Stakeholder Specific Visualization and Automated Reporting of Network Scanning Results 11. DFN-Forum Kommunikationstechnologien, Günzburg, 27.
|
|
- Camilla Bond
- 5 years ago
- Views:
Transcription
1 Stakeholder Specific Visualization and Automated Reporting of Network Scanning Results 11. DFN-Forum Kommunikationstechnologien, Günzburg, 27. Juni 2018 Tanja Hanauer, Stefan Metzger 1
2 Agenda Ø Motivation Ø State of the Art Ø Process Framework Vis4Sec Ø Exemplary Process Iterations Limitation and Control of Network Ports Vulnerable OpenSSL Library Ø Conclusion Leibniz-Rechenzentrum 2
3 Motivation Ø Compliance -> Implementation Ø Organizational Knowledge Ø Overview Leibniz-Rechenzentrum 3
4 State of the Art Ø Visualization and Data Guidelines Gestalt Theory Tufte s Design Criteria Shneiderman s Information Seeking Mantra Leibniz-Rechenzentrum 4
5 Data Quality Dimensions according to Data Management Association UK Ø Completeness: Proportion of stored data against the potential of 100 % complete. Ø Uniqueness: No thing will be recorded more than once based upon how that thing is identified. Ø Timeliness: The degree to which data represent reality from the required point in time. Ø Validity: The data conforms to the syntax (format, type range) of its definition. Ø Accuracy: The degree to which data correctly describes the real world object or event being described. Ø Consistency: The absence of difference, when comparing two or more representations of a thing against a definition. 7/23/18 Leibniz-Rechenzentrum 5
6 State of the Art Ø Visualization and Data Guidelines Ø Security Best Practices ISO/IEC Critical Security Controls Leibniz-Rechenzentrum 6
7 Security Best Practices Ø ISO/IEC Security of network services Technical review to ensure compliance with information security policy Ø Critical Security Controls CSC 9 Limitation and control of network ports 9.1 Only ports, protocols, and services with validated business needs are running on each system 9.3 Automated regular port scans against all key servers and comparison of the results to a known baseline Leibniz-Rechenzentrum 7
8 State of the Art Ø Visualization and Data Guidelines Ø Security Best Practices ISO/IEC Critical Security Controls Ø Existing Publications Leibniz-Rechenzentrum 8
9 Existing Publications Leibniz-Rechenzentrum 9
10 State of the Art Ø Visualization and Data Guidelines Ø Security Best Practices ISO/IEC Critical Security Controls Ø Existing Publications Ø Visualization and Knowledge Processes Ware, Fry, Marty, and Balakrishnan Burkhard Leibniz-Rechenzentrum 10
11 Process Framework Vis4Sec Ø Initiation Environment Requirements Stakeholders Planned Actions Ø Question Phase Ø Data Preparation Phase Data Sources Ensure Data Quality Ø Visualization Phase Ø Interaction Phase Ø Iterations Leibniz-Rechenzentrum 11
12 Initiation Ø Environment: Scientific Data Center LRZ Ø Requirements Know running services Detect new services Detect and patch potentially vulnerable services Ø Stakeholders System- and security-admins IT management Ø Planned Actions Automation of network scans Stakeholder specific filtering and distribution of results Leibniz-Rechenzentrum 12
13 Question Phase? Ø What are the reachable ports on each system? Externally Internally Leibniz-Rechenzentrum 13
14 Data Preparation Phase Data Source I DR Portscan Centralized regular network scans Aggregated Automated -reporting Information à operations Leibniz-Rechenzentrum 14
15 Data Preparation Phase - Ensure Data Quality I 7/23/18 Leibniz-Rechenzentrum 15
16 Data Preparation Phase - Ensure Data Quality II 7/23/18 Leibniz-Rechenzentrum 16
17 Data Preparation Phase - Data Source II Ø DR Portscan Ø Organizational CMDB Inventory DB LDAP 7/23/18 Leibniz-Rechenzentrum 17
18 Visualization Phase Visualization gives you answers to questions you didn t know you had. Ben Shneiderman 7/23/18 Leibniz-Rechenzentrum 18
19 Interaction Phase Ø Data Ø Dashboards Leibniz-Rechenzentrum 19
20 Iteration Redefined Question: Ø What are the externally reachable services that use a vulnerable OpenSSL library? Leibniz-Rechenzentrum 20
21 Data Preparation Phase Ø Data Sources Port Scanner Organizational Scan: SSL Cipher-Suites Common Vulnerabilities and Exposures Installed software on each system Leibniz-Rechenzentrum 21
22 Visualization + Interaction Phase Ø Data Ø Dashboards Ø Reports Leibniz-Rechenzentrum 22
23 Conclusion Process Iterations Various iterations Ø Vulnerabilities Ø Ø Ø Unneeded open ports Printer (9100) Ntp (123) Stakeholders Controls Authorized devices Updates and patching Improvement Ø Ø Ø Settings corrected Awareness Leibniz-Rechenzentrum 23
24 Further Iterations Ø Transferable to further Vulnerabilities Security controls Security approaches Ø Updates Ø Vulnerabilities 7/23/18 Leibniz-Rechenzentrum 24
25 Conclusion Ø Initiates Communication among stakeholders Revision of security settings Security and data awareness Ø Supports Implementation of compliance requirements Organizational knowledge generation and transfer Overview of existing systems and security state Ø Knowledge IT management + IT operations Leibniz-Rechenzentrum 25
26 Thank you for your attention Source adapted Leibniz-Rechenzentrum 26
The DG SANTE approach to evaluate food safety control systems in Member States and non EU countries
The DG SANTE approach to evaluate food safety control systems in Member States and non EU countries Stefan Hönig Directorate-General (DG SANTE) Directorate F, food audits and analysis Unit F1: Food The
More informationKey Considerations for Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous
More informationDevOps Course Content
INTRODUCTION TO DEVOPS DevOps Course Content Ø What is DevOps? Ø History of DevOps Ø Different Teams Involved Ø DevOps definitions Ø DevOps and Software Development Life Cycle o Waterfall Model o Agile
More informationBrexit Transition Support for Local Cymdeithas Llywodraeth Leol Cymru Welsh Local Government Association
Cymdeithas Llywodraeth Leol Cymru Welsh Local Government Association Brexit Transition Support for Local Authorities Welsh NHS Confederation Event 22 nd March 2019 @WelshLGA www.wlga.wales Overview WLGA
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationChild Check In Quick Start Guide. v 9.5. Local: (706) Atlanta: (404) Toll Free: (866)
Child Check In Quick Start Guide v 9.5 Local: (706) 864-4055 Atlanta: (404) 551-4230 Toll Free: (866) 475-1699 www.caaministries.org CHILD CHECK IN OVERVIEW What is child check in? The child check in system
More informationSTATE OF NEW JERSEY. SENATE, No th LEGISLATURE
SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED JANUARY, 0 Sponsored by: Senator NIA H. GILL District (Essex and Passaic) Senator SHIRLEY K. TURNER District (Hunterdon and Mercer) SYNOPSIS Requires
More informationPRIVACY STATEMENT - TERMS & CONDITIONS. For users of Princh printing, copying and scanning services PRIVACY STATEMENT
PRIVACY STATEMENT - TERMS & CONDITIONS For users of Princh printing, copying and scanning services Last updated: May 17 th 2018 PRIVACY STATEMENT By consenting to this privacy notice you are giving Princh
More informationIBM Cognos Open Mic Cognos Analytics 11 Part nd June, IBM Corporation
IBM Cognos Open Mic Cognos Analytics 11 Part 2 22 nd June, 2016 IBM Cognos Open MIC Team Deepak Giri Presenter Subhash Kothari Technical Panel Member Chakravarthi Mannava Technical Panel Member 2 Agenda
More informationMobile Application End User License Agreement
Mobile Application End User License Agreement This Mobile Application End User License Agreement ( Agreement ) is a binding agreement between you (the End User or you ) and Game Garden Limited, duly organized
More informationMI3P GRid Compliance Agreement
Music Industry Integrated Identifier Project MI3P GRid Compliance Agreement Document: MI3P-IGA-002-001 Date: February 2007 The International GRid Authority IFPI Secretariat 54 Regent Street London W1R
More informationD. Statement on Internal Control Structure E. Management Summary G. Detailed Audit Findings II. MANAGEMENT'S RESPONSE...
MANATEE COUNTY CLERK OF THE CIRCUIT COURT INTERNAL AUDIT DIVISION LIBRARY SYSTEM DIVISION A U D I T R E P O R T TABLE OF CONTENTS I. INTERNAL AUDIT REPORT A. Background... 2-3 B. Purpose/Objectives; Scope...
More informationColorado Secretary of State Election Rules [8 CCR ]
Rule 25. Post-election audit 25.1 Definitions. As used in this rule, unless stated otherwise: 25.1.1 Audit Center means the page or pages of the Secretary of State s website devoted to risk-limiting audits.
More informationSPECIAL INSPECTOR GENERAL FOR AFGHANISTAN RECONSTRUCTION CHIEF FOIA OFFICER REPORT FISCAL YEAR 2010
SPECIAL INSPECTOR GENERAL FOR AFGHANISTAN RECONSTRUCTION CHIEF FOIA OFFICER REPORT FISCAL YEAR 2010 Page 1 I. Steps Taken to Apply the Presumption of Openness The guiding principle underlying the President's
More informationEND-USER LICENSE AGREEMENT
END-USER LICENSE AGREEMENT CUSTOMER DATA: THE PRIVACY OF CUSTOMER DATA IS PROTECTED AND SECURE WITH THIS LICENSED PRODUCT THROUGH THE AUTHORIZATION OF THIS END USER LICENSE AGREEMENT. ALL DEALER DATA ACCESSED
More informationIC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes
IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,
More informationE-vote 2011 Case no: Version: 3.3 Electronic counting of p-votes Date: 10/9/2009
E-vote 2011 Case no: 3.3 Electronic counting of p-votes Date: 10/9/2009 E-vote 2011 Use case specification: 3.3 Electronic counting of p-votes Project: E-vote 2011 CONTENT 1. EXECUTIVE SUMMARY 2 2. PURPOSE
More informationEssence Kernel. Kristian Sandahl
Essence Kernel Kristian Sandahl 2019-02-05 2 Software Engineering Method And Theory A common ground for software engineering Moving away from SE methods fashion industry. Founded in 2009 by: Ivar Jacobson
More informationVoting System Examination Election Systems & Software (ES&S)
Voting System Examination Election Systems & Software (ES&S) Prepared for the Secretary of State of Texas James Sneeringer, Ph.D. Designee of the Attorney General This report conveys the opinions of the
More informationPunchscan: Introduction and System Definition of a High-Integrity Election System
Punchscan: Introduction and System Definition of a High-Integrity Election System Kevin Fisher, Richard Carback and Alan T. Sherman Center for Information Security and Assurance (CISA) Department of Computer
More informationDRAFT RECOMMENDATION ON THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE OUTLINE
General Conference 30th Session, Paris 1999 30 C 30 C/31 16 August 1999 Original: English Item 7.6 of the provisional agenda DRAFT RECOMMENDATION ON THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL
More informationSTATE OF RHODE ISLAND
LC0 00 -- H 1 AS AMENDED STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 A N A C T RELATING TO MOTOR AND OTHER VEHICLES Introduced By: Representatives McCauley, Slater, Almeida, and
More informationGlobal Conditions (applies to all components):
Conditions for Use ES&S The Testing Board would also recommend the following conditions for use of the voting system. These conditions are required to be in place should the Secretary approve for certification
More informationCommission on Trial Court Performance and Accountability Court Statistics and Workload Committee
Commission on Trial Court Performance and Accountability Court Statistics and Workload Committee Integrated Trial Court Adjudication System Project Issue Summary November 19, 2012 Commission on Trial Court
More informationMachine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver
Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in
More informationOVERVIEW OF UL 2900 MEDICAL DEVICE CYBERSECURITY WORKSHOP MINNEAPOLIS, MN
OVERVIEW OF UL 2900 MEDICAL DEVICE CYBERSECURITY WORKSHOP MINNEAPOLIS, MN Justin Heyl, BSME UL Cybersecurity Commercial Strategies T: +1 612-618-8797 E: Justin.heyl@ul.com AN INTRODUCTION TO UL 2900 2
More informationH 8072 S T A T E O F R H O D E I S L A N D
LC00 01 -- H 0 S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO ELECTIONS -- CONDUCT OF ELECTIONS Introduced By: Representatives Shekarchi, Ackerman,
More informationCadac SoundGrid I/O. User Guide
Cadac SoundGrid I/O User Guide 1 TABLE OF CONTENTS 1. Introduction... 3 1.1 About SoundGrid and the Cadac SoundGrid I/O... 3 1.2 Typical Uses... 4 1.3 Native/SoundGrid Comparison Table... 6 2. Hardware
More informationGENERAL TERMS & CONDITIONS
TAXI GROUP LTD. U.K. GENERAL TERMS & CONDITIONS 02 Jun 2018 GENERAL TERMS AND CONDITIONS OF PINK TAXI GROUP LTD. TOKENS SALE Please read carefully these General Terms of Pink Taxi Group Ltd. Tokens Sale
More informationOverview of the Design Process. Avoid Bad Design, Use UCD Evidence-based Design Hypothesis testing!
Overview of the Design Process Avoid Bad Design, Use UCD Evidence-based Design Hypothesis testing! Good Design (reminder!) Every designer wants to build a highquality interactive system that is admired
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationHoboken Public Schools. PLTW Introduction to Computer Science Curriculum
Hoboken Public Schools PLTW Introduction to Computer Science Curriculum Introduction to Computer Science Curriculum HOBOKEN PUBLIC SCHOOLS Course Description Introduction to Computer Science Design (ICS)
More informationGAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments
GAO United States Government Accountability Office Report to the Chairman, Committee on Rules and Administration, U.S. Senate September 2008 ELECTIONS States, Territories, and the District Are Taking a
More informationMobile Application End User License Agreement
Mobile Application End User License Agreement This Mobile Application End User License Agreement ( Agreement ) is a binding agreement between you ( End User or you ) and Pelotonia LLC ( Pelotonia ). This
More informationa GAO GAO HOMELAND SECURITY Planned Expenditures for U.S. Visitor and Immigrant Status Program Need to Be Adequately Defined and Justified
GAO United States Government Accountability Office Report to Congressional Committees February 2007 HOMELAND SECURITY Planned Expenditures for U.S. Visitor and Immigrant Status Program Need to Be Adequately
More informationMaryland State Board of Elections Comprehensive Audit Guidelines Revised: February 2018
Maryland State Board of Elections Comprehensive Audit Guidelines Revised: February 2018 The purpose of the Comprehensive Audit is ensure that local boards of elections ( local boards ) are adequately performing
More informationCLINICAL TRIAL AGREEMENT [Identification of the trial, Person in charge of research] Sponsor of the Trial: Institution:
CLINICAL TRIAL AGREEMENT [Identification of the trial, Person in charge of research] Sponsor of the Trial: Institution: 2 (20) APPENDIX 1 Parties................................ 4 2 Scope of the agreement................................4
More informationMecklenburg County Department of Internal Audit. Mecklenburg County Board of Elections Elections Process Report 1476
Mecklenburg County Department of Internal Audit Mecklenburg County Board of Elections Elections Process Report 1476 April 9, 2015 Internal Audit s Mission Internal Audit Contacts Through open communication,
More informationPost-Election Audit Pilots, and New Physical and Cyber Security Requirements in Indiana Election Code
Post-Election Audit Pilots, and New Physical and Cyber Security Requirements in Indiana Election Code Jay S. Bagga, Ph.D. & Bryan D. Byers, Ph.D. VSTOP Co-Directors Ball State University With Special Assistance
More informationData Management Governance
Data Management Governance Version 2.0 Update: 10.23.14 Table of Contents 1.0 Introduction 2.0 Governance 2.1 Data Management Structure for DPI 2.1.1 Data Managers 2.1.2 Data Management Group 2.1.2.1 Purpose
More informationThe documents listed below were utilized in the development of this Test Report:
1 Introduction The purpose of this Test Report is to document the procedures that Pro V&V, Inc. followed to perform certification testing of the of the Dominion Voting System D-Suite 5.5-NC to the requirements
More informationSECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM
SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early
More informationUpdate on EAST Policies
Update on EAST Policies July 26 and 27 and August 3, 2016 Susan Stearns, BLC Laura Wood, Tufts University Today s Agenda Review major EAST operating policies as currently approved by Executive Committee
More informationLecture 8: Verification and Validation
Thanks to Prof. Steve Easterbrook University of Toronto What are goals of V&V Validation Techniques Ø Inspection Ø Model Checking Ø Prototyping Verification Techniques Ø Consistency Checking Lecture 8:
More informationFOOD SECURITY OUTCOME MONITORING : SYRIAN REFUGEES IN JORDAN
FOOD SECURITY OUTCOME MONITORING : SYRIAN REFUGEES IN JORDAN TERMS OF REFERENCE- DRAFT NOVEMBER 2015 SUMMARY As the Syrian refugee crisis enters its fifth year, rates of external assistance have begun
More informationIntroduction of Electronic Voting In Namibia
Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background
More informationState of Colorado Department of State epollbook and Ballot On-Demand
Robis Elections, Inc. State of Colorado Department of State epollbook and Ballot On-Demand Request for Information: Uniform Voting System for the State of Colorado Robis Elections, Inc. 300 S. County Farm
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationSPARC Version New Features
SPARC Version 1.5.0 New Features SPARC Request New Features: 1. Users can click Export Consolidated Request to create a.csv file from the user dashboard *This can then be saved and manipulated in Excel
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationGUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol
GUEST WIFI NETWORK Terms and Conditions and Acceptable Use Protocol PLEASE READ THESE TERMS AND CONDITIONS AND THE ACCEPTABLE USE PROTOCOL CAREFULLY BEFORE USING THE GUEST WIFI NETWORK SERVICE TERMS AND
More informationUnited States Government Accountability Office GAO. Report to Congressional Committees
GAO United States Government Accountability Office Report to Congressional Committees August 2007 HOMELAND SECURITY U.S. Visitor and Immigrant Status Program s Long-standing Lack of Strategic Direction
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRADE/C/CEFACT/2013/MISC.2 Distr.: General 17 May 2013 Original: English Economic Commission for Europe Committee on Trade Centre for Trade Facilitation and
More informationBIOMETRICS IN A HUMANITARIAN CONTEXT
BIOMETRICS IN A HUMANITARIAN CONTEXT Andrew Hopkins & Justin Hughes 1 Presentation Overview s global footprint The Genesis of Biometrics within The Biometrics Implementation Project Conclusions, the Future
More informationAchieving Interoperability
Fact Sheet IDENT and IAFIS Interoperability Goal of IDENT and IAFIS Interoperability As a part of the U.S. government s efforts to enhance our nation s security to meet the needs and challenges of the
More informationElectronic pollbooks: usability in the polling place
Usability and electronic pollbooks Project Report: Part 1 Electronic pollbooks: usability in the polling place Updated: February 7, 2016 Whitney Quesenbery Lynn Baumeister Center for Civic Design Shaneé
More informationCHAPTER 354. (Senate Bill 60)
CHAPTER 354 (Senate Bill 60) AN ACT concerning Identity Fraud Felony or Violations Involving Repeat Offender, Fiduciary, or Vulnerable Adult Prohibitions, Evidence, and Penalties FOR the purpose of prohibiting
More informationANALYTICAL GRAPHICS, INC. STK Components License Agreement
ANALYTICAL GRAPHICS, INC. STK Components License Agreement NOTICE TO USER: PLEASE READ THIS STK COMPONENTS LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY. THIS IS A LEGALLY BINDING AGREEMENT BETWEEN YOU AND
More informationTrusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)
April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic
More informationRECORDS RETENTION IN THE MONTANA LEGISLATURE
RECORDS RETENTION IN THE MONTANA LEGISLATURE A Presentation to NCSL s Research and Committee Staff Section Dave Bohyer, Research Director Montana Legislative Services Division October 2011 LEGAL REQUIREMENTS
More informationTrustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17
Trustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17 IMPORTANT: PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE
More informationCanada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation
Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Hubert Laferrière, Director, Immigration Refugees and Citizenship Canada, Government of Canada Gordon
More informationSOFTWARE AS A SERVICE (SaaS) TERMS and CONDITIONS FOR REMOTE ACCESS SERVICE SOLD BY VIDEOJET
SOFTWARE AS A SERVICE (SaaS) TERMS and CONDITIONS FOR REMOTE ACCESS SERVICE SOLD BY VIDEOJET These Software as a Service Terms and Conditions SaaS Terms and Conditions are by and between the Videojet entity
More informationTowards Tackling Hate Online Automatically
Towards Tackling Hate Online Automatically Nikola Ljubešić 1, Darja Fišer 2,1, Tomaž Erjavec 1 1 Department of Knowledge Technologies, Jožef Stefan Institute, Ljubljana 2 Department of Translation, University
More informationVulnerability Assessment and Targeting of Syrian Refugees in Lebanon
Vulnerability Assessment and Targeting of Syrian Refugees in Lebanon Susana Moreno Romero Food Security Expert; WFP Lebanon CO susana.moreno@wfp.org Introduction to stakeholders Beirut, April 2013 Background
More informationPrinciples of Information Visualization Tutorial Part 1 Design Principles. Prof Jessie Kennedy Institute for Informatics & Digital Innovation
Principles of Information Visualization Tutorial Part 1 Design Principles Prof Jessie Kennedy Institute for Informatics & Digital Innovation Overview! Fundamental principles of graphic design and visual
More information(1) PURPOSE. To establish minimum security standards for voting systems pursuant to Section (4), F.S.
1S-2.015 Minimum Security Procedures for Voting Systems. (1) PURPOSE. To establish minimum security standards for voting systems pursuant to Section 101.015(4), F.S. (2) DEFINITIONS. The following words
More informationTHE UNIVERSITY OF TEXAS M.D. ANDERSON CANCER CENTER TECHNOLOGY DEVELOPMENT PROGRAM MANUAL
THE UNIVERSITY OF TEXAS M.D. ANDERSON CANCER CENTER TECHNOLOGY DEVELOPMENT PROGRAM MANUAL The University of Texas M.D. Anderson Cancer Center 1995 TABLE OF CONTENTS I. Introduction II. III. IV. Key Issues
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationProposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, 18.7.2014 COM(2014) 476 final 2014/0218 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL facilitating cross-border exchange of information on road
More informationAd-Hoc Query on the implementation of Council regulation 2725/2000 (Eurodac) Requested by FR on 1 st December 2010
Ad-Hoc Query on the implementation of Council regulation 2725/2000 (Eurodac) Requested by FR on 1 st December 2010 Compilation produced on 29 th March 2011 Responses from Austria, Belgium, Czech Republic,
More informationAnnex to the Decision 28
Annex to the Decision 28 Agreement of the Customs Union on sanitary measures Governments of states-members of the Customs Union within the Eurasian Economic Community (hereinafter - the Customs Union),
More informationThe Pupitre System: A desk news system for the Parliamentary Meeting rooms
The Pupitre System: A desk news system for the Parliamentary Meeting rooms By Teddy Alfaro and Luis Armando González talfaro@bcn.cl lgonzalez@bcn.cl Library of Congress, Chile Abstract The Pupitre System
More informationBiometrics in Border Management Grand Challenges for Security, Identity and Privacy
Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,
More informationFramework Convention on Climate Change
United Nations Framework Convention on Climate Change Distr.: General 8 March 2011 Original: English Ad Hoc Working Group on Long-term Cooperative Action under the Convention Fourteenth session Bangkok,
More informationSubtitle F Medical Device Innovations
130 STAT. 1121 (B) unless specifically stated, have any effect on authorities provided under other sections of this Act, including any regulations issued under such sections.. (b) CONFORMING AMENDMENTS.
More informationPRINCIPLES GOVERNING IPCC WORK
PRINCIPLES GOVERNING IPCC WORK Approved at the Fourteenth Session (Vienna, 1-3 October 1998) on 1 October 1998, amended at the 21 st Session (Vienna, 3 and 6-7 November 2003) and at the 25 th Session (Mauritius,
More informationACT ON THE DANISH INSTITUTE FOR HUMAN RI GHTS - CHAPTER 1. Establishment and tasks
ACT ON THE DANISH INSTITUTE FOR HUMAN RI GHTS - DENMARK'S NATIONAL HUMAN RIGHTS INSTITUTION (ACT NO. 553 18 JUNE 2012) 1 CHAPTER 1 Establishment and tasks Section 1 Section 2 With the purpose of promoting
More informationVolume I Appendix A. Table of Contents
Volume I, Appendix A Table of Contents Glossary...A-1 i Volume I Appendix A A Glossary Absentee Ballot Acceptance Test Ballot Configuration Ballot Counter Ballot Counting Logic Ballot Format Ballot Image
More informationMOCO development company, LLC TERMS OF USE
MOCO development company, LLC TERMS OF USE These Terms of Use ( Terms ) govern your use of the MOCO Website(s), MOCO Software, and MOCO Services (together, the "MOCO Services"): BY CLICKING THE "AGREE"
More informationEND USER LICENSE AGREEMENT
Last updated: March 19, 2018 END USER LICENSE AGREEMENT Thank you for your interest in this application for your mobile device (the App ) provided to you by Wozniak & Co. ( Wozniak & Co. ), which enables
More informationElectronic Voting Systems
Electronic Voting Systems The Impact of System Actors to the Overall Security Level C. Lambrinoudakis *, V. Tsoumas +, M. Karyda +, D. Gritzalis +, S. Katsikas * * Dept. of Information and Communication
More information(Revised with the approval of 227 th Governing Body
PROCUREMENT PROCEDURE MANUAL (Revised with the approval of 227 th Governing Body held on 15 th September, 2017) Page 1 of 10 INDEX No. Particulars 1 Introduction 3 2 Standing Purchase Committees 3 2.1
More informationOFFENDER TRACKING EVIDENCE PROTOCOLS
A PRACTICAL GUIDE FOR OFFENDER TRACKING EVIDENCE PROTOCOLS By Sgt. David Scheppegrell, Charlotte Mecklenburg Police Department George Drake, Program Manager, NLECTC Corrections Technology Center of Excellence,
More informationForeScout Extended Module for McAfee epolicy Orchestrator
ForeScout Extended Module for McAfee epolicy Orchestrator Version 3.1 Table of Contents About McAfee epolicy Orchestrator (epo) Integration... 4 Use Cases... 4 Additional McAfee epo Documentation... 4
More informationCOBIS Policy on Disclosure & Barring Service Checks for Member Schools COBIS Policy on the Recruitment of Ex-Offenders... 3
DBS Checks for COBIS Schools Contents COBIS Policy on Disclosure & Barring Service Checks for Member Schools... 2 COBIS Policy on the Recruitment of Ex-Offenders... 3 COBIS Policy on the Secure Storage,
More informationContributary Platform User Terms of Service
Contributary Platform User Terms of Service BY CLICKING THE ACCEPT BUTTON OR UTILIZING THE CONTRIBUTARY PLATFORM, YOU AGREE TO THE FOLLOWING USER TERMS OF SERVICE (THE AGREEMENT ) GOVERNING YOUR USE OF
More informationVisa Entry to the United Kingdom The Entry Clearance Operation
Visa Entry to the United Kingdom The Entry Clearance Operation REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 367 Session 2003-2004: 17 June 2004 LONDON: The Stationery Office 10.75 Ordered by the House
More informationNEWSLETTER MESSAGE FROM DEAN VOTING SYSTEMS ASSESSMENT PROJECT IN THIS ISSUE FUNDING UPDATE JUNE 2015 VOL. 1 ISSUE 1
NEWSLETTER JUNE 2015 VOL. 1 ISSUE 1 MESSAGE FROM DEAN IN THIS ISSUE Message from Dean Engineering Kickoff The Agile Process and System Engineering User Testing Research Committee Events In the News Future
More informationComplaints and appeals procedure
Complaints and appeals procedure PRO049 Complaints and appeals procedure 2016-07-29 Page 1 of 8 PRO049 Complaints and appeals procedure 2016-07-29 Replaces Complaints and appeal procedure 2016-06-10 Nature
More informationGOOD GOVERNANCE ROLES & RESPONSIBILITIES FOR EXECUTIVE & NON-EXEC DIRECTORS
NBAA SEMINAR ON ESSENTIAL NUMERACY AND GOVERNANCE SKILLS FOR MANAGERS AND NON-ACCOUNTANTS APC, Dar es salaam GOOD GOVERNANCE ROLES & RESPONSIBILITIES FOR EXECUTIVE & NON-EXEC DIRECTORS Said Baraka Kambi
More informationA guide to the new privacy landscape for the Commonwealth Government
A guide to the new privacy landscape for the Commonwealth Government Contents compliance: it s time to get ready compliance: it s time to get ready 3 Overview of the Australian Principles 4 The other requirements
More informationTERMS OF REFERENCE FOR A COMMUNICATIONS CONSULTANT- SHORT TERM OAU- AU 50 TH ANNIVERSARY YEARLONG PROGRAMME
AFRICAN UNION UNION AFRICAINE UNIÃO AFRICANA TERMS OF REFERENCE FOR A COMMUNICATIONS CONSULTANT- SHORT TERM OAU- AU 50 TH ANNIVERSARY YEARLONG PROGRAMME I. Background: This year marks the celebration of
More informationMeisterplan Software as a Service Terms and Conditions (hereinafter referred to as Terms of Service )
Terms of Service Meisterplan Software as a Service Terms and Conditions (hereinafter referred to as Terms of Service ) to an agreement concluded via the Meisterplan Webshop or concluded in any other way
More information1. Definitions. In addition to terms defined elsewhere in this Agreement, the terms set forth immediately below have the following meanings.
Answers A greement Last Updated: January 27, 2017 PLEASE READ THIS AGREEMENT CAREFULLY. BY CLICKING THE AGREE BUTTON OR BY ACCESSING OR USING THE ANSWERS KIT TECHNOLOGY, YOU AGREE TO BE BOUND BY THE TERMS
More informationSelecting a topic and methodology for gender politics of policy research
Selecting a topic and methodology for gender politics of policy research Acknowledgements This Selecting a Topic and Methodology for Gender Politics of Policy Research was produced for Partners for Prevention
More informationColorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett
Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb 2018 -- Neal McBurnett Overview of the Journey Post-Election Audits are Important How Traditional Audits Work Why RLA is better Definitions
More information8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see
TITLE 8 - ALIENS AND NATIONALITY CHAPTER 12 - IMMIGRATION AND NATIONALITY SUBCHAPTER II - IMMIGRATION Part IX - Miscellaneous 1365b. Biometric entry and exit data system (a) Finding Consistent with the
More informationStatement on Security & Auditability
Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It
More informationAn overview of the European approach to the cross-jurisdictional and societal aspects of biometrics
An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics Mario Savastano Senior Researcher IBB / National Research Council of Italy DIEL Federico II University
More information