992 resultados para Corporate networks


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Over the past 40 years, Bangladesh has been undergoing economic reforms and institutional transitions to a market economy. An important product of this strategic transition has been the emergence of interlocking directorates, where a director sits on multiple directorate boards of corporations. Given this background, this thesis seeks to examine the attributes of the corporate network of interlocking directorships in Bangladesh. To date, the study of interlocking directorates has concentrated on Western economies. This study provides the results from a systematic exploration of the corporate network of Bangladesh based on data drawn from 100 largest listed companies in 2010.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Industrial control systems (ICS) have been moving from dedicated communications to switched and routed corporate networks, making it probable that these devices are being exposed to the Internet. Many ICS have been designed with poor or little security features, making them vulnerable to potential attack. Recently, several tools have been developed that can scan the internet, including ZMap, Masscan and Shodan. However, little in-depth analysis has been done to compare these Internet-wide scanning techniques, and few Internet-wide scans have been conducted targeting ICS and protocols. In this paper we present a Taxonomy of Internet-wide scanning with a comparison of three popular network scanning tools, and a framework for conducting Internet-wide scans.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Hoje em dia, distribuições de grandes volumes de dados por redes TCP/IP corporativas trazem problemas como a alta utilização da rede e de servidores, longos períodos para conclusão e maior sensibilidade a falhas na infraestrutura de rede. Estes problemas podem ser reduzidos com utilização de redes par-a-par (P2P). O objetivo desta dissertação é analisar o desempenho do protocolo BitTorrent padrão em redes corporativas e também realizar a análise após uma modificação no comportamento padrão do protocolo BitTorrent. Nesta modificação, o rastreador identifica o endereço IP do par que está solicitando a lista de endereços IP do enxame e envia somente aqueles pertencentes à mesma rede local e ao semeador original, com o objetivo de reduzir o tráfego em redes de longa distância. Em cenários corporativos típicos, as simulações mostraram que a alteração é capaz de reduzir o consumo médio de banda e o tempo médio dos downloads, quando comparados ao BitTorrent padrão, além de conferir maior robustez à distribuição em casos de falhas em enlaces de longa distância. As simulações mostraram também que em ambientes mais complexos, com muitos clientes, e onde a restrição de banda em enlaces de longa distância provoca congestionamento e descartes, o desempenho do protocolo BitTorrent padrão pode ser semelhante a uma distribuição em arquitetura cliente-servidor. Neste último caso, a modificação proposta mostrou resultados consistentes de melhoria do desempenho da distribuição.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este estudio de caso busca analizar la Política Exterior Japonesa en materia económica frente a las dinámicas comerciales tanto de Corea del Sur como del mismo Japón en el Periodo 2001 – 2011, teniendo como objetivo concreto la identificación de la incidencia que tienen dichas dinámicas comerciales, en términos de competitividad por precio y calidad, sobre la Política Exterior Comercial Japonesa (PECJ).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The main objective for this degree project was to analyze the Endpoint Security Solutions developed by Cisco, Microsoft and a third minor company solution represented by InfoExpress. The different solutions proposed are Cisco Network Admission Control, Microsoft Network Access Protection and InfoExpress CyberGatekeeper. An explanation of each solution functioning is proposed as well as an analysis of the differences between those solutions. This thesis work also proposes a tutorial for the installation of Cisco Network Admission Control for an easier implementation. The research was done by reading articles on the internet and by experimenting the Cisco Network Admission Control solution. My background knowledge about Cisco routing and ACL was also used. Based on the actual analysis done in this thesis, a conclusion was drawn that all existing solutions are not yet ready for large-scale use in corporate networks. Moreover all solutions are proprietary and incompatible. The future possible standard for Endpoint solution might be driven by Cisco and Microsoft and a rude competition begins between those two giants.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este artículo se propone abordar la circulación del poder entre los miembros de la comunidad universitaria de la UNSL y aportar algunas categorías conceptuales para su análisis. El trabajo indaga sobre tres dimensiones del poder en la cotidianeidad de la UNSL: una vinculada con algunos aspectos de la lógica y los actores del poder, otra orientada al tipo de agrupamiento predominante; y la última centrada en el tipo de capital dominante que orienta las motivaciones

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este artículo se propone abordar la circulación del poder entre los miembros de la comunidad universitaria de la UNSL y aportar algunas categorías conceptuales para su análisis. El trabajo indaga sobre tres dimensiones del poder en la cotidianeidad de la UNSL: una vinculada con algunos aspectos de la lógica y los actores del poder, otra orientada al tipo de agrupamiento predominante; y la última centrada en el tipo de capital dominante que orienta las motivaciones

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este artículo se propone abordar la circulación del poder entre los miembros de la comunidad universitaria de la UNSL y aportar algunas categorías conceptuales para su análisis. El trabajo indaga sobre tres dimensiones del poder en la cotidianeidad de la UNSL: una vinculada con algunos aspectos de la lógica y los actores del poder, otra orientada al tipo de agrupamiento predominante; y la última centrada en el tipo de capital dominante que orienta las motivaciones

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Primarily targeted toward the network or MIS manager who wants to stay abreast of the latest networking technology, Enterprise Networking: Multilayer Switching and Applications offers up to date information relevant for the design of modern corporate networks and for the evaluation of new networking equipment. The book describes the architectures and standards of switching across the various protocol layers and will also address issues such as multicast quality of service, high-availability and network policies that are requirements of modern switched networks.