methodologies of design and analysis to solve complex, hierarchical, heterogeneous and dynamic problems of engineering technology and systems for industry and government. ISR is a permanent institute of the University of Maryland, within the Glenn L. Martin Institute of Technol- ogy/A. James Clark School of Engineering. It is a National Science Foundation Engineering Research Center. Web site http://www.isr.umd.edu Attack Evolution 1 Attack Evolution: Identifying Attack Evolution Characteristics To Predict Future Attacks MaryTheresa Monahan-Pendergast Dr. Michel Cukier Dr. Linda C. Schmidt Dr. Paige Smith Institute of Systems Research University of Maryland Attack Evolution 2 ABSTRACT Several approaches can be considered to predict the evolution of computer security attacks, such as statistical approaches and “Red Teams.” This research proposes a third and completely novel approach for predicting the evolution of an attack threat. Our goal is to move from the destructive nature and malicious intent associated with an attack to the root of what an attack creation is: having successfully solved a complex problem. By approaching attacks from the perspective of the creator, we will chart the way in which attacks are developed over time and attempt to extract evolutionary patterns. These patterns will eventually -
Fire Service Features of Buildings and Fire Protection Systems
Fire Service Features of Buildings and Fire Protection Systems OSHA 3256-09R 2015 Occupational Safety and Health Act of 1970 “To assure safe and healthful working conditions for working men and women; by authorizing enforcement of the standards developed under the Act; by assisting and encouraging the States in their efforts to assure safe and healthful working conditions; by providing for research, information, education, and training in the field of occupational safety and health.” This publication provides a general overview of a particular standards- related topic. This publication does not alter or determine compliance responsibilities which are set forth in OSHA standards and the Occupational Safety and Health Act. Moreover, because interpretations and enforcement policy may change over time, for additional guidance on OSHA compliance requirements the reader should consult current administrative interpretations and decisions by the Occupational Safety and Health Review Commission and the courts. Material contained in this publication is in the public domain and may be reproduced, fully or partially, without permission. Source credit is requested but not required. This information will be made available to sensory-impaired individuals upon request. Voice phone: (202) 693-1999; teletypewriter (TTY) number: 1-877-889-5627. This guidance document is not a standard or regulation, and it creates no new legal obligations. It contains recommendations as well as descriptions of mandatory safety and health standards. The recommendations are advisory in nature, informational in content, and are intended to assist employers in providing a safe and healthful workplace. The Occupational Safety and Health Act requires employers to comply with safety and health standards and regulations promulgated by OSHA or by a state with an OSHA-approved state plan. -
Wannacry Ransomware
KNOW THE UNKNOWN® Success Story: WannaCry Ransomware WHITE PAPER Challenge Stopping a Worm & Saving Millions Worms like WannaCry and Petya operate as essentially Even the most recent of these attacks like WannaCry and zero-day attacks: they can lie dormant on our networks Petya still echo the basic principles of past-worms, and as and then rapidly spread between devices upon waking up. such, they are both preventable and stoppable. During The consequences of being hit by one is dramatic: precious the Code Red, Nimda, and ILOVEYOU attacks of the early- data is either ransom-locked or wiped and thus often 2000s, businesses that had invested in a NIKSUN-like irrecoverable. This means millions in lost data, restoration solution were able to run a rapid report to get a list of fees, public relations, and stock-holder confidence. all infected devices and cut them off from their network. Instead of thousands of machines being affected, they When FedEx was hit by Petya, for example, their subsidiary were able to resolve the incident with minor losses of TNT Express experienced “widespread service delays” and hundreds or less. This process takes a mere few minutes were unable to “fully restore all of the affected systems and thus could have saved Reckitt Benckiser from their and recover all of the critical business data that was hour-long attack. encrypted by the virus.”1 Shares in the company dropped 3.4% in the wake of the attack.2 Total, 100% visibility is simply the only way to stop these worms from becoming too damaging. -
Nimda Worm Shows You Can't Always Patch Fast Enough
Research Publication Date: 19 September 2001 ID Number: FT-14-5524 Nimda Worm Shows You Can't Always Patch Fast Enough John Pescatore Nimda bundles several known exploits against Internet Information Server and other Microsoft software. Enterprises with Web applications should start to investigate less- vulnerable Web server products. © 2001 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice. NEWS ANALYSIS Event On 18 September 2001, a new mass-mailing computer worm began infecting computers worldwide, damaging local files as well as remote network files. The w32.Nimda.A @ mm worm can spread through e-mail, file sharing and Web site downloads. For more information, visit: http://www.microsoft.com/technet/security/topics/Nimda.asp or http://www.sarc.com/avcenter/venc/data/[email protected]. Analysis As a "rollup worm," Nimda bundles several known exploits against Microsoft's Internet Information Server (IIS), Internet Explorer (IE) browser, and operating systems such as Windows 2000 and Windows XP, which have IIS and IE embedded in their code. To protect against Nimda, Microsoft recommends installing numerous patches and service packs on virtually every PC and server running IE, IIS Web servers or the Outlook Express e-mail client. -
Best Practice Guide on Fire Stops and Fire Blocks and Their Impact on Sound Transmission
http://irc.nrc-cnrc.gc.ca Best Practice Guide on Fire Stops and Fire Blocks and their Impact on Sound Transmission NRCC-49677 Richardson, J.K.; Quirt, J.D.; Hlady, R. June 2007 The material in this document is covered by the provisions of the Copyright Act, by Canadian laws, policies, regulations and international agreements. Such provisions serve to identify the information source and, in specific instances, to prohibit reproduction of materials without written permission. For more information visit http://laws.justice.gc.ca/en/showtdm/cs/C-42 Les renseignements dans ce document sont protégés par la Loi sur le droit d'auteur, par les lois, les politiques et les règlements du Canada et des accords internationaux. Ces dispositions permettent d'identifier la source de l'information et, dans certains cas, d'interdire la copie de documents sans permission écrite. Pour obtenir de plus amples renseignements : http://lois.justice.gc.ca/fr/showtdm/cs/C-42 Best Practice Guide on Fire and their Impact on Sound Transmission Stops and Fire Blocks 2007 June June 2007 Best Practice Guide on Fire Stops and Fire Blocks and their Impact on Sound Transmission J.K. Richardson, J.D. Quirt, R. Hlady BEST PRACTICE GUIDE ON FIRE STOPS AND FIRE BLOCKS AND THEIR IMPACT ON SOUND TRANSMISSION Prepared For Special Interest Group on Suitable Acoustic and Fire Stop Technologies Prepared by J. Kenneth Richardson J. David Quirt Ken Richardson Fire Technologies Inc. Institute for Research in Construction National Research Council of Canada Rob Hlady Affinity Fire Stop Consultants Inc. June 2007 DISCLAIMER The analysis, interpretations, and recommendations in this Guide are those of the authors and do not necessarily reflect the views of the Special Interest Group on Suitable Acoustic and Fire Stop Technologies or those organizations that assisted in the preparation, review and publication of the document. -
Code Red Worm Propagation Modeling and Analysis ∗
Code Red Worm Propagation Modeling and Analysis ∗ Cliff Changchun Zou Weibo Gong Don Towsley Dept. Electrical & Dept. Electrical & Dept. Computer Science Computer Engineering Computer Engineering Univ. Massachusetts Univ. Massachusetts Univ. Massachusetts Amherst, MA Amherst, MA Amherst, MA [email protected] [email protected] [email protected] ABSTRACT the Internet has become a powerful mechanism for propa- The Code Red worm incident of July 2001 has stimulated gating malicious software programs. Worms, defined as au- activities to model and analyze Internet worm propagation. tonomous programs that spread through computer networks In this paper we provide a careful analysis of Code Red prop- by searching, attacking, and infecting remote computers au- agation by accounting for two factors: one is the dynamic tomatically, have been developed for more than 10 years countermeasures taken by ISPs and users; the other is the since the first Morris worm [30]. Today, our computing in- slowed down worm infection rate because Code Red rampant frastructure is more vulnerable than ever before [28]. The propagation caused congestion and troubles to some routers. Code Red worm and Nimda worm incidents of 2001 have Based on the classical epidemic Kermack-Mckendrick model, shown us how vulnerable our networks are and how fast we derive a general Internet worm model called the two- a virulent worm can spread; furthermore, Weaver presented factor worm model. Simulations and numerical solutions some design principles for worms such that they could spread of the two-factor worm model match the observed data of even faster [34]. In order to defend against future worms, we Code Red worm better than previous models do. -
Ethernet/IP and Controlnet to PROFIBUS PA Linking Devices User Manual
User Manual EtherNet/IP and ControlNet to PROFIBUS PA Linking Devices Catalog Numbers 1788-EN2PAR, 1788-CN2PAR Important User Information Read this document and the documents listed in the additional resources section about installation, configuration, and operation of this equipment before you install, configure, operate, or maintain this product. Users are required to familiarize themselves with installation and wiring instructions in addition to requirements of all applicable codes, laws, and standards. Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to be carried out by suitably trained personnel in accordance with applicable code of practice. If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment may be impaired. In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use or application of this equipment. The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and requirements associated with any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for actual use based on the examples and diagrams. No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software described in this manual. Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is prohibited. Throughout this manual, when necessary, we use notes to make you aware of safety considerations. WARNING: Identifies information about practices or circumstances that can cause an explosion in a hazardous environment, which may lead to personal injury or death, property damage, or economic loss. -
Ethical Hacking
Official Certified Ethical Hacker Review Guide Steven DeFino Intense School, Senior Security Instructor and Consultant Contributing Authors Barry Kaufman, Director of Intense School Nick Valenteen, Intense School, Senior Security Instructor Larry Greenblatt, Intense School, Senior Security Instructor Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Official Certified Ethical Hacker © 2010 Course Technology, Cengage Learning Review Guide ALL RIGHTS RESERVED. No part of this work covered by the copyright herein Steven DeFino may be reproduced, transmitted, stored or used in any form or by any means Barry Kaufman graphic, electronic, or mechanical, including but not limited to photocopying, Nick Valenteen recording, scanning, digitizing, taping, Web distribution, information networks, Larry Greenblatt or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior Vice President, Career and written permission of the publisher. Professional Editorial: Dave Garza Executive Editor: Stephen Helba For product information and technology assistance, contact us at Managing Editor: Marah Bellegarde Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, Senior Product Manager: submit all requests online at www.cengage.com/permissions Michelle Ruelos Cannistraci Further permissions questions can be e-mailed to Editorial Assistant: Meghan Orvis [email protected] -
Industrial Ethernet Technologies Page 1 © Ethercat Technology Group, January 2011
Industrial Ethernet Technologies Page 1 © EtherCAT Technology Group, January 2011 Industrial Ethernet Technologies: Overview Approaches Modbus/TCP Ethernet/IP Powerlink PROFINET SERCOS III EtherCAT Summary © EtherCAT Technology Group Industrial Ethernet Technologies Editorial Preface: This presentation intends to provide an overview over the most important Industrial Ethernet Technologies. Based on published material it shows the technical principles of the various approaches and tries to put these into perspective. The content given represents my best knowledge of the systems introduced. Since the company I work for is member of all relevant fieldbus organizations and supports all important open fieldbus and Ethernet standards, you can assume a certain level of background information, too. The slides were shown on ETG Industrial Ethernet Seminar Series in Europe, Asia and North America as well as on several other occasions, altogether attended by several thousand people. Among those were project engineers and developers that have implemented and/or applied Industrial Ethernet technologies as well as key representatives of some of the supporting vendor organizations. All of them have been encouraged and invited to provide feedback in case they disagree with statements given or have better, newer or more precise information about the systems introduced. All the feedback received so far was included in the slides. You are invited to do the same: provide feedback and – if necessary – correction. Please help to serve the purpose of this slide set: a fair and technology driven comparison of Industrial Ethernet Technologies. Nuremberg, January 2011 Martin Rostan, [email protected] Industrial Ethernet Technologies Page 2 © EtherCAT Technology Group, January 2011 Industrial Ethernet Technologies: Overview Approaches Modbus/TCP Ethernet/IP Powerlink PROFINET SERCOS III EtherCAT Summary © EtherCAT Technology Group Industrial Ethernet Technologies All Industrial Ethernet Technologies introduced in this presentation are supported by user and vendor organizations. -
THE CONFICKER MYSTERY Mikko Hypponen Chief Research Officer F-Secure Corporation Network Worms Were Supposed to Be Dead. Turns O
THE CONFICKER MYSTERY Mikko Hypponen Chief Research Officer F-Secure Corporation Network worms were supposed to be dead. Turns out they aren't. In 2009 we saw the largest outbreak in years: The Conficker aka Downadup worm, infecting Windows workstations and servers around the world. This worm infected several million computers worldwide - most of them in corporate networks. Overnight, it became as large an infection as the historical outbreaks of worms such as the Loveletter, Melissa, Blaster or Sasser. Conficker is clever. In fact, it uses several new techniques that have never been seen before. One of these techniques is using Windows ACLs to make disinfection hard or impossible. Another is infecting USB drives with a technique that works *even* if you have USB Autorun disabled. Yet another is using Windows domain rights to create a remote jobs to infect machines over corporate networks. Possibly to most clever part is the communication structure Conficker uses. It has an algorithm to create a unique list of 250 random domain names every day. By precalcuting one of these domain names and registering it, the gang behind Conficker could take over any or all of the millions of computers they had infected. Case Conficker The sustained growth of malicious software (malware) during the last few years has been driven by crime. Theft – whether it is of personal information or of computing resources – is obviously more successful when it is silent and therefore the majority of today's computer threats are designed to be stealthy. Network worms are relatively "noisy" in comparison to other threats, and they consume considerable amounts of bandwidth and other networking resources. -
Real-Time Ethernet – PROFINET Technology
July 2011 Real-Time EtherNet – PROFINET Technology Author: Advantech E-mail: [email protected] www.advantech.com July 2011 Twenty years ago, there were competing network protocols in the enterprise (office) network space. Today, no one would believe that, because there is only one network protocol that is used in 99%-plus of all enterprise networks. That network is Ethernet running TCP/IP. Figure 1 – Ethernet is ubiquitous in the enterprise WHAT IS ETHERNET? Ethernet is ubiquitous. Our computer networks all are run on Ethernet, even our video games and HD video devices in our homes are Ethernet enabled. So it is very important to understand what Ethernet is, how it works, and what it can and cannot do. This is especially important in the industrial environment, as Ethernet becomes common on the plant floor. Ethernet is a family of frame-based, or data packet based, networking technologies that are part of the IEEE 802.3 standard. There are several varieties of Ethernet. Originally based on a coaxial cable format, like the old analog cable TV cable, Ethernet cabling became based on twisted pair technology adapted from telephony (see Fig. 1), because this kind of cable was already run in many offices and was understandable to most cable installers. Thus, 10Base-T was developed as a star topology, similar to telephony, and this was continued in 100Base-T and other higher throughput formats. Ethernet networks consist of nodes, switches, routers and repeaters. Switches, especially smart managed switches, have made it possible to have Ethernet networks consisting of a nearly infinite number of nodes. -
Fire Protection and Life Safety Design Standards
FIRE PROTECTION AND LIFE SAFETY DESIGN STANDARDS Release 1.0 April 2011 Released by: Cleveland Clinic 9500 Euclid Ave. Cleveland OH 44195 All information within this Document is considered CONFIDENTIAL and PROPRIETARY. By receipt and use of this Document, the recipient agrees not to divulge any of the information herein and attached hereto to persons other than those within the recipients’ organization that have specific need to know for the purposes of reviewing and referencing this information. Recipient also agrees not to use this information in any manner detrimental to the interests of Cleveland Clinic. Cleveland Clinic Design Standards Copyright © 2011 By the Cleveland Clinic These Standards, or parts thereof, may not be reproduced in any form without the permission of the Cleveland Clinic. Cleveland Clinic Cleveland Clinic Design Standards: Fire Protection and Life Safety The following pages contain guidelines for the design and construction of new and renovated facilities at all domestic Cleveland Clinic locations. They shall be used by A/E firms in the preparation of drawings and specifications for construction of facilities. The general purpose of Design Standards is to provide minimal criteria for design, materials, and equipment at Cleveland Clinic facilities regarding Codes and FM Global compliance, warranty, approved products, execution and uniformity. The Standards are not Contract Specifications, but used to prepare more detailed, project specific specifications. The Standards are intended to be used to address system design aspects of equipment that Cleveland Clinic desires to standardize among facilities, and identify prohibited materials and construction practices. The use of these Standards is mandatory for all design or maintenance projects.