Stormshield Network Firewall for Your Network

Total Page:16

File Type:pdf, Size:1020Kb

Stormshield Network Firewall for Your Network GUIDE STORMSHIELD NETWORK SECURITY USER CONFIGURATION MANUAL Version 4 Date: December 18, 2019 Reference: sns-en-user_configuration_manual-v4.0.1 SNS - USER CONFIGURATION MANUAL - V 4 IP addresses and host objects 27 Table of contents URLs 28 Ports 29 WELCOME 11 Network packets 29 Recommendations on the operating Alarms view 30 environment 11 System events view 30 Introduction 11 Logs 30 Security watch 12 ADMINISTRATORS 33 Physical security measures 12 Organizational security measures 12 “Administrators” tab 33 Human media 13 Interactive features 33 IT security environment 13 Possible operations 33 User awareness 15 Table of privileges 34 Administrator management 15 “Administrator account” tab 37 User password management 16 Authentication 37 Work environment 17 Exports 37 User access management 17 “Ticket management” tab 38 The table 38 ACCESS PRIVILEGES 18 Possible operations 38 “Default options” tab 18 ANTISPAM 39 SSL VPN Portal 18 IPSEC 18 “General” tab 39 SSL VPN 18 SMTP parameters 39 Sponsorship 19 Advanced properties 40 “Detailed access” tab 19 “Whitelisted domains” tab 41 Possible operations 19 Interactive features 42 Interactive features 19 “Blacklisted domains” tab 42 Configuration table 19 Interactive features 42 “PPTP” tab 21 ANTIVIRUS 43 Interactive features 21 Antivirus engine 43 ACTIVE UPDATE 22 Settings 43 Automatic updates 22 Analysis of ClamAV files 43 Advanced properties 22 Analysis of Kaspersky files 43 Update servers of the URL database 22 Sandboxing 44 Update servers of customized context- based protection signatures 22 APPLICATIONS AND PROTECTIONS 45 Update servers 22 View by inspection profile 45 Selecting the configuration profile 45 LOGS - AUDIT LOGS 23 The various columns 47 Private data 23 View by context 48 Collaborative security 23 Storage device: SD Card 23 AUTHENTICATION 50 Actions 24 “Available methods” tab 50 Toolbar no. 1: period 24 Interactive features 50 Toolbar no. 2: simple or advanced Authentication methods 51 search 24 “Authentication policy” tab 57 Toolbar no. 3: actions 25 Actions on the rules of the authentication Information 26 policy 58 Displaying details of a row of logs 26 Interactive features 59 Interactive features 26 New rule 59 Simple search mode 26 "Captive portal" tab 60 Advanced search mode 26 Page 2/439 sns-en-user_configuration_manual-v4.0.1 - 12/18/2019 SNS - USER CONFIGURATION MANUAL - V 4 Captive portal 61 Defining a default authority or sub- SSL server 61 authority 83 Conditions of use for Internet access 61 Downloading a certificate 83 Advanced properties 62 Downloading an identity 84 "Captive portal profiles" tab 62 Downloading a CRL 84 Possible actions 62 Authentication 63 CLI CONSOLE 85 Conditions of use for Internet access 63 List of commands 85 Authentication periods allowed 63 Data entry zone 86 Advanced properties 63 Transparent or explicit HTTP proxy CONFIGURATION 87 and multi-user objects 65 “General configuration” tab 87 Multi-user objects 65 General configuration 87 Transparent proxy (implicit) 66 Cryptographic settings 87 Explicit proxy 66 Password policy 88 BLOCK MESSAGES 68 Date/Time settings 89 Advanced properties 89 Antivirus tab 68 Industrial firewalls only (SNi40 models) 90 POP3 protocol 68 “Firewall administration” tab 91 SMTP protocol 68 Access to the firewall’s administration FTP protocol 68 interface 91 “HTTP block page” tab 68 Access to firewall administration pages 92 Block page tabs 69 Disclaimer for access to the administration Editing block pages 69 interface 92 Remote SSH access 92 CERTIFICATES AND PKI 71 “Network settings” tab 93 Possible operations 71 IPv6 support 93 Search bar 71 Proxy server 93 Filter 72 DNS resolution 93 Add 72 Revoke 72 CONFIGURATION OF MONITORING 94 Actions 72 Interval between refreshments 94 Download 73 Configuration of interfaces and QoS queues Check usage 73 to be monitored 94 Adding authorities and identities 73 "Interface configuration" tab 94 Adding a root authority 73 "QoS configuration" tab 94 Adding a sub-authority 75 Adding a user identity 76 DASHBOARD 96 Adding a smart card identity 78 The module configuration menu 96 Adding a server identity 79 Favorite modules 96 Importing a file 80 Configuration 96 Revoking an authority, sub-authority The dynamic area: widgets 97 or certificate 81 Network 97 Revoking an authority 81 Protections 98 Revoking a sub-authority or certificate 81 Properties 98 Revoking a certificate 81 Health indicators 99 Creating, renewing or removing a CRL 82 Services 100 Creating a CRL 82 Pay As You Go 100 Renewing a CRL 82 Removing a CRL 83 DHCP 101 Removing the private key of an General 101 identity (while keeping the certificate)83 “DHCP server” service 101 Page 3/439 sns-en-user_configuration_manual-v4.0.1 - 12/18/2019 SNS - USER CONFIGURATION MANUAL - V 4 Default settings 101 Intrusion prevention alarms 124 Address range 101 System events 124 Reservation 102 “Recipients” tab 125 Advanced properties 103 Creating a group 125 “DHCP relay” service 104 Deleting a group 125 Settings 104 Check use 126 Listening interfaces on the DHCP “Templates” tab 126 relay service 104 Editing the template (HTML) 126 Vulnerability manager 126 DIRECTORIES CONFIGURATION 106 Certificate request 127 Main window 106 User enrollment 127 "Add a directory" button 106 List of variables 127 "Action" list 106 Example of a report received by e-mail Creating an internal LDAP 106 regarding alarms 127 Step 1: Selecting the directory 107 Step 2: Accessing the directory 107 ENROLMENT 128 Internal LDAP directory screen 107 The enrolment table 128 Connecting to an external LDAP Possible operations 128 directory 108 User enrolment and certificate requests 128 Step 1: Selecting the directory 108 Advanced properties 129 Step 2: Accessing the directory 108 External LDAP directory screen 109 FILTERING AND NAT 130 Connecting to a PosixAccount Evaluation of filtering and the impact of external LDAP directory 112 NAT 130 Step 1: Selecting the directory 112 “FastPath” mode 130 Step 2: Accessing the directory 112 Policies 130 External LDAP directory screen 113 Selecting the filter policy 131 Connecting to a Microsoft Active Possible operations 132 Directory 115 Selecting multiple objects 132 Step 1: Selecting the directory 115 Drag & drop 132 Step 2: Accessing the directory 115 “Filtering” tab 132 Microsoft Active Directory screen 116 Actions on filter policy rules 133 Interactive features 135 DNS CACHE PROXY 119 Filter table 136 Enable DNS cache 119 “NAT" tab 148 List of clients allowed to used the Actions on NAT policy rules 149 DNS cache 119 Interactive features 151 Advanced properties 119 NAT table 152 DYNAMIC DNS 121 HIGH AVAILABILITY 157 List of dynamic DNS profiles 121 Step 1: Creating or joining a high Configuring a profile 121 availability cluster 157 DNS resolution 121 Step 2: Configuring network interfaces 158 Dynamic DNS service provider 121 If you have chosen to create a cluster 158 Advanced properties 122 If you have chosen to join a cluster 158 Step 3: Cluster’s pre-shared key and data E-MAIL ALERTS 123 encryption 159 “Configuration” tab 123 If a cluster is being created 159 Enable e-mail notifications 123 If a cluster exists 160 SMTP server 123 Step 4: Summary and finalizing the E-mail sending frequency (in cluster 160 minutes) 124 If a cluster is being created 160 Page 4/439 sns-en-user_configuration_manual-v4.0.1 - 12/18/2019 SNS - USER CONFIGURATION MANUAL - V 4 If a cluster exists 160 Conclusion 192 High availability screen 161 Layout of the configuration screen 192 Communication between firewalls in Interface tree 192 the high availability cluster 161 Toolbar 194 Advanced properties 161 Creating a bridge 195 Creating a bridge without members 195 HOST REPUTATION 163 Creating a bridge containing selected “Configuration” tab 163 interfaces 195 General 163 Modifying a bridge 195 "Hosts" tab 164 “General configuration” tab 195 Included list 164 “Advanced properties” tab 196 Advanced properties 164 Deleting a bridge 197 Modifying an Ethernet interface (in bridge IDENTIFICATION PORTAL 165 mode) 198 Connection 165 “General configuration” tab 198 Presentation 165 “Advanced properties” tab 199 Logging off 167 Modifying an Ethernet interface (in advanced mode) 200 IMPLICIT RULES 168 Creating or modifying a Wi-Fi interface Implicit filter rules 168 (WLAN) 200 Rule table 168 “General configuration” tab 201 Advanced properties 169 Creating a VLAN 202 INSPECTION PROFILES 170 Creating a VLAN without a parent interface 202 Creating a VLAN attached to selected Security inspection 170 interfaces 202 Global configuration for each profile 170 Modifying a VLAN 202 Configuring profiles 171 “General configuration” tab 202 IPSEC VPN 172 “Advanced properties” tab 203 Deleting a VLAN 204 “Encryption policy – Tunnels” tab 172 Creating a PPTP modem 205 Site to site (Gateway-Gateway) 173 Modifying a PPTP modem 205 Anonymous – Mobile users 176 “General configuration” tab 205 “Peers” tab 179 “Advanced properties” tab 206 List of peers 179 Creating a PPPoE modem 206 Peer information 180 Modifying a PPPoE modem 206 “Identification” tab 185 “General configuration” tab 206 Approved certificate authorities 185 “Advanced properties” tab 207 Mobile tunnels: pre-shared keys 186 Deleting a modem 207 Advanced configuration 186 “Encryption profiles” tab 187 General remarks on configuring modems 207 Default encryption profiles 187 Creating a USB/Ethernet interface (for USB Table of profiles 187 sticks /modems) 207 Creating a modem profile 207 INTERFACES 191 Creating a USB/Ethernet interface 208 Operating modes between interfaces191 Modifying a USB/Ethernet
Recommended publications
  • Internet Infrastructure Review Vol.34
    Internet Infrastructure Review Mar.2017 Vol. 34 Infrastructure Security Ursnif (Gozi) Anti-Analysis Techniques and Methods for Bypassing Them Technology Trends The Current State of Library OSes Internet Infrastructure Review March 2017 Vol.34 Executive Summary ............................................................................................................................ 3 1. Infrastructure Security .................................................................................................................. 4 1.1 Introduction ..................................................................................................................................... 4 1.2 Incident Summary ........................................................................................................................... 4 1.3 Incident Survey ...............................................................................................................................11 1.3.1 DDoS Attacks ...................................................................................................................................11 1.3.2 Malware Activities ......................................................................................................................... 13 1.3.3 SQL Injection Attacks ..................................................................................................................... 17 1.3.4 Website Alterations .......................................................................................................................
    [Show full text]
  • Defending Against Black Nurse Dos Attacks
    White Paper Defending Against Black Nurse DoS Attacks Juniper Networks vSRX Virtual Firewall vs. the Competition 1 Defending Against Black Nurse DoS Attacks White Paper Table of Contents Executive Summary ....................................................................................................................................................................................................... 3 Introduction ........................................................................................................................................................................................................................ 3 Three Multivector Attack DoS Methods.................................................................................................................................................................. 3 High-Volume-Based Network ICMP Attack ........................................................................................................................................................... 3 A New Low-Bandwidth ICMP Attack: Black Nurse .............................................................................................................................................4 How a Black Nurse Attack Works ..............................................................................................................................................................................4 Protection in the Architecture .....................................................................................................................................................................................4
    [Show full text]
  • Defending Against Black Nurse Dos Attacks
    White Paper Defending Against Black Nurse DoS Attacks Juniper Networks vSRX Virtual Firewall vs. the Competition 1 Defending Against Black Nurse DoS Attacks White Paper Table of Contents Executive Summary ....................................................................................................................................................................................................... 3 Introduction ........................................................................................................................................................................................................................ 3 Three Multivector Attack DoS Methods.................................................................................................................................................................. 3 High-Volume-Based Network ICMP Attack ........................................................................................................................................................... 3 A New Low-Bandwidth ICMP Attack: Black Nurse .............................................................................................................................................4 How a Black Nurse Attack Works ..............................................................................................................................................................................4 Protection in the Architecture .....................................................................................................................................................................................4
    [Show full text]
  • Zvýšení Zabezpeˇcení Služeb Sítˇe Liane
    Zvýšení zabezpeceníˇ služeb síteˇ Liane Diplomová práce Studijní program: N2612 – Elektrotechnika a informatika Studijní obor: 1802T007 – Informacníˇ technologie Autor práce: Bc. Vojtechˇ Šindler Vedoucí práce: Ing. Mojmír Volf Liberec 2017 Improvement security Liane’s network Diploma thesis Study programme: N2612 – Electrotechnology and informatics Study branch: 1802T007 – Information technology Author: Bc. Vojtechˇ Šindler Supervisor: Ing. Mojmír Volf Liberec 2017 P1'<>h1zi§e11i sez112in1e11s‘aim,Zemamou Se vzta— Byljsem diplomovoupr-éciplné— zékon5. 3b.,0 autorském,zejména60 ékolm’hujed?o.121/2000pralvu § Berunavédomi,ieTechnickéuniverzitav Liberci(TUL)nezasahu— jedomychautorskychprévuiitfmmédiplomovépraiseprovnitfni potfebuTUL. Uiiji—1idiplomovouprzicineboposkytnu—1ilicencikjejimuVyuEi— ti,jsemsivédompovinnostiinformovat0 tétoskuteénostiTUL; v tomtopfipadéméTULprévoodemnepoiadovat?hradunék1a— d?,kte1'évy11a1o%i1ana vytvofenid?a,aidojejichskuteénéVy"§e. Diplomovouprécijsemvypracovalsamostatnés pouiitimuvedené literaxurya na zzikladékonzultacis vedoucimmédiplomovépréce a konzultantem. Souéasnééestnéprohlaéuji.5.9tiéténziverzeprziceseshodujes e1ek— tronickouVerzi,vloienoudoISSTAG. ‘ Datum.. )_F ? % Popis:///rd////4/ Abstrakt Tato práce rešíˇ problematiku IT bezpecnostiˇ a jejího zvýšení v kontextu síteˇ LIANE. Tento problém byl rešenˇ za použití penetracníchˇ test˚utypu grey box. Na vybraných segmentech síteˇ došlo k provedení penetracníchˇ test˚u.Jejich výsledkem byl seznam nalezených zranitelností, dopad˚u a návrh˚u vedoucích k jejich
    [Show full text]
  • Cyber Warnings E-Magazine – June 2017 Edition Copyright © Cyber Defense Magazine, All Rights Reserved Worldwide ;
    ; 1 Cyber Warnings E-Magazine – June 2017 Edition Copyright © Cyber Defense Magazine, All rights reserved worldwide CONTENTS CYBER WARNINGS Published monthly by Cyber Defense Magazine and distributed electronically via opt-in Email, HTML, PDF and From the Editor’s Desk .................................................... 4 Online Flipbook formats. Not Ocean’s 14 ............................................................... 5 PRESIDENT An Alan Turing-Inspired Solution to the Cybersecurity Stevin Miliefsky [email protected] Labor Shortage ............................................................... 8 EDITOR WHY BIOMETRICS IS A SECURITY ESSENTIAL…AND SO IS DISABLING IT ASAP .......................................... 12 Pierluigi Paganini, CEH [email protected] 5 Keys to Protecting your Company’s Online Finances 16 ADVERTISING Don’t be an Easy Target ............................................... 18 Jessica Quinn [email protected] The CIO discuss information security leadership .......... 22 KEY WRITERS AND CONTRIBUTORS WannaCry/Ransomware? Secure your Enterprise Using Charles Parker, II Blockchain-Enabled Cybersecurity................................ 24 Xuyen Bowles Doug Ramos Dixie Somers The challenges of interference within modern industrial Michael Ryan systems ......................................................................... 26 Myles Suer Narayan Neelakantan Milica D. Djekic Hacking: Cheaper than a Nando's chicken. .................. 30 Jonathan Stock Lee David Painter
    [Show full text]
  • What Organizations Don't Know About Ddos Attacks Can Hurt Them
    What Organizations Don’t Know About DDoS Attacks Can Hurt Them. The threat is real, so is the solution. DDoS (distributed denial of service) attacks are real and the threat is escalating in volume and complexity. In fact, newsworthy attacks like the following are occurring almost every week: At least five major Russian banks came under continuous DDoS attack for two days. The attack was spawned by a wide-scale botnet involving at least 24,000 computers, located in 30 countries. Major internet services including Twitter, Spotify and Amazon suffered service interruptions and outages simultaneously over several hours due to a DDoS attack. The computer systems of two prominent Boston hospitals were simultaneously crippled by a DDoS attack. The hacker wanted to take revenge on one of the hospitals for personal reasons.1 Chad Foos, IT Security Engineer for Verizon Platinum Master Agent SOVA, said, “No one is immune to this. That’s the reality of putting your business online today. They are becoming more and more common. If Twitter is vulnerable, anybody is vulnerable.” In a DDoS attack, the perpetrator infects a random army of as many as 100s of 1,000s of poorly protected computers with malware designed to target a specific network(s). This makes it impossible to prevent or stop the attack by blocking a single IP address. It is also nearly impossible to distinguish legitimate traffic from DDoS traffic. This incoming traffic overwhelms the network and either shuts it down or severely compromises it. Foos likens the attack to a few shoppers in a sea of shoplifters all trying to squeeze in a single revolving door.
    [Show full text]
  • Unraveling the Tangle of Old and New Threats
    Caught in the Net: Unraveling the Tangle of Old and New Threats 2018 Annual Security Roundup Contents TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information 04 and educational purposes only. It is not intended and should not be construed to constitute legal advice. The Messaging threats increase, information contained herein may not be applicable to all situations and may not reflect the most current situation. in various forms Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing 10 herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document Ransomware remains compelling at any time without prior notice. despite decline in attacks Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to 17 the original language official version of the document. Any discrepancies or differences created in the translation are Critical vulnerabilities in hardware and not binding and have no legal effect for compliance or enforcement purposes. the cloud are found, number of ICS bugs Although Trend Micro uses reasonable efforts to include continue rising accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree 23 that access to and use of and reliance on this document and the content thereof is at your own risk.
    [Show full text]
  • Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
    1 Moving-target Defense against Botnet Reconnaissance and an Adversarial Coupon-Collection Model Daniel Fleck1, George Kesidis2, Takis Konstantopoulos3, Neda Nasiriani2, Yuquan Shan2, and Angelos Stavrou1 1. CS Dept, GMU 2. School of EECS, PSU 3. Dept. of Math, Univ. Liverpool fdfleck,[email protected] fgik2,nun129,[email protected] [email protected] Abstract We consider a cloud based multiserver system consisting of a set of replica application servers behind a set of proxy (indirection) servers which interact directly with clients over the Internet. We study a proactive moving-target defense to thwart a DDoS attacker’s reconnaissance phase and consequently reduce the attack’s impact. The defense is effectively a moving-target (motag) technique in which the proxies dynamically change. The system is evaluated using an AWS prototype of HTTP redirection and by numerical evaluations of an “adversarial” coupon-collector mathematical model, the latter allowing larger-scale extrapolations. I. INTRODUCTION Two very significant, high-volume botnet based DDoS attacks were witnessed in Fall 2016 [7], [9]. The Dyn attack was launched by IoT-device bots (compromised using factory default credentials) against Oracle DNS service. Since 2016, other significant attacks have involved, e.g., the Mirai, Hajime and BrickerBot botnets, which largely consist of IoT devices (compromised typically via known exploits)1. Indeed, many (not just legacy) IoT devices cannot be secured. Thus, infrastructure based defenses need to be mobilized against such DDoS attacks. Such arXiv:1712.01102v3 [cs.CR] 26 Apr 2018 defenses can be situated at the attacker-side network edge (e.g., egress filtering, intrusion detection), within the network (e.g., Akamai Prolexic), or on the premises of the targeted victim (enterprise based defenses, e.g., reactive dispersive autoscaling, challenge-response, and anomaly detection).
    [Show full text]
  • The 2017 Security Threat Landscape
    EXECUTIVE SERIES The 2017 Security Threat Landscape 2017 was rife with global ransomware attacks, large-scale vulnerability threats, debilitating BEC scams, the rise of cryptocurrency risks, ever-evolving IoT threats, and a continued stream of data breaches. How did businesses fare in their midst? And what should companies do to manage their enterprise risk in 2018? The Paradox of Cyberthreats in 2017 greater in 2018. We’ve seen Dirty COW, for instance, cause grief among 5,000 users in more than 40 countries prior to its discovery Though the ransomware volume did plateau in 2017 as we in 2017.4 With the help of external researchers via our Zero Day expected, the threat continued to wreak havoc on a massive scale Initiative (ZDI), we discovered and disclosed a record number of 1 worldwide. 1,008 new vulnerabilities in 2017, only a small percentage of these were and will continue to be weaponized in exploit attacks. The 327 1,078,091,703 time from disclosure to exploitation has decreased dramatically though, significantly impacting the landscape. 247 200 631,128,278 Adobe 150 Foxit 100 Microsoft Google 2016 2017 2016 2017 50 Apple Figure 1. More ransomware families emerged in 2017 but fewer major players despite the said rise 0 Ransomware attacks impacting business operations continued to 2016 2017 increase in 2017. Ransomware attacks from WannaCry to Petya Figure 2. A variation in vulnerability count direction was seen resulted in production line downtime at Honda, Nissan, Renault, Increases in both the overall number of zero-day vulnerabilities and even Cadbury. The likelihood and impact of these attacks (disclosed without a patch available) and that specifically affect increased 10 times with the convergence of capable ransomware supervisory control and data acquisition (SCADA) systems were and the wormlike capabilities of the EternalBlue exploit.
    [Show full text]
  • 2017 Annual Security Roundup: the Paradox of Cyberthreats
    2017 Annual Security Roundup: The Paradox of Cyberthreats TrendLabsSM 2017 Annual Security Roundup Contents TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It 5 is not intended and should not be construed to constitute legal advice. The information contained Ransomware brings about bigger herein may not be applicable to all situations and may not reflect the most current situation. Nothing global outbreaks despite fewer contained herein should be relied on or acted major players upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify 10 the contents of this document at any time without prior notice. Adaptable threats exploit known vulnerabilities in new ways Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of 13 a translation, please refer to the original language official version of the document. Any discrepancies Amid growing awareness of the or differences created in the translation are not threat, BEC scams are still on the binding and have no legal effect for compliance or enforcement purposes. rise Although Trend Micro uses reasonable efforts to include accurate and up-to-date information 16 herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, Cryptocurrency’s meteoric ascent currency, or completeness. You agree that access to and use of and reliance on this document and inspires new mining malware and the content thereof is at your own risk.
    [Show full text]
  • Ji BAN(Qoej'\ÉX!CO
    Jl?ji BAN(QoEJ'\ÉX!CO COMITÉ DE TRANSPARENCIA ACTA DE LA SESIÓN ESPECIAL 09/2020 DEL 04 DE MARZO DE 2020 En la Ciudad de México, a las trece horas del cuatro de marzo de dos mil veinte, en el edificio ubicado en avenida Cinco de Mayo, número veinte, colonia Centro, demarcación territorial Cuauhtémoc, se reunieron María Teresa Muñoz Arámburu, Titular de la Unidad de Transparencia; Erik Mauricio Sánchez Medina, Director Jurídico; y Víctor Manuel De La Luz Puebla, Director de Seguridad y Organización de la Información, todos integrantes del Comité de Transparencia; así como Sergio Zambra no Herrera, Subgerente de Análisis Jurídico y Promoción de Transparencia, en su carácter de Secretario de este órgano colegiado. --------------------------------------------------------------------------------­ También estuvieron presentes, como invitados de este Comité, en términos de los artículos 4o. y 31, fracció n XIV, del Reglamento Interior del Banco de México (RIBM), así como la Tercera, de las Reglas de Ope ración del Comité de Transparencia del Banco de México, publicadas en el Diario Oficial de la Federación el dos de junio de dos mil dieciséis, (Reglas), las personas que se indican en la lista de asistencia que se adjunta a la presente como "ANEXO 1", quienes también son servidores pú b I icos de I Ba neo de México.-----------------------------------------------------------------------------------------­ Al estar presentes los integrantes mencionados, quien ejerce en este acto las funciones de Secretariado del Comité de Transparencia manifestó que existe quórum para la celebración de la presente sesión, de conformidad con lo previsto en los artículos 43 de la Ley General de Transparencia y Acceso a la Información Pública (LGTAIP); 64, párrafos segundo y tercero, de la Ley Federal de Transparencia y Acceso a la Información Pública (LFTAIP); 83 de la Ley General de Protección de Datos Personales en Posesión de Sujetos Obligados (LGPDPPSO); 4o.
    [Show full text]
  • Rise of the Machines: the Dyn Attack Was Just a Practice Run December 2016
    Rise of the Machines: The Dyn Attack Was Just a Practice Run December 2016 Authors James Scott, Sr. Fellow, ICIT Drew Spaniel, Research, ICIT Copyright © 2016 Institute for Critical Infrastructure Technology – All Rights Reserved Upcoming Event Learn More about the concepts discussed in this publication at the 2017 ICIT Winter Summit. Registration is Now Open – www.ICITWinterSummit.org 1 Contents Contents ........................................................................................................................................................ 1 Introduction .................................................................................................................................................. 3 A Simplification of the Internet .................................................................................................................... 4 Protocols ....................................................................................................................................................... 5 ISO OSI ..................................................................................................................................................... 5 TCP/IP ...................................................................................................................................................... 6 Anatomy of a Distributed Denial of Service Attack ................................................................................. 7 Constructing a Botnet ..........................................................................................................................
    [Show full text]