Volume 1: TAG Cyber Security Fifty Controls – Volume 1 Introduces the Fifty Primary Control Areas Required for CISO Teams to Be More Effective

Total Page:16

File Type:pdf, Size:1020Kb

Volume 1: TAG Cyber Security Fifty Controls – Volume 1 Introduces the Fifty Primary Control Areas Required for CISO Teams to Be More Effective Designer – Vision Creative Finance – M&T Bank Administration – navitend Promotion – Braithwaite Communications Research – TAG Cyber LLC Lead Author – Dr. Edward G. Amoroso TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2017 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2017 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice. Page 2 2017 TAG Cyber Security Annual September 1, 2016 To the Reader: I wrote every word of this 2017 TAG Cyber Security Annual based on my experience, opinion, and research – and I wrote it for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams. My desire was to make all three volumes of the 2017 TAG Cyber Security Annual free to practitioners, and any other persons or groups who might find the content useful. To that end, roughly fifty cyber security vendors served as sponsors, agreeing to distribute this Annual with no pre-arranged agreements about the nature of the analysis included. They kindly offered their advice, expertise, and knowledge in the development of this report – and to that end, they are referenced here as distinguished vendors. Without their assistance, this report would not exist. As with any researcher, I must admit to my biases. With the publication of this report, I am only several months removed from three decades of proud service to the customers and people of AT&T. During that time, I poured my heart and soul into the development and operation of the vast assortment of cyber security services that the company continues to market. To that end, it is impossible for me to remain unbiased in my conviction that these services are world class, and that the underlying promise of AT&T’s software defined network, led by John Donovan, to support on- demand virtualized cyber security will prove to be exactly the right technical and infrastructure approach to stopping advanced malicious actors. Furthermore, I have served proudly over the years on a variety of informal advisory boards for cyber security vendors, such as Koolspan, over the past decade. I also serve as an independent director on M&T Bank’s Board of Directors, as a Senior Advisor to the Applied Physics Lab at Johns Hopkins University, and as an Adjunct Professor in the Computer Science Departments at the Stevens Institute of Technology and New York University. While none of these affiliations should introduce any untoward bias, all inevitably have some bearing on the advisory material included here. Discussions with students and faculty at Stevens and NYU, in particular, have had considerable influence on my opinions regarding cyber security technology. You will notice that the research presented here differs significantly from the advisory work of firms such as Gartner and Forrester. Where such firms rank vendors based on in-depth feature analysis, my approach is to try to educate readers in the fundamentals. The emphasis is therefore on broad themes that are likely to remain constant, rather than detailed feature-by-feature comparisons that can change in an instant. Also, the decision to avoid rankings is made in the observation that all vendors provide some value to their customers – or they would not be in business. And the familiar process of “asking around” to see what “customers are saying” is both unscientific and misleading – not to mention fraught with the conflicts that arise when advisory firms sell consulting services to the same vendors they are ranking. One major caveat regarding this 2017 TAG Cyber Security Annual is that the reader must expect a plethora of errors and inaccuracies, especially in Volume 3, where facts about company names, product offerings, and executive positions change so quickly that it is impossible to keep up. But this should not detract from the usefulness of the report. Readers should use the volumes as an Alpha Guide to their own understanding, and should take the initiative to augment this guide with their own research, which hopefully will be shorter and easier based on the material provided here. I hope that this guide is useful to you. Expect updates – and a completely revised edition next year. Dr. Edward G. Amoroso, Chief Executive Officer, TAG Cyber LLC Page 3 2017 TAG Cyber Security Annual Purpose and Overview of 2017 TAG Cyber Security Annual The purpose of this 2017 TAG Cyber Security Annual is to assist the women and men who are tasked with protecting their organizations from the potentially damaging effects of cyber attacks. Throughout the report, these dedicated cyber defenders are referred to as members of Chief Information Security Officer (CISO) teams. The report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. Offering cyber security guidance based on a control methodology is hardly a new idea. Literally dozens of cyber security frameworks are available to working professionals. What is unconventional here, however, is an underlying security framework that uniquely embraces cloud, virtualization, and mobility as solutions rather than problems. It is a cyber framework that seeks to support proactive avoidance, rather than just passive acceptance, of malicious attacks. The underlying architectural framework of this report consists of a three- step infrastructure improvement process that every CISO team should embrace: In Step 1, they must explode their perimeter-based infrastructure into smaller, distributed micro-segments. In Step 2, they must offload these segments onto virtualized, cloud-based systems with advanced security protections. And in Step 3, they must reload their cyber security technology with superior technologies from the myriad of expert commercial vendors available. Figure 1. Three-Step Methodology for Enterprise Security Teams It is argued throughout this report that these three steps – exploding, offloading, and reloading – are absolutely required to stop the advanced cyber attacks being aimed at commercial and government systems. The case is made in these pages that these three steps cannot be ignored by CISO teams if they wish to regain control of their infrastructure from malicious intruders and re-establish dependability and trust in the computing and networking systems that support our world. The argument is Page 4 2017 TAG Cyber Security Annual made repeatedly here that the consequences of following the familiar perimeter- dependent path are simply unthinkable. The report does, however, recognize the practical and budgetary realities of the modern enterprise, and that no CISO team can simply wave a magic wand and move their applications and systems to some micro-segmented cloud with advanced machine-learning analytics. To that end, the report includes specific guidance on the most likely existing types of systems and infrastructure that will exist in companies and agencies – including, for example, mainframe systems. This approach is taken so that readers can translate the underlying three-step process and associated framework into a feasible plan. This 2017 TAG Cyber Security Annual is organized around a comprehensive set of resources, technical information, and guidance designed to assist the CISO team with the recommended distribution, virtualization, and improvement tasks. It does so in the context of fifty specific cyber security controls that must be present in the CISO team’s arsenal as they upgrade their infrastructure. Some of these controls are familiar, such as firewall platforms and anti-malware tools. But others might be new including security analytics, network monitoring, and deception. All of the controls, however, are relevant and essential to the success of the modern CISO team. One final point on purpose and overview: This report is not written for C- suite managers or board-level executives, and it is not written to raise awareness amongst industry observers or politicians with casual technical backgrounds. It is written instead for the hard core, working CISO team member professional. The report targets those individuals and groups with the requisite experience, expertise, and ability to make decisions and to take positive steps to improve our global cyber security infrastructure. So if you don’t know the difference between an IP packet and a USPS envelope, or if you don’t know the difference between a virtual and physical machine, or if you have no idea why signature-based processing makes variant writing so easy – then please toss this book aside. It’s not for you. Page 5 2017 TAG Cyber Security Annual Introduction to the 2017 TAG Cyber Security Annual To be successful at protecting infrastructure from cyber attacks, modern Chief Information Security Officer (CISO) teams must attend properly to the following four focus areas in their organizational cyber protection scheme: 1.
Recommended publications
  • Statistics for Sdo2.Oma.Be (2021-02) - Main
    Statistics for sdo2.oma.be (2021-02) - main Statistics for: sdo2.oma.be Last Update: 01 Mar 2021 - 00:00 Reported period: Month Feb 2021 When: Monthly history Days of month Days of week Hours Who: Countries Full list Hosts Full list Last visit Unresolved IP Address Robots/Spiders visitors Full list Last visit Navigation: Visits duration File type Downloads Full list Viewed Full list Entry Exit Operating Systems Versions Unknown Browsers Versions Unknown Referrers: Origin Referring search engines Referring sites Search Search Keyphrases Search Keywords Others: Miscellaneous HTTP Status codes Pages not found Summary Reported period Month Feb 2021 First visit 01 Feb 2021 - 00:10 Last visit 28 Feb 2021 - 23:21 Unique visitors Number of visits Pages Hits Bandwidth 652 903 7,528 32,360 82.04 GB Viewed traffic * (1.38 visits/visitor) (8.33 Pages/Visit) (35.83 Hits/Visit) (95270.57 KB/Visit) Not viewed traffic * 28,374 37,407 96.96 GB * Not viewed traffic includes traffic generated by robots, worms, or replies with special HTTP status codes. Monthly history Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 2021 2021 2021 2021 2021 2021 2021 2021 2021 2021 2021 2021 Month Unique visitors Number of visits Pages Hits Bandwidth Jan 2021 690 1,051 98,163 104,987 1443.12 GB Feb 2021 652 903 7,528 32,360 82.04 GB Mar 2021 0 0 0 0 0 Apr 2021 0 0 0 0 0 May 2021 0 0 0 0 0 Jun 2021 0 0 0 0 0 Jul 2021 0 0 0 0 0 Aug 2021 0 0 0 0 0 Sep 2021 0 0 0 0 0 Oct 2021 0 0 0 0 0 Nov 2021 0 0 0 0 0 Dec 2021 0 0 0 0 0 Total 1,342 1,954 105,691 137,347 1525.16 GB Days of
    [Show full text]
  • Real-Time Backend Architecture Using Node.Js, Express and Google Cloud
    Anh Vu Real-time backend architecture using Node.js, Express and Google Cloud Platform Metropolia University of Applied Sciences Bachelor of Information Technology Information Technology Bachelor’s Thesis 5 January 2021 Abstract Anh Vu Author Real-time backend using NodeJS, Express and Google Cloud Title Platform NumBer of Pages 47 pages Date 5 January 2021 Degree Bachelor of Engineering Degree Programme Information Technology Professional Major MoBile Solutions Instructors Petri Vesikivi, Head of MoBile Solutions Real-time applications, which assure the latency within the defined time limit, are becoming more popular due to the growth of Software as a service trend. Before the evolution of cloud computing, the only solution was to use native WebSockets which are difficult to set up and develop. Recently, Google Cloud Platform provides a developer-friendly, fast and responsive platform to make the process of developing real-time applications seamless. The purpose of the thesis was to demonstrate and Build a scalaBle, high-available and reliaBle Backend architecture using Node.js and Google Cloud Platform. The thesis consists of a theoretical background including Node.js, monolithic and microservices architecture, serverless architecture and real-time dataBase, which provide basic understanding of different architectures and technical solutions. The advantages and disadvantages of the architecture were also clearly analyzed and evaluated. Furthermore, a minimum viable product for a taxi booking app was created to demonstrate the architecture usage in a real use case. To summarize, the thesis aimed to provide the insights of real-time Backend architecture using Node.js and Google Cloud Platform. Moreover, the benefits of using this technology stacks were carefully examined in a case study.
    [Show full text]
  • What Is Threat Hunting?
    $whoami ◎ Apurv Singh Gautam (@ASG_Sc0rpi0n) ◎ Security Researcher, Threat Intel/Hunting ◎ Cybersecurity @ Georgia Tech ◎ Prior: Research Intern at ICSI, UC Berkeley ◎ Hobbies ◎ Contributing to the security community ◎ Gaming/Streaming (Rainbow 6 Siege) ◎ Hiking, Lockpicking ◎ Social ◎ Twitter - @ASG_Sc0rpi0n ◎ Website – https://apurvsinghgautam.me 2 Agenda ◎ Introduction to the Dark Web ◎ Why hunting on the Dark Web? ◎ Methods to hunt on the Dark Web ◎ Can the Dark Web hunting be automated? ◎ Overall Picture ◎ OpSec? What’s that? ◎ Conclusion 3 Clear Web? Deep Web? Dark Web? 5 Image Source: UC San Diego Library Accessing the Dark Web ◎ Tor /I2P/ZeroNet ◎ .onion domains/.i2p domains ◎ Traffic through relays Image Sources: Hotspot Shield, Tor Project, I2P Project, ZeroNet 6 What’s all the Hype? ◎ Hype ○ Vast and mysterious part of the Internet ○ Place for cybercriminals only ○ Illegal to access the Dark Web ◎ Reality ○ Few reachable onion domains ○ Uptime isn’t ideal ○ Useful for free expression in few countries ○ Popular sites like Facebook, NYTimes, etc. ○ Legal to access the Dark Web 7 Relevant site types? ◎ General Markets ◎ PII & PHI ◎ Credit Cards ◎ Digital identities ◎ Information Trading ◎ Remote Access ◎ Personal Documents ◎ Electronic Wallets ◎ Insider Threats Image Source: Intsights 8 Sites Examples 9 Cost of products? ◎ SSN - $1 ◎ Fake FB with 15 friends - $1 ◎ DDoS Service - $7/hr ◎ Rent a Hacker - $12/hr ◎ Credit Card - $20+ ◎ Mobile Malware - $150 ◎ Bank Details - $1000+ ◎ Exploits or 0-days - $150,000+ ◎ Critical databases - $300,000+ 10 Product Examples 11 Image Source: Digital Shadows 12 Image Source: Digital Shadows 13 What is Threat Hunting? ◎ Practice of proactively searching for cyber threats ◎ Hypothesis-based approach ◎ Uses advanced analytics and machine learning investigations ◎ Proactive and iterative search 15 Why So Serious (Eh! Important)? ◎ Hacker forums, darknet markets, dump shops, etc.
    [Show full text]
  • Idaho Highway Wildlife Mortality
    Idaho Highway Wildlife Mortality A. James Frankman Abstract—Idaho wildlife mortalities on highways and roads is tracked by the Idaho Fish and Game and the data is made available to the general public through an API called IFWIS Core. While the data supplied does offer species information and geographic coordinates, it can be difficult to organize and understand. This paper will attempt to organize and present this data in visual form using Google Maps and Visualizations APIs to show facets of wildlife mortality in Idaho by density of occurance, time of year, and species variety Index Terms—Information Visualization, Idaho Fish and Game, IFWIS Core, road kill, wildlife mortality, Google Visualization API. 1 INTRODUCTION Amongst the rural communities throughout the United States, the only shows 250 of the latest observations, the density of markers on attrition of wildlife by highway collision is a common occurrence. the map make it difficult to distinguish individual incidents. In an effort to better track and understand wildlife collisions occurrences, the Idaho Fish and Game tracks highway collisions that have occurred since 2001. This data can be useful and relevant to several areas of study. First, understanding how and where collisions occur can help prevent traffic accidents. According to the National Highway Traffic Administration 4% of all traffic accidents in the United States are collisions with wildlife[1]. The collisions with wildlife on U.S. roads and highways represent a significant safety concern to motorists. Besides the risks posed to motorists, the affect on wildlife populations is also significant. America’s wildlife is a natural resource, and highway collisions have a negative impact on wildlife populations.
    [Show full text]
  • Understanding the Value of Arts & Culture | the AHRC Cultural Value
    Understanding the value of arts & culture The AHRC Cultural Value Project Geoffrey Crossick & Patrycja Kaszynska 2 Understanding the value of arts & culture The AHRC Cultural Value Project Geoffrey Crossick & Patrycja Kaszynska THE AHRC CULTURAL VALUE PROJECT CONTENTS Foreword 3 4. The engaged citizen: civic agency 58 & civic engagement Executive summary 6 Preconditions for political engagement 59 Civic space and civic engagement: three case studies 61 Part 1 Introduction Creative challenge: cultural industries, digging 63 and climate change 1. Rethinking the terms of the cultural 12 Culture, conflict and post-conflict: 66 value debate a double-edged sword? The Cultural Value Project 12 Culture and art: a brief intellectual history 14 5. Communities, Regeneration and Space 71 Cultural policy and the many lives of cultural value 16 Place, identity and public art 71 Beyond dichotomies: the view from 19 Urban regeneration 74 Cultural Value Project awards Creative places, creative quarters 77 Prioritising experience and methodological diversity 21 Community arts 81 Coda: arts, culture and rural communities 83 2. Cross-cutting themes 25 Modes of cultural engagement 25 6. Economy: impact, innovation and ecology 86 Arts and culture in an unequal society 29 The economic benefits of what? 87 Digital transformations 34 Ways of counting 89 Wellbeing and capabilities 37 Agglomeration and attractiveness 91 The innovation economy 92 Part 2 Components of Cultural Value Ecologies of culture 95 3. The reflective individual 42 7. Health, ageing and wellbeing 100 Cultural engagement and the self 43 Therapeutic, clinical and environmental 101 Case study: arts, culture and the criminal 47 interventions justice system Community-based arts and health 104 Cultural engagement and the other 49 Longer-term health benefits and subjective 106 Case study: professional and informal carers 51 wellbeing Culture and international influence 54 Ageing and dementia 108 Two cultures? 110 8.
    [Show full text]
  • Next-Gen Technology Transformation in Financial Services
    April 2020 Next-gen Technology transformation in Financial Services Introduction Financial Services technology is currently in the midst of a profound transformation, as CIOs and their teams prepare to embrace the next major phase of digital transformation. The challenge they face is significant: in a competitive environment of rising cost pressures, where rapid action and response is imperative, financial institutions must modernize their technology function to support expanded digitization of both the front and back ends of their businesses. Furthermore, the current COVID-19 situation is putting immense pressure on technology capabilities (e.g., remote working, new cyber-security threats) and requires CIOs to anticipate and prepare for the “next normal” (e.g., accelerated shift to digital channels). Most major financial institutions are well aware of the imperative for action and have embarked on the necessary transformation. However, it is early days—based on our experience, most are only at the beginning of their journey. And in addition to the pressures mentioned above, many are facing challenges in terms of funding, complexity, and talent availability. This collection of articles—gathered from our recent publishing on the theme of financial services technology—is intended to serve as a roadmap for executives tasked with ramping up technology innovation, increasing tech productivity, and modernizing their platforms. The articles are organized into three major themes: 1. Reimagine the role of technology to be a business and innovation partner 2. Reinvent technology delivery to drive a step change in productivity and speed 3. Future-proof the foundation by building flexible and secure platforms The pace of change in financial services technology—as with technology more broadly—leaves very little time for leaders to respond.
    [Show full text]
  • Business Softwares & Solutions
    +91-8048372570 Business Softwares & Solutions https://www.indiamart.com/business-softwares/ A software solutions company working on Information Security , Web Security , Data Security , Communication, Collaboration , Business Process, Business Consulting , Invoice Application About Us Business Softwares & Solutions is a company in software distribution of repute in India. The company is a part of the group of BSS, is in existence for more than 40 year in business of technology distribution. We facilitate distribution of softwares and its marketing, presales, first hand support and implementation in India. Description: We are a software consulting and distribution company, in Kolkata from 1999. Our expertise lies in Security , Network Management , Storage Solution , Web Services and Consulting . Here are some of the product categories mention in the following we work with: COMMUNICATION SOFTWARE: Axigen Mail Server , Active Experts SMS Server, Bulk Mail and SMS. COLLABORATION : Bitrix24 SECURITY SOFTWARE: Kaspersky , Eset ,Avast, Hexamail. NETWORK MANAGEMENT SOFTWARE: Solarwinds , ISL ONLINE REMOTE CONTROL , Dameware. STORAGE SOLUTIONS & SOFTWARES: Acronis , Farstone, GoodSync, SyncBack , Lenovo. OUR NATIONAL PARTNERS : The business operation consist of direct and channel sales for companies like : Axigen Mail Server , ISL Online , Bitrix24 Collaboration CRM , PROJECT MANAGEMENT , BUSINESS PROCESS MANAGEMENT Kaspersky Lab, Dameware LLC, Activexperts, Hexamail, Solarwind, Deerfield, Avast Anti Virus , Sucuri Security For more information,
    [Show full text]
  • An Investigation Into the Security and Privacy of Ios VPN Applications
    An Investigation Into the Security and Privacy of iOS VPN Applications Jack Wilson Division of Cybersecurity School of Design and Informatics Abertay University, Dundee A thesis submitted for the degree of Bachelor of Science with Honours in Ethical Hacking 1st May 2018 Word Count: 11,448 Abstract Due to the increasing number of recommendations for people to use VPN’s for privacy reasons, more app developers are creating VPN apps and publishing them on the Apple App Store and Google Play Store. In this ‘gold rush’, apps are being developed quickly and, in turn, not being developed with security fully in mind. This paper investigated a selection of free VPN applications available on the Apple App Store (for iOS devices) and test the apps for security and privacy. This includes testing for any traffic being transmitted over plain HTTP, DNS leakage and transmission of personally-identifiable information (such as phone number, IMEI 1, email address, MAC address) and evaluating the security of the tunnelling protocol used by the VPN. The testing methodology involved installing free VPN apps on a test device (an iPhone 6 running iOS 11), simulating network traffic for a pre-defined period of time and capturing the traffic (either through ARP spoofing, or through a proxy program such as Burpsuite). This allows for all traffic to be analysed to check for anything being sent without encryption. Other issues that often cause de-anonymisation with VPN applications such as DNS leakage can be tested using websites such as dnsleaktest.com. The research found several common security issues with the VPN applications that were tested, with a large majority of the applications tested failing to implement HTTPS.
    [Show full text]
  • Are3na Crabbé Et Al
    ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA ISA Action 1.17: A Reusable INSPIRE Reference Platform (ARE3NA) Authentication, Authorization & Accounting for Data and Services in EU Public Administrations D1.1.2 & D1.2.2– Analysing standards and technologies for AAA Ann Crabbé Danny Vandenbroucke Andreas Matheus Dirk Frigne Frank Maes Reijer Copier 0 ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA This publication is a Deliverable of Action 1.17 of the Interoperability Solutions for European Public Admin- istrations (ISA) Programme of the European Union, A Reusable INSPIRE Reference Platform (ARE3NA), managed by the Joint Research Centre, the European Commission’s in-house science service. Disclaimer The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. Copyright notice © European Union, 2014. Reuse is authorised, provided the source is acknowledged. The reuse policy of the European Commission is implemented by the Decision on the reuse of Commission documents of 12 December 2011. Bibliographic Information: Ann Crabbé, Danny Vandenbroucke, Andreas Matheus, Dirk Frigne, Frank Maes and Reijer Copier Authenti- cation, Authorization and Accounting for Data and Services in EU Public Administrations: D1.1.2 & D1.2.2 – Analysing standards and technologies for AAA. European Commission; 2014. JRC92555 1 ARe3NA Crabbé et al. (2014) AAA for Data and Services (D1.1.2 & D1.2.2): Analysing Standards &Technologies for AAA Contents 1.
    [Show full text]
  • Documents to Go Iphone
    Documents To Go Iphone scornsWhich Averyher baloney recrystallized evolves so whitherward cantabile that or hokes Jeremie leftward, enkindled is Denis her devisors? unimpugnable? Godfree miswritten feignedly. Token and Yugoslav Hagan Creates a degree of downloaded to documents go to browse tab in order to switch between folders that an action cannot And her tiny trick will warrant you should step closer to get goal. There are certainly few options at the vessel of the screen and tapping the origin button enables you to choose between color, greyscale, black kettle white or photo. You this share any folders, only single files. Kindle app is incumbent and does best job fine. Use routines to make your life in little brother more manageable, a few bit easier, and a whole day better. The app will automatically correct because any tilting. For HP products a product number. Your document will be saved to your original folder. HEY World blog, and David has his. Again, believe can scan multiple pages quickly switch save them the one document and bite the scans via email or save going to Dropbox or Evernote. Google Developer Expert in Google Workspace and Google Apps Script. The file will people be building for offline use. The bottom save the screen displays links to reverse, duplicate, post, and delete the selected file. Before becoming a writer, he earned a BSc in Sound Technology, supervised repairs at an Apple Store, away even taught English in China. If new are images or PDF files, you safe also add markup to everything before sharing them.
    [Show full text]
  • Brief Industry Trends Report 2H 2008
    ISSN 1985 - 7535 Brief Industry Trends Report 2H 2008 Malaysian Communications and Multimedia Commission (SKMM), 2009 The information or material in this publication is protected under copyright and save where otherwise stated, may be reproduced for non commercial use provided it is reproduced accurately and not used in a misleading context. Where any material is reproduced, SKMM as the source of the material must be identified and the copyright status acknowledged. The permission to reproduce does not extend to any information or material the copyright of which belongs to any other person, organisation or third party. Authorisation or permission to reproduce such information or material must be obtained from the copyright holders concerned. This work is based on sources believed to be reliable, but SKMM does not warrant the accuracy or completeness of any information for any purpose and cannot accept responsibility for any error or omission. Published by: Malaysian Communications and Multimedia Commission Off Persiaran Multimedia 63000 Cyberjaya, Selangor Darul Ehsan Tel: +60 3 86 88 80 00 Fax: +60 3 86 88 10 06 Toll Free: 1- 800-888-030 http://www.skmm.gov.my CONTENTS FOREWORD 2 SUMMARY HIGHLIGHTS 3 C&M MARKET CAPITALISATION AND PERFORMANCE Feeling the Effects of Global Financial Crisis 4 C&M Market Capitalisation Plummeted Significantly 6 Individual C&M Companies Contribution to Bursa Malaysia 7 C&M Companies Share Price Movements 7 C&M Amongst Other Heavyweights 8 Local C&M versus Overseas by Market Capitalisation in US Dollar 9 GOOGLE
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]