consider the thermodynamics of forming the periodic table of chemical elements. From this point of view, the periodic table is both similar and radically different.
A knowledge of basic accounting principles is necessary for a full understanding
... As the name implies, two entries are made to the accounting books for.
Atomic weights most commonly used in environmental engineering. Hydrogen. H. 1. Carbon. C. 12. (14 is for radioactive form of C !) Nitrogen. N. 14. Oxygen. O.
deals with usually cyber security and countermeasures, wearable technology and ... individual rights can be affected if standards are not met. Applications of the ...
For now, what is important is that you practice basic techniques and learn a
variety of methods for ... Engineering Mathematics: Open Learning Unit Level 1.
This paper is intended to serve as a model for the first few chapters of future ... system (a building, a bridge, or a machine), draw free-body diagrams, and apply to .... In most of the past literature these cases were treated separately even though
1. Geophysics for. Geothermal Exploration. Dr. Hendra Grandis. Geofisika - ITB.
Agenda. ▫ Basic concept of Geophysics: Review. ▫ Geophysical signatures of a ...
Food Security Information for Action. Practical G ... to address poverty, such as education or access to ... as well as children under five through primary health.
Despite company security policies in general, Skype client .... The client computer connects to one of the Skype Cen- ..
Mar 31, 2012 - economic security, technology and information security, ...... Nyanchama, Matunda, and Paul Sop, âEnterprise Security Management: Managing ...
BASIC CONCEPTS OF CHEMISTRY. ➢ Scope /applications of chemistry. ➢ Basic
S.I units. ➢ Accuracy & Precision. ➢ LAWS OF CHEMICAL COMBINTIONS.
cludes by defining patient education within the context of rehabilitation and ...
Chapter 1: Significance of Patient Education for Health Care and Rehabilitation.
Chemical and Environmental Laboratory. Central Engineering ... The error of a measurement is primarily a theoretical concept, since its value is never ... Determination, Use of Independent Methods of Analysis, Running Parallel. Determination ...
Organic chemistry is that branch of chemistry that deals with the structure, ... Other examples of unsaturated compounds are benzene, C6H6, and acetic acid, C2H4O2. ...... Sawhorse and newman projections are failed to draw structure of ..... Zn, H. +
Environmental Science also shows multidisciplinary features. Multidisciplinarity is the act of joining together two or more disciplines without integration. Each.
The fracture process zone is the region around the crack tip where dislocation ..... The J-integral is used in rate-independent quasi-static fracture analysis.
stereochemistry of organic compounds as well as reactive intermediates in organic ...... transfer of proton within the molecule, this phenomenon is called as ..... difference in the free energy changes for the two ionization processes, i.e., ...
population genetics is the study of the application of Mendel's laws and other
genetic principles to entire populations of organisms instead of just to individuals.
Some genetic concepts are potentially confusing, such as gene. The reason is
that ..... (Chapter 1). [3] Any text book of “Human Genetics” or “molecular Genetic”.
building computational tools for time geographic querying and analysis. Whatever ... taxonomy of analytical questions to the established typology of data mining.
1. SOME BASIC CONCEPTS OF CHEMISTRY. UNIT 1. After studying this unit,
you will be able to. • understand and appreciate the role of chemistry in different.
Sep 2, 2011 ... Regression Analysis: Basic Concepts. Allin Cottrell∗. 1 The simple linear model.
Suppose we reckon that some variable of interest, y, is 'driven ...
Genetics: what is it? • What is genetics? – “Genetics is the study of heredity, the
process in which a parent passes certain genes onto their children.”.
Concepts. CertifiCation objeCtives. Identifying Characteristics of a Network ......
Be sure to take a look at Exercise 1-2 in the LabBook.pdf file that is found on.
Basic Concepts of. Information Security. Timo Kiravuo. Helsinki University of ...
The same information may have different classification in different systems ...
Basic Concepts of Information Security Timo Kiravuo Helsinki University of Technology Telecommunication Software and Multimedia Laboratory Based on slides by:
Prof., Dr. Sci. Teemupekka Virtanen
Security, why • • • • • •
Protect valuable assets Compliance with laws Meet the customer requirements Prevent breakdowns in production Keep personnel happy Protect own reputation
Confidentiality- Luottamuksellisuus • • • •
Secrecy of information Who is allowed to know something Bell-LaPadula –model A real property of information – Classification must be the same every place the same information is processed
Availability – Käytettävyys (Saatavuus) • Availability of service (information) • What is the maximum time delay for getting service • Sometimes probability of not losing information • Some close areas – availability – reliability – usability
• A property of the system – The same information may have different classification in different systems
Integrity - Eheys • The meaning of integrity has changed during time • Originally integrity in transactions – There must been no partial transactions
• Now much broader definition – Data was correct in the beginning – All changes have be legal, accountable and correct – Data is still correct
• Accountability is usually required to maintain integrity
Threat – Uhka • Something harmful that may happen • Possibility to happen is the numerical value of a threat • Examples – – – – –
Fire Death of key person Malfunction of hard disk Cracker breaking in IRS comes to inspect the files
Risk - Riski • The expectancy of a threat • Two components – Threat (probability) – Damage (amount)
• Risk = threat * damage
Vulnerability - Haavoittuvuus • Weakness in the information system – Makes it possible for a threat to occur – Increase probability of a threat – Increase damage
• Examples – – – –
Weak passwords Weak encryption No secondary power supply A backdoor in the system
From Threat to Risk Threat
Vulnerability
Loss
Risk
Eliminate risk
Minimize risk
Accept risk
Total cost
The Balance between Risks and Costs
Cost of risk
Costs of avoiding accidents
Minimal costs Costs of accidents Resources to avoid an accident
Data protection – Tietosuoja • Privacy protection is a civil right in many countries including Finland • Restriction on gathering personal information – – – –
What kind of information From whom How to use information How to protect information
• Required by legislation
Protocol - Protokolla • • • • •
A formal description of discussion Vocabulary Order of words How to do handshake Between computers, diplomats, companies
AAA • Authentication - Todennus – Mechanism for confirming the identity of user and integrity and authenticity of information
• Authorization – Valtuutus – Who is allowed to do what
• Accountability – Kohdennettavuus – It is possible afterward to find out who has made any operations
• Identification – Tunnistus – Connects a user to the real person – Usually additional authentication is needed to verify the identity
Anonymity - Anonymiteetti • An entity can not be identified – Protects the privacy of the entity
• Can still be authorized to perform actions – By using e.g. certificates – E.g. when you buy something and pay only cash, the transaction is anonymous, but authorized
• This can often be a design requirement – E.g. government systems
Pseudonymity -pseudonymiteetti • We can authenticate and entity and connect it to previous occurances, but we can not identify the person connected to the pseudonym – E.g. web cookies
• Using the same pseudonym in different situations can lead to identification of the entity
Non-repudiation Kiistämättömyys • It is not possible for a user to afterward deny an operation he has made • Methods – – – –
Electronic signature Trusted Third Party Time Stamps Accountability may maintain also non-repudiation
• Clearance – Luokittelu – Classification of users of information
Corporate Security
The Assets • • • •
Everything required for production Everything valuable All good reputation Investments
Material • Production – – – –
Buildings Machinery Raw material Stocks
• Valuables – Money – Art
• Other investments – Cars
People • Production – Skilled workers
• Information – Databank
• Reputation – Value itself
Information • Production – Prints – Orders
• Corporate management – Plans – Customer information – Personnel information
• Investments – Databases
• Compliance – Bookkeeping – Privacy
Reputation • Good manufacturer – No malfunctions – No faulty products
• Good neighbor – Environmental protection – Safe traffic
• Good employer – Safety in work
Security Management • • • •
Set the goals Define the security level Define the acceptance of risk Define protection principles
Security Policy • • • • •
A high level statement Defines the baseline security Defines the acceptable risk Defines protection principles Basic document
Legislation and security • Assets may be protected by legislation – An intruder is a criminal and will be punished
• Special capabilities are guaranteed to protect assets • Legislation sets requirements for security
Baseline Security • The minimal required security level • The procedures to protect others • Usually more is required – Production – Customers – Legislation
Asset Management • Recognize the important assets • Classification
• Authenticate the insiders – Keys, access control
• Detection – Alarms – Delay in detection – Precision of detection
• Active response – Time to reach the site – Amount of strength to prevent intrusion
How much is enough • S(Tp + Tg) > Ta + Tt – – – –
Tp time to go through a passive barrier Tg time to go to the next barrier Ta delay in alarm Tt time for a guard to reach the site
The Goal of Physical Security • People in the domain may work efficiently – All the people are authenticated – All the people are trusted – No outsiders to look after
• Good working conditions – Safety – Fire prevention
• Don’t prevent or disturb working of authenticated people
Operational Security • Job management – Enough people – Possibility to work in a secure way
• Safety procedures – Safe working conditions
• Sharing of duties • Key persons
Information Technology Security • • • • • •
Computer security Communication security Security domains Protection against outsiders Authentication of insiders Notification of intrusion
Security in a Modern Organization • Security requirements are part of management • The lower level in hierarchy must meet the requirements of higher level • The higher level must accept the cost of security • Management in each level has to make decisions in security
Security in Outsourcing • • • •
Security requirements as part of the service Defined in contracts Evaluation, certification Costs are part of the service – Service provider has to be able to include the costs in the price
Security Costs • Part of normal operational costs • Have to take into accounting when – calculate the investments – pricing products – pricing services
Conclusion • Security is a prevention of incidents which may cause losses to the organization • Security is optimization between losses and costs of protection • There are several methods for protection