September 2015 • Volume 34, Issue 9

Total Page:16

File Type:pdf, Size:1020Kb

September 2015 • Volume 34, Issue 9 TECHNOLOGY, TOOLS AND TACTICS FOR PUBLIC SECTOR IT SEPTEMBER 2015 • VOLUME 34, ISSUE 9 TECH IN CONTEXT: Why SDN matters Page 26 CASE STUDY: A five-state collaboration on benefits data TECHNOLOGY, TOOLS AND TACTICS FOR PUBLIC SECTOR IT Page 28 SEPTEMBER 2015 • VOLUME 34, ISSUE 9 INSIDE DOD’S GLOBAL GRID What DISA is doing to strengthen security and improve situational awareness PAGE 18 0915gcn_0c1.indd 1 9/3/15 3:58 PM Take the complexity out of CDM. Think beyond compliance. Think ahead. HP Enterprise Security Products offers a complete solution to maintain secure data environments and meet agency missions. Our approach to CDM reduces compliance to four simple, integrated steps. We provide industry leading best-of-breed cybersecurity products to modernize agency infrastructure for improved efficiency and increased protection of networks and information systems. Our easy to deploy and use security management products test assets for vulnerabilities before they launch, identity evolving risks in assets already in use, find and resolve threats across the network at machine speed, and reduce the number of events requiring manual management. HP takes the complexity out of CDM. See how it strengthens your mission. To learn more visit: hp.com/go/pubsecsecurity INDUSTRY INSIGHT BY STEPHANIE KANOWITZ INSIDE FEATURES BRIEFING 6 GSA makes awards for 18 New tools ahead for DOD’s long-awaited agile BPA global grid 7 Iowa tests digital What DISA is doing to strengthen security and improve driver’s licenses situational awareness 8 DHS outlines its BY WILLIAM E. WELSH biometric future 22 ‘Checkbook’ websites shine light on spending 10 DARPA takes the sting Sites that share spending data with the public can save time and out of DDoS attacks money, but many states still have a long way to go 11 The Army’s health BY JENNI BERGAL platform embraces fitness-tracking TECH IN CONTEXT 26 Why SDN matters COMMENTARY To understand the potential of software-defined networking, it is important to know where it came from and what it can do 12 CYBEREYE Dumb and dumber: BY MIKE YOUNKERS Shadow BYOD CASE STUDIES 13 EMERGING TECH 28 Multistate database cuts duplicate benefits Augmented reality: Coming to a city near Hurricane Katrina prompted five states to pool their information you to reduce fraud and abuse of disaster and food assistance 14 INDUSTRY INSIGHT BY STEPHANIE KANOWITZ How to wring every 30 County first reponders get mobile data system ounce of performance from data center storage Maryland’s Frederick County installed laptops in fire and rescue vehicles to share real-time data and reduce voice radio traffic 15 INDUSTRY INSIGHT How to minimize the BY AMANDA ZIADEH impact from DDoS HOW TO attacks 31 10 steps to secure your print processes 16 INDUSTRY INSIGHT 5 best practices Multifunction printers are as vulnerable as computers, so agencies for reducing risk in must incorporate them into information security plans communication archives BY CHRIS STRAMMIELLO GCN (ISSN 0738-4300) is published 11 times a year, monthly except Dec by 1105 Media, Inc., 9201 Oakdale Avenue, Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offices. WISH LIST Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non- qualified subscribers are: U.S. $125.00, International $165.00. Subscription inquiries, back issue requests, and address changes: Mail to: GCN, P.O. Box 2166, Skokie, IL 60076-7866, call (866) 293-3194, outside U.S. (847) 763-9560; fax (847) 763- 34 Tech that we hope hits 9564 or email [email protected]. POSTMASTER: Send address changes to GCN, P.O. Box 2166, Skokie, IL 60076-7866. the public sector Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada. GCN SEPTEMBER 2015 • GCN.COM 3 0915gcn_003.indd 3 9/3/15 2:08 PM SALES CONTACT Editor-In-Chief Troy K. Schneider Vice President, Art and Brand Design INFORMATION Executive Editor Susan Miller Scott Shultz Print Managing Editor Terri J. Huck Creative Director Jeff Langkau MEDIA CONSULTANTS Ted Chase Senior Editor Paul McCloskey Assistant Art Director Dragutin Cvijanovic Media Consultant, DC, MD, VA, Reporter/Producers Derek Major, Amanda Senior Web Designer Martin Peace OH, Southeast Ziadeh (703) 944-2188 Director, Print Production David Seymour [email protected] Contributing Writers Kathleen Hickey, Print Production Coordinator Lee Alexander Bill Cooper Stephanie Kanowitz, Will Kelly, Suzette Lohmeyer, Chief Revenue Officer Dan LaBianca Media Consultant, Midwest, CA, WA, OR Carolyn Duffy Marsan, Patrick Marshall, (650) 961-1760 Brian Robinson, William E. Welsh [email protected] Editorial Fellow Mark Pomerleau Matt Lally Media Consultant, Northeast (973) 600-2749 [email protected] Mary Martin Chief Operating Officer and Marketing Media Consultant, DC, MD, VA Public Sector Media Group President Chief Marketing Officer Carmel McDonagh (703) 222-2977 Henry Allain Vice President, Marketing Emily Jacobs [email protected] Director, Custom Events Nicole Szabo Co-President and Chief Content Officer Audience Development Manager Becky Fenton Anne A. Armstrong EVENT SPONSORSHIP CONSULTANTS Senior Director, Audience Development & Data Stacy Money Chief Revenue Officer Procurement Annette Levee (415) 444-6933 Dan LaBianca Custom Editorial Director John Monroe [email protected] Senior Manager, Marketing Christopher Morales Chief Marketing Officer Marketing Coordinator Alicia Chew Alyce Morrison Carmel McDonagh Manager, Audience Development Tracy Kerley (703) 645-7873 Senior Coordinator Casey Stankus [email protected] Advertising and Sales Chief Revenue Officer Dan LaBianca FederalSoup and Washington Technology Kharry Wolinsky Senior Sales Director, Events Stacy Money General Manager Kristi Dougherty (703) 300-8525 Director of Sales David Tucker Senior Sales Account Executive Jean Dellarobba [email protected] OTHER PSMG BRANDS Media Consultants Ted Chase, Bill Cooper, Matt Lally, MEDIA KITS Mary Martin, Mary Keenan FCW Direct your media kit Event Sponsorships Alyce Morrison, Editor-in-Chief Troy K. Schneider requests to Serena Barnes, [email protected] Kharry Wolinsky Executive Editor John Bicknell Managing Editor Terri J. Huck REPRINTS Art Staff Senior Staff Writer Adam Mazmanian For single article reprints (in minimum quantities of Vice President, Art and Brand Design Scott Shultz Staff Writers Sean Lyngaas, Zach Noble, Mark Rockwell 250-500), e-prints, plaques and posters contact: Creative Director Jeffrey Langkau Editorial Fellows Jonathan Lutton, Bianca Spinosa Associate Creative Director Scott Rovin PARS International Senior Art Director Deirdre Hoffman Defense Systems Phone: (212) 221-9595 Art Director Joshua Gould Editor-in-Chief Kevin McCaney Email: [email protected] Art Director Michele Singh Washington Technology Web: magreprints.com/QuickQuote.asp Assistant Art Director Dragutin Cvijanovic Editor-in-Chief Nick Wakeman Senior Graphic Designer Alan Tao Senior Staff Writer Mark Hoover LIST RENTALS Graphic Designer Erin Horlacher This publication’s subscriber list, as well as other lists Senior Web Designer Martin Peace Federal Soup from 1105 Media, Inc., is available for rental. For more Managing Editors Phil Piemonte, Sherkiya Wedgeworth information, please contact our list manager, Merit Print Production Staff THE Journal Direct. Phone: (914) 368-1000 Director, Print Production David Seymour Editor-in-Chief Christopher Piehler Email: [email protected] Print Production Coordinator Lee Alexander Web: meritdirect.com/1105 Campus Technology Online/Digital Media (Technical) Executive Editor Rhea Kelly SUBSCRIPTIONS Vice President, Digital Strategy Becky Nagel We will respond to all customer service inquiries within Senior Site Administrator Shane Lee 48 hours. Site Administrator Biswarup Bhattacharjee Email: [email protected] Senior Front-End Developer Rodrigo Munoz Chief Executive Officer Mail: GCN Junior Front-End Developer Anya Smolinski Rajeev Kapur PO Box 2166 Executive Producer, New Media Michael Domingo Skokie, IL 60076 Site Associate James Bowling Chief Operating Officer Phone: (866) 293-3194 or (847) 763-9560 Henry Allain Lead Services Senior Vice President & Vice President, Lead Services Michele Imgrund REACHING THE STAFF Chief Financial Officer E-mail: To e-mail any member of the staff, please use Senior Director, Audience Development & Data Richard Vitale the following form: FirstinitialLastname@1105media. Procurement Annette Levee com. Director, Custom Assets & Client Services Mallory Bundy Executive Vice President Editorial Director Ed Zintel Michael J. Valenti CORPORATE OFFICE Project Manager, Client Services Michele Long Weekdays 8:30 a.m.–5:30 p.m. PST Vice President, Information Technology Project Coordinator, Client Services Olivia Urizar Telephone (818) 814-5200; fax (818) 936-0496 & Application Development Manager, Lead Generation Marketing Andrew Spangler 9201 Oakdale Avenue, Suite 101 Erik A. Lindgren Coordinators, Lead Generation Marketing Naija Bryant, Chatsworth, CA 91311 Jason Pickup, Amber Stephens Chairman of the Board Jeffrey S. Klein 4 GCN SEPTEMBER 2015 • GCN.COM 0915gcn_004.indd 4 8/31/15 9:35 AM I changed to GEICO because I moved from Bu alo to D.C. and needed insurance. I have already told people about the good service I have received! JoAnn Brant Government Employee for 12 years GEICO
Recommended publications
  • Systematization of Vulnerability Discovery Knowledge: Review
    Systematization of Vulnerability Discovery Knowledge Review Protocol Nuthan Munaiah and Andrew Meneely Department of Software Engineering Rochester Institute of Technology Rochester, NY 14623 {nm6061,axmvse}@rit.edu February 12, 2019 1 Introduction As more aspects of our daily lives depend on technology, the software that supports this technology must be secure. We, as users, almost subconsciously assume the software we use to always be available to serve our requests while preserving the confidentiality and integrity of our information. Unfortunately, incidents involving catastrophic software vulnerabilities such as Heartbleed (in OpenSSL), Stagefright (in Android), and EternalBlue (in Windows) have made abundantly clear that software, like other engineered creations, is prone to mistakes. Over the years, Software Engineering, as a discipline, has recognized the potential for engineers to make mistakes and has incorporated processes to prevent such mistakes from becoming exploitable vulnerabilities. Developers leverage a plethora of processes, techniques, and tools such as threat modeling, static and dynamic analyses, unit/integration/fuzz/penetration testing, and code reviews to engineer secure software. These practices, while effective at identifying vulnerabilities in software, are limited in their ability to describe the engineering failures that may have led to the introduction of vulnerabilities. Fortunately, as researchers propose empirically-validated metrics to characterize historical vulnerabilities, the factors that may have led to the introduction of vulnerabilities emerge. Developers must be made aware of these factors to help them proactively consider security implications of the code that they contribute. In other words, we want developers to think like an attacker (i.e. inculcate an attacker mindset) to proactively discover vulnerabilities.
    [Show full text]
  • Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE of CONTENTS 2016 Internet Security Threat Report 2
    Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE OF CONTENTS 2016 Internet Security Threat Report 2 CONTENTS 4 Introduction 21 Tech Support Scams Go Nuclear, 39 Infographic: A New Zero-Day Vulnerability Spreading Ransomware Discovered Every Week in 2015 5 Executive Summary 22 Malvertising 39 Infographic: A New Zero-Day Vulnerability Discovered Every Week in 2015 8 BIG NUMBERS 23 Cybersecurity Challenges For Website Owners 40 Spear Phishing 10 MOBILE DEVICES & THE 23 Put Your Money Where Your Mouse Is 43 Active Attack Groups in 2015 INTERNET OF THINGS 23 Websites Are Still Vulnerable to Attacks 44 Infographic: Attackers Target Both Large and Small Businesses 10 Smartphones Leading to Malware and Data Breaches and Mobile Devices 23 Moving to Stronger Authentication 45 Profiting from High-Level Corporate Attacks and the Butterfly Effect 10 One Phone Per Person 24 Accelerating to Always-On Encryption 45 Cybersecurity, Cybersabotage, and Coping 11 Cross-Over Threats 24 Reinforced Reassurance with Black Swan Events 11 Android Attacks Become More Stealthy 25 Websites Need to Become Harder to 46 Cybersabotage and 12 How Malicious Video Messages Could Attack the Threat of “Hybrid Warfare” Lead to Stagefright and Stagefright 2.0 25 SSL/TLS and The 46 Small Business and the Dirty Linen Attack Industry’s Response 13 Android Users under Fire with Phishing 47 Industrial Control Systems and Ransomware 25 The Evolution of Encryption Vulnerable to Attacks 13 Apple iOS Users Now More at Risk than 25 Strength in Numbers 47 Obscurity is No Defense
    [Show full text]
  • Compromised Connections
    COMPROMISED CONNECTIONS OVERCOMING PRIVACY CHALLENGES OF THE MOBILE INTERNET The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and many other international and regional treaties recognize privacy as a fundamental human right. Privacy A WORLD OF INFORMATION underpins key values such as freedom of expression, freedom of association, and freedom of speech, IN YOUR MOBILE PHONE and it is one of the most important, nuanced and complex fundamental rights of contemporary age. For those of us who care deeply about privacy, safety and security, not only for ourselves but also for our development partners and their missions, we need to think of mobile phones as primary computers As mobile phones have transformed from clunky handheld calling devices to nifty touch-screen rather than just calling devices. We need to keep in mind that, as the storage, functionality, and smartphones loaded with apps and supported by cloud access, the networks these phones rely on capability of mobiles increase, so do the risks to users. have become ubiquitous, ferrying vast amounts of data across invisible spectrums and reaching the Can we address these hidden costs to our digital connections? Fortunately, yes! We recommend: most remote corners of the world. • Adopting device, data, network and application safety measures From a technical point-of-view, today’s phones are actually more like compact mobile computers. They are packed with digital intelligence and capable of processing many of the tasks previously confined
    [Show full text]
  • Designed for Versatility
    ATIV Book 9 Spin SPEC SHEET DESIGNED FOR VERSATILITY. With its revolutionary 360º rotating display for multiple computing modes, slim and modern design for ultimate portability, and aluminum body for superior durability and style, the new Samsung ATIV Book 9 Spin is the smart choice for those who demand versatility. KEY FEATURES 360º Rotating Hinge Quickly and easily convert the ATIV Book 9 Spin from powerful laptop to portable tablet for ease of use on the go or tent mode for collaborating with others. All thanks to its 360º rotating dual-hinge display. Ultra-Detailed QHD+ Touch Screen QHD+ The stunning QHD+ high resolution touch screen allows you to view and display ultra-detailed graphics with an enhanced color gamut, while its anti-glare coating performs both indoors and out. Thin, Mobile Design At 0.58 inches thin and just 2.97 pounds, you can take the ATIV Book 9 Spin with you wherever your lifestyle demands — on the road, in the air, and virtually anywhere you go. Designed With Style In Mind A full aluminum body, slender design and die-cut edges deliver the premium style you demand and deserve out of a premium notebook. Tested For Reliability Each Samsung ATIV notebook goes through a series of rigorous reliability tests — including drop, tension and shock tests — to ensure they always perform at the highest level. Seamless File Sharing Samsung Link 2.0 allows you to share fi les between your ATIV Book 9 Pro, Galaxy smartphone and Smart TV with ease. Or mirror your smartphone on your ATIV Book 9 Pro wirelessly with Samsung SideSync.
    [Show full text]
  • Mind the Gap: Dissecting the Android Patch Gap | Ben Schlabs
    Mind the Gap – Dissecting the Android patch gap Ben Schlabs <[email protected]> SRLabs Template v12 Corporate Design 2016 Allow us to take you on two intertwined journeys This talk in a nutshell § Wanted to understand how fully-maintained Android phones can be exploited Research § Found surprisingly large patch gaps for many Android vendors journey – some of these are already being closed § Also found Android exploitation to be unexpectedly difficult § Wanted to check thousands of firmwares for the presence of Das Logo Horizontal hundreds of patches — Pos / Neg Engineering § Developed and scaled a rather unique analysis method journey § Created an app for your own analysis 2 3 Android patching is a known-hard problem Patching challenges Patch ecosystems § Computer OS vendors regularly issue patches OS vendor § Users “only” have to confirm the installation of § Microsoft OS patches Patching is hard these patches § Apple Endpoints & severs to start with § Still, enterprises consider regular patching § Linux distro among the most effortful security tasks § “The moBile ecosystem’s diversity […] OS Chipset Phone Android contriButes to security update complexity and vendor vendor vendor phones inconsistency.” – FTC report, March 2018 [1] The nature of Telco § Das Logo HorizontalAndroid makes Patches are handed down a long chain of — Pos / Negpatching so typically four parties Before reaching the user much more § Only some devices get patched (2016: 17% [2]). difficult We focus our research on these “fully patched” phones Our research question –
    [Show full text]
  • The Ultimate Ultra-Portables for Business a Big Experience in a Small Form Factor
    Samsung ATIV Book 9 / Book 9 Plus Samsung recommends Windows 8. The ultimate ultra-portables for business A big experience in a small form factor Introducing the ultrabook that’s redefining the business experience. The ultra-portable ATIV Book 9/Book 9 Plus is ready for anything, anywhere, anytime. The 13.3" ATIV Book 9 model is just 2.36 lbs. and just .53" thin, while the 13.3" ATIV Book 9 Plus model is just 3.06 lbs. and just .54" thin. The slim form factors feature 3200 x 1800 Full HD resolution screens for sharp, brilliant images, and 8GB of RAM delivers high levels of performance. Sleek, slim and spectacular. It’s the way business should be. Key features Premium Design and Durability Designed for mobility and durability, the ATIV Book 9/Book 9 Plus features a slim, lightweight magnesium casing as strong as it is sleek. Full HD SuperBright™ Display The LED-backlit 3200 x 1800 Full HD LCD display produces sharp, high-resolution video. And Samsung SuperBright™ technology provides vivid colors. Next Generation Processing Power With Intel® 5th Generation Core™ i5 and i7 processors, the ATIV Book 9/Book 9 Plus speeds its way through the workday. Start Fast The Samsung ATIV Book 9/Book 9 Plus is equipped with a solid state drive to provide stability and fast boot up. Contact us 1-866-SAM4BIZ samsung.com/business samsung.com/b2blaptops Follow us youtube.com/samsungbizusa @SamsungBizUSA Samsung recommends Windows 8. Samsung ATIV Book 9 / Book 9 Plus NP900X3K-S01US NP900X3K-S02US NP940X3K-S01US NP940X3K-S02US NP940X3K-K02US ATIV Book 9 ATIV
    [Show full text]
  • Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries
    Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries Ruian Duan:, Ashish Bijlani:, Yang Ji:, Omar Alrawi:, Yiyuan Xiong˚, Moses Ike:, Brendan Saltaformaggio,: and Wenke Lee: fruian, ashish.bijlani, yang.ji, alrawi, [email protected], [email protected] [email protected], [email protected] : Georgia Institute of Technology, ˚ Peking University Abstract—Mobile application developers rely heavily on open- while ensuring backward compatibility, and test for unin- source software (OSS) to offload common functionalities such tended side-effects. For the Android platform, Google has as the implementation of protocols and media format playback. initiated the App Security Improvement Program (ASIP) [21] Over the past years, several vulnerabilities have been found in to notify developers of vulnerable third-party libraries in popular open-source libraries like OpenSSL and FFmpeg. Mobile use. Unfortunately, many developers, as OSSPolice [15] and applications that include such libraries inherit these flaws, which LibScout [4] show, do not update or patch their application, make them vulnerable. Fortunately, the open-source community is responsive and patches are made available within days. However, which leaves end-users exposed. Android developers mainly mobile application developers are often left unaware of these use Java and C/C++ [1] libraries. While Derr et al. [14] flaws. The App Security Improvement Program (ASIP) isa show that vulnerable Java libraries can be fixed by library- commendable effort by Google to notify application developers level update, their C/C++ counterparts, which contain many of these flaws, but recent work has shown that many developers more documented security bugs in the National Vulnerability do not act on this information.
    [Show full text]
  • Supporting Non-Functional Requirements Elicitation with Templates
    Pozna´nUniversity of Technology Institute of Computing Science SUPPORTING NON-FUNCTIONAL REQUIREMENTS ELICITATION WITH TEMPLATES Sylwia Kopczy´nska A dissertation submitted to the Council of the Faculty of Computing in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Supervisor Jerzy Nawrocki, PhD, Dr Habil. Auxiliary supervisor Mirosław Ochodek, PhD Pozna´n,Poland 2018 ABSTRACT Non-functional requirements (NFRs) state conditions under which functionality is useful (they concern perfor- mance, security, availability, etc.). Unfortunately, they are frequently neglected, especially those NFRs that are difficult to write or seem ostensibly obvious. Such behavior is an important risk factor in software projects as, in many cases, improper management of NFRs is one of the root causes of project failures. One of the approaches to support elicitation of NFRs is using a catalog of templates. Templates are natural lan- guage statements with some parameters (gaps) to fill in and optional parts to select during elicitation. Many authors say that templates improve consistency and testability of requirements, and that they reduce am- biguity. Although experts formulate these claims, some recent studies show that practitioners are afraid of using NFR templates in their projects. It is not clear for them what are the benefits and costs of using NFR templates. In the traditional approaches to software development, the necessity to elicit NFRs seemed rather obvious. Re- cently, agile approaches have gained popularity but it would be vain to look for agile practices that explicitly refer to NFRs. Therefore, a question arises whether NFRs are still important. Another issue is user feedback left in online app stores.
    [Show full text]
  • Electronic 3D Models Catalogue (On July 26, 2019)
    Electronic 3D models Catalogue (on July 26, 2019) Acer 001 Acer Iconia Tab A510 002 Acer Liquid Z5 003 Acer Liquid S2 Red 004 Acer Liquid S2 Black 005 Acer Iconia Tab A3 White 006 Acer Iconia Tab A1-810 White 007 Acer Iconia W4 008 Acer Liquid E3 Black 009 Acer Liquid E3 Silver 010 Acer Iconia B1-720 Iron Gray 011 Acer Iconia B1-720 Red 012 Acer Iconia B1-720 White 013 Acer Liquid Z3 Rock Black 014 Acer Liquid Z3 Classic White 015 Acer Iconia One 7 B1-730 Black 016 Acer Iconia One 7 B1-730 Red 017 Acer Iconia One 7 B1-730 Yellow 018 Acer Iconia One 7 B1-730 Green 019 Acer Iconia One 7 B1-730 Pink 020 Acer Iconia One 7 B1-730 Orange 021 Acer Iconia One 7 B1-730 Purple 022 Acer Iconia One 7 B1-730 White 023 Acer Iconia One 7 B1-730 Blue 024 Acer Iconia One 7 B1-730 Cyan 025 Acer Aspire Switch 10 026 Acer Iconia Tab A1-810 Red 027 Acer Iconia Tab A1-810 Black 028 Acer Iconia A1-830 White 029 Acer Liquid Z4 White 030 Acer Liquid Z4 Black 031 Acer Liquid Z200 Essential White 032 Acer Liquid Z200 Titanium Black 033 Acer Liquid Z200 Fragrant Pink 034 Acer Liquid Z200 Sky Blue 035 Acer Liquid Z200 Sunshine Yellow 036 Acer Liquid Jade Black 037 Acer Liquid Jade Green 038 Acer Liquid Jade White 039 Acer Liquid Z500 Sandy Silver 040 Acer Liquid Z500 Aquamarine Green 041 Acer Liquid Z500 Titanium Black 042 Acer Iconia Tab 7 (A1-713) 043 Acer Iconia Tab 7 (A1-713HD) 044 Acer Liquid E700 Burgundy Red 045 Acer Liquid E700 Titan Black 046 Acer Iconia Tab 8 047 Acer Liquid X1 Graphite Black 048 Acer Liquid X1 Wine Red 049 Acer Iconia Tab 8 W 050 Acer
    [Show full text]
  • SAMSUNG Notebook/Slate MSRP Price List - EFFECTIVE July/August 2014
    SAMSUNG Notebook/Slate MSRP Price List - EFFECTIVE July/August 2014 Shipping Mfg Part Number PRODUCT DESCRIPTION Change MSRP Warranty Weight Energy Star EPEAT UL Certified UPC Code (lbs.) Series 9 Notebook: NP900X3C-A02US Series 9 13.3" Notebook - Screen Size: 13.3 LED HD+ Antiglare; Resolution: 16:9; Aspect Ratio: 1600 x 900; $1,399.99 365 6.77 5.2 Gold Yes 036725736498 Brightness: 400 nits SuperBright Plus Technology; Processor: Intel Core i5-3317U Processor, 1.7 GHz, turbo up to 2.6 GHz; Hard Drive: 128GB SSD; Memory: 4GB DDR3 (1600 MHz); I/O Ports: 1 x USB 3.0 & 1 x USB 2.0, Micro HDMI, 4- in-1 (SD/SDHC/SDXC/MMC); Graphics: Intel HD Graphics 4000; Connectivity: IntelCentrino Advanced-N 6235 802.11 a/b/g/n, Ethernet Gigabit LAN, Bluetooth v4.0 High Speed, WiDi; Battery: 4 Cell / Li-Po; Operating System: Genuine Windows 7 Professional Image- 64 Bit; Security: BIOS/HDD Password, TPM; Other: 1.3 Mega Pixel HD Webcam; Batter LIfe: Up to 9 hours; Color: Mineral Ash Black; Warranty: 1 Year Standard Parts and Labor NP900X3C-A04US Series 9 13.3" Notebook - Screen Size: 13.3 LED HD+ Antiglare; Resolution: 16:9; Aspect Ratio: 1600 x 900; $1,399.99 365 6.77 5.2 Gold Yes 036725737297 Brightness: 400 nits SuperBright Plus Technology; Processor: Intel Core i5-3317U Processor, 1.7 GHz, turbo up to 2.6 GHz; Hard Drive: 256GB SSD; Memory: 4GB DDR3 (1600 MHz); I/O Ports: 1 x USB 3.0 & 1 x USB 2.0, Micro HDMI, 4- in-1 (SD/SDHC/SDXC/MMC); Graphics: Intel HD Graphics 4000; Connectivity: IntelCentrino Advanced-N 6235 802.11 a/b/g/n, Ethernet Gigabit LAN,
    [Show full text]
  • VULNERABLE by DESIGN: MITIGATING DESIGN FLAWS in HARDWARE and SOFTWARE Konoth, R.K
    VU Research Portal VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE Konoth, R.K. 2020 document version Publisher's PDF, also known as Version of record Link to publication in VU Research Portal citation for published version (APA) Konoth, R. K. (2020). VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. E-mail address: [email protected] Download date: 07. Oct. 2021 VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE PH.D. THESIS RADHESH KRISHNAN KONOTH VRIJE UNIVERSITEIT AMSTERDAM, 2020 Faculty of Science The research reported in this dissertation was conducted at the Faculty of Science — at the Department of Computer Science — of the Vrije Universiteit Amsterdam This work was supported by the MALPAY consortium, consisting of the Dutch national police, ING, ABN AMRO, Rabobank, Fox-IT, and TNO.
    [Show full text]
  • Your Guide to the Rbselect Home Computer Benefit
    Your guide to the RBSelect Home Computer Benefit Get the latest technology – direct from RBSelect No deposits or upfront payments • Get a brand new computer from just £10.66 (including VAT) per month! • Convenient, fixed RBSelect charge over 36 months • Windows 8 laptop or desktop computers from HP and Samsung • iPad, iPad mini and Apple Macs including MacBook Air and MacBook Pro Let’s Connect are • Tax efficient home computing for you administering this benefit on behalf of RBS. Windows iPad and iPad mini Apple MacBooks laptops and desktops To order logon to www.rbspeople.com/yourrewardonline Elect by 11th September 2013 Once you login, click on the 'Home Computer' benefit to complete your order. If you need advice on the ordering process or on choosing a computer, call the Home Computer helpline on 08444 821 860ˆ. ˆCall costs 5p per minute from fixed lines. Different rates may apply from mobile phones. What’s in this guide? Contents How to order and key scheme dates ______________________________ P3 What’s included with each package? _____________________________ P4 Package Summary ____________________________________________ P5 Tablet packages – iPad, iPad mini and Samsung ATIV Tab 3 options ___________________ P6 Laptop and desktop PC packages – Microsoft Windows 8 options __________________________________ P23 Apple Mac packages – MacBook Air and MacBook Pro options ___________________________ P29 Scheme accessories – Software, wireless printer, laptop carry cases, speakers, storage devices, tablet stand and Apple Mac accessories ____ P33 How the scheme works _______________________________________ P39 Frequently asked questions ____________________________________ P43 2 Place your order online at www.rbspeople.com/yourrewardonline by 11th September 2013 How to order and key scheme dates Or, what do I need to do and when do I need to do it by..
    [Show full text]