SlideShare a Scribd company logo
1 of 35
1 1
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 1
Introduction
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
• Na#onal
infrastructure
– Refers
to
the
complex,
underlying
delivery
and
support
systems
for
all
large-­‐scale
services
considered
absolutely
essen#al
to
a
na#on
• Conven#onal
approach
to
cyber
security
not
enough
• New
approach
needed
– Combining
best
elements
of
exis#ng
security
techniques
with
challenges
that
face
complex,
large-­‐scale
na#onal
services
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Introduc#on
3
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.1
–
Na#onal
infrastructure
cyber
and
physical
aDacks
4
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.2
–
Differences
between
small-­‐
and
large-­‐scale
cyber
security
5
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction • Three
types
of
malicious
adversaries
– External
adversary
– Internal
adversary
– Supplier
adversary
Na#onal
Cyber
Threats,
Vulnerabili#es,
and
ADacks
6
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.3
–
Adversaries
and
exploita#on
points
in
na#onal
infrastructure
7
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction • Three
exploita#on
points
– Remote
access
– System
administra#on
and
normal
usage
– Supply
chain
Na#onal
Cyber
Threats,
Vulnerabili#es,
and
ADacks
8
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction • Infrastructure
threatened
by
most
common
security
concerns:
– Confiden#ality
– Integrity
– Availability
– TheQ
Na#onal
Cyber
Threats,
Vulnerabili#es,
and
ADacks
9
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Botnet
Threat
• What
is
a
botnet
a(ack?
– The
remote
collec#on
of
compromised
end-­‐user
machines
(usually
broadband-­‐connected
PCs)
is
used
to
aDack
a
target.
– Sources
of
aDack
are
scaDered
and
difficult
to
iden#fy
– Five
en##es
that
comprise
botnet
aDack:
botnet
operator,
botnet
controller,
collec0on
of
bots,
botnot
so3ware
drop,
botnet
target
10
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
• Five
en##es
that
comprise
botnet
aDack:
– Botnet
operator
– Botnet
controller
– Collec#on
of
bots
– Botnot
soQware
drop
– Botnet
target
• Distributed
denial
of
service
(DDOS)
aDack:
bots
create
“cyber
traffic
jam”
Botnet
Threat
11
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.4
–
Sample
DDOS
aDack
from
a
botnet
12
Na#onal
Cyber
Security
Methodology
Components
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction • Ten
basic
design
and
opera#on
principles:
– Decep#on
–
Discre#on
– Separa#on
–
Collec#on
– Diversity
–
Correla#on
– Commonality
–
Awareness
– Depth
–
Response
13
• Deliberately
introducing
misleading
func#onality
or
misinforma#on
for
the
purpose
of
tricking
an
adversary
– Computer
scien#sts
call
this
func#onality
a
honey
pot
• Decep#on
enables
forensic
analysis
of
intruder
ac#vity
• The
acknowledged
use
of
decep#on
may
be
a
deterrent
to
intruders
(every
vulnerability
may
actually
be
a
trap)
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Decep#on
14
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.5
–
Components
of
an
interface
with
decep#on
15
• Separa#on
involves
enforced
access
policy
restric#ons
on
users
and
resources
in
a
compu#ng
environment
• Most
companies
use
enterprise
firewalls,
which
are
complemented
by
the
following:
– Authen#ca#on
and
iden#ty
management
– Logical
access
controls
– LAN
controls
– Firewalls
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Separa#on
16
Fig.
1.6
–
Firewall
enhancements
for
na#onal
infrastructure
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
17
• Diversity
is
the
principle
of
using
technology
and
systems
that
are
inten#onally
different
in
substan#ve
ways.
• Diversity
hard
to
implement
– A
single
soQware
vendor
tends
to
dominate
the
PC
opera#ng
system
business
landscape
– Diversity
conflicts
with
organiza#onal
goals
of
simplifying
supplier
and
vendor
rela#onships
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Diversity
18
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.7
–
Introducing
diversity
to
na#onal
infrastructure
19
• Consistency
involves
uniform
aDen#on
to
security
best
prac#ces
across
na#onal
infrastructure
components
• Greatest
challenge
involves
audi#ng
• A
na#onal
standard
is
needed
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Commonality
20
• Depth
involves
using
mul#ple
security
layers
to
protect
na#onal
infrastructure
assets
• Defense
layers
are
maximized
by
using
a
combina#on
of
func#onal
and
procedural
controls
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Depth
21
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.8
–
Na#onal
infrastructure
security
through
defense
in
depth
22
• Discre#on
involves
individuals
and
groups
making
good
decisions
to
obscure
sensi#ve
informa#on
about
na#onal
infrastructure
• This
is
not
the
same
as
“security
through
obscurity”
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Discre#on
23
• Collec#on
involves
automated
gathering
of
system-­‐
related
informa#on
about
na#onal
infrastructure
to
enable
security
analysis
• Data
is
processed
by
a
security
informa0on
management
system.
• Opera#onal
challenges
– What
type
of
informa#on
should
be
collected?
– How
much
informa#on
should
be
collected?
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Collec#on
24
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.9
–
Collec#ng
na#onal
infrastructure-­‐related
security
informa#on
25
• Correla#on
involves
a
specific
type
of
analysis
that
can
be
performed
on
factors
related
to
na#onal
infrastructure
protec#on
– This
type
of
comparison-­‐oriented
analysis
is
indispensable
• Past
ini#a#ves
included
real-­‐#me
correla#on
of
data
at
fusion
center
– Difficult
to
implement
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Correla#on
26
Fig.
1.10
–
Na#onal
infrastructure
high-­‐
level
correla#on
approach
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
27
• Awareness
involves
an
organiza#on
understanding
the
differences
between
observed
and
normal
status
in
na#onal
infrastructure
• Most
agree
on
the
need
for
awareness,
but
how
can
awareness
be
achieved?
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Awareness
28
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.11
–
Real-­‐#me
situa#on
awareness
process
flow
29
• Response
involves
the
assurance
that
processes
are
in
place
to
react
to
any
security-­‐related
indicator
– Indicators
should
flow
from
the
awareness
layer
• Current
prac#ce
in
smaller
corporate
environments
of
reducing
“false
posi#ves”
by
wai#ng
to
confirm
disaster
is
not
acceptable
for
na#onal
infrastructure
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Response
30
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Fig.
1.12
–
Na#onal
infrastructure
security
response
approach
31
• Commissions
and
groups
• Informa#on
sharing
• Interna#onal
coopera#on
• Technical
and
opera#onal
costs
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
hapter 1 – Introduction
Implemen#ng
the
Principles
Na#onally

More Related Content

Similar to 1 1 Copyright © 2012, Elsevier Inc. All Rights Reserved .docx

Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxdorishigh
 
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docxherminaprocter
 
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docxjesusamckone
 
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docxjesusamckone
 
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docxRAJU852744
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 
Engineering Software Products: 4. software architecture
Engineering Software Products: 4. software architectureEngineering Software Products: 4. software architecture
Engineering Software Products: 4. software architecturesoftware-engineering-book
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSTripwire
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
Software - Role in Systems and Architectures
Software - Role in Systems and ArchitecturesSoftware - Role in Systems and Architectures
Software - Role in Systems and ArchitecturesAbhilash Gopalakrishnan
 
What is software engineering
What is software engineeringWhat is software engineering
What is software engineeringfindclick read
 
Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdfssuser3e6464
 
Copyright © 2012, Elsevier Inc. All Rights ReservedCh.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedCh.docxCopyright © 2012, Elsevier Inc. All Rights ReservedCh.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedCh.docxbobbywlane695641
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 
GPA Open Source Gpa Users Forum 2011 09 07
GPA Open Source   Gpa Users Forum 2011 09 07GPA Open Source   Gpa Users Forum 2011 09 07
GPA Open Source Gpa Users Forum 2011 09 07flelmend
 

Similar to 1 1 Copyright © 2012, Elsevier Inc. All Rights Reserved .docx (20)

Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
 
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
 
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
1Running head SHORTENED VERSION OF TITLE8SHORTENE.docx
 
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
 
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
1Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
CCNA Icnd110 s01l02
CCNA Icnd110 s01l02CCNA Icnd110 s01l02
CCNA Icnd110 s01l02
 
Engineering Software Products: 4. software architecture
Engineering Software Products: 4. software architectureEngineering Software Products: 4. software architecture
Engineering Software Products: 4. software architecture
 
Lo 12
Lo 12Lo 12
Lo 12
 
The Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICSThe Subversive Six: Hidden Risk Points in ICS
The Subversive Six: Hidden Risk Points in ICS
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
Software - Role in Systems and Architectures
Software - Role in Systems and ArchitecturesSoftware - Role in Systems and Architectures
Software - Role in Systems and Architectures
 
What is software engineering
What is software engineeringWhat is software engineering
What is software engineering
 
Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
 
Copyright © 2012, Elsevier Inc. All Rights ReservedCh.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedCh.docxCopyright © 2012, Elsevier Inc. All Rights ReservedCh.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedCh.docx
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
GPA Open Source Gpa Users Forum 2011 09 07
GPA Open Source   Gpa Users Forum 2011 09 07GPA Open Source   Gpa Users Forum 2011 09 07
GPA Open Source Gpa Users Forum 2011 09 07
 

More from oswald1horne84988

1 Network Analysis and Design This assignment is.docx
1  Network Analysis and Design  This assignment is.docx1  Network Analysis and Design  This assignment is.docx
1 Network Analysis and Design This assignment is.docxoswald1horne84988
 
1 Name _____________________________ MTH129 Fall .docx
1  Name  _____________________________ MTH129 Fall .docx1  Name  _____________________________ MTH129 Fall .docx
1 Name _____________________________ MTH129 Fall .docxoswald1horne84988
 
1 Lab 8 -Ballistic Pendulum Since you will be desig.docx
1  Lab 8 -Ballistic Pendulum Since you will be desig.docx1  Lab 8 -Ballistic Pendulum Since you will be desig.docx
1 Lab 8 -Ballistic Pendulum Since you will be desig.docxoswald1horne84988
 
1 I Samuel 8-10 Israel Asks for a King 8 When S.docx
1  I Samuel 8-10 Israel Asks for a King 8 When S.docx1  I Samuel 8-10 Israel Asks for a King 8 When S.docx
1 I Samuel 8-10 Israel Asks for a King 8 When S.docxoswald1horne84988
 
1 Journal Entry #9 What principle did you select .docx
1  Journal Entry #9 What principle did you select .docx1  Journal Entry #9 What principle did you select .docx
1 Journal Entry #9 What principle did you select .docxoswald1horne84988
 
1 HCA 448 Case 2 for 10042018 Recently, a pat.docx
1  HCA 448 Case 2 for 10042018 Recently, a pat.docx1  HCA 448 Case 2 for 10042018 Recently, a pat.docx
1 HCA 448 Case 2 for 10042018 Recently, a pat.docxoswald1horne84988
 
1 Chapter 2 Understanding Rhetoric Goal To re.docx
1  Chapter 2 Understanding Rhetoric  Goal To re.docx1  Chapter 2 Understanding Rhetoric  Goal To re.docx
1 Chapter 2 Understanding Rhetoric Goal To re.docxoswald1horne84988
 
1 HC2091 Finance for Business Trimester 2 2.docx
1  HC2091 Finance for Business      Trimester 2 2.docx1  HC2091 Finance for Business      Trimester 2 2.docx
1 HC2091 Finance for Business Trimester 2 2.docxoswald1horne84988
 
1 ECE 175 Computer Programming for Engineering Applica.docx
1  ECE 175 Computer Programming for Engineering Applica.docx1  ECE 175 Computer Programming for Engineering Applica.docx
1 ECE 175 Computer Programming for Engineering Applica.docxoswald1horne84988
 
1 Cinemark Holdings Inc. Simulated ERM Program .docx
1  Cinemark Holdings Inc. Simulated ERM Program  .docx1  Cinemark Holdings Inc. Simulated ERM Program  .docx
1 Cinemark Holdings Inc. Simulated ERM Program .docxoswald1horne84988
 
1 Figure 1 Picture of Richard Selzer Richard Selz.docx
1  Figure 1 Picture of Richard Selzer Richard Selz.docx1  Figure 1 Picture of Richard Selzer Richard Selz.docx
1 Figure 1 Picture of Richard Selzer Richard Selz.docxoswald1horne84988
 
1 Films on Africa 1. A star () next to a film i.docx
1  Films on Africa  1. A star () next to a film i.docx1  Films on Africa  1. A star () next to a film i.docx
1 Films on Africa 1. A star () next to a film i.docxoswald1horne84988
 
1 Contemporary Approaches in Management of Risk in .docx
1  Contemporary Approaches in Management of Risk in .docx1  Contemporary Approaches in Management of Risk in .docx
1 Contemporary Approaches in Management of Risk in .docxoswald1horne84988
 
1 Assignment front Sheet Qualification Unit n.docx
1  Assignment front Sheet   Qualification Unit n.docx1  Assignment front Sheet   Qualification Unit n.docx
1 Assignment front Sheet Qualification Unit n.docxoswald1horne84988
 
1 BBS300 Empirical Research Methods for Business .docx
1  BBS300 Empirical  Research  Methods  for  Business .docx1  BBS300 Empirical  Research  Methods  for  Business .docx
1 BBS300 Empirical Research Methods for Business .docxoswald1horne84988
 
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docxoswald1horne84988
 
1 Assessment details for ALL students Assessment item.docx
1  Assessment details for ALL students Assessment item.docx1  Assessment details for ALL students Assessment item.docx
1 Assessment details for ALL students Assessment item.docxoswald1horne84988
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docxoswald1horne84988
 
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docxoswald1horne84988
 
1 Business Intelligence Case Project Backgro.docx
1  Business Intelligence Case    Project Backgro.docx1  Business Intelligence Case    Project Backgro.docx
1 Business Intelligence Case Project Backgro.docxoswald1horne84988
 

More from oswald1horne84988 (20)

1 Network Analysis and Design This assignment is.docx
1  Network Analysis and Design  This assignment is.docx1  Network Analysis and Design  This assignment is.docx
1 Network Analysis and Design This assignment is.docx
 
1 Name _____________________________ MTH129 Fall .docx
1  Name  _____________________________ MTH129 Fall .docx1  Name  _____________________________ MTH129 Fall .docx
1 Name _____________________________ MTH129 Fall .docx
 
1 Lab 8 -Ballistic Pendulum Since you will be desig.docx
1  Lab 8 -Ballistic Pendulum Since you will be desig.docx1  Lab 8 -Ballistic Pendulum Since you will be desig.docx
1 Lab 8 -Ballistic Pendulum Since you will be desig.docx
 
1 I Samuel 8-10 Israel Asks for a King 8 When S.docx
1  I Samuel 8-10 Israel Asks for a King 8 When S.docx1  I Samuel 8-10 Israel Asks for a King 8 When S.docx
1 I Samuel 8-10 Israel Asks for a King 8 When S.docx
 
1 Journal Entry #9 What principle did you select .docx
1  Journal Entry #9 What principle did you select .docx1  Journal Entry #9 What principle did you select .docx
1 Journal Entry #9 What principle did you select .docx
 
1 HCA 448 Case 2 for 10042018 Recently, a pat.docx
1  HCA 448 Case 2 for 10042018 Recently, a pat.docx1  HCA 448 Case 2 for 10042018 Recently, a pat.docx
1 HCA 448 Case 2 for 10042018 Recently, a pat.docx
 
1 Chapter 2 Understanding Rhetoric Goal To re.docx
1  Chapter 2 Understanding Rhetoric  Goal To re.docx1  Chapter 2 Understanding Rhetoric  Goal To re.docx
1 Chapter 2 Understanding Rhetoric Goal To re.docx
 
1 HC2091 Finance for Business Trimester 2 2.docx
1  HC2091 Finance for Business      Trimester 2 2.docx1  HC2091 Finance for Business      Trimester 2 2.docx
1 HC2091 Finance for Business Trimester 2 2.docx
 
1 ECE 175 Computer Programming for Engineering Applica.docx
1  ECE 175 Computer Programming for Engineering Applica.docx1  ECE 175 Computer Programming for Engineering Applica.docx
1 ECE 175 Computer Programming for Engineering Applica.docx
 
1 Cinemark Holdings Inc. Simulated ERM Program .docx
1  Cinemark Holdings Inc. Simulated ERM Program  .docx1  Cinemark Holdings Inc. Simulated ERM Program  .docx
1 Cinemark Holdings Inc. Simulated ERM Program .docx
 
1 Figure 1 Picture of Richard Selzer Richard Selz.docx
1  Figure 1 Picture of Richard Selzer Richard Selz.docx1  Figure 1 Picture of Richard Selzer Richard Selz.docx
1 Figure 1 Picture of Richard Selzer Richard Selz.docx
 
1 Films on Africa 1. A star () next to a film i.docx
1  Films on Africa  1. A star () next to a film i.docx1  Films on Africa  1. A star () next to a film i.docx
1 Films on Africa 1. A star () next to a film i.docx
 
1 Contemporary Approaches in Management of Risk in .docx
1  Contemporary Approaches in Management of Risk in .docx1  Contemporary Approaches in Management of Risk in .docx
1 Contemporary Approaches in Management of Risk in .docx
 
1 Assignment front Sheet Qualification Unit n.docx
1  Assignment front Sheet   Qualification Unit n.docx1  Assignment front Sheet   Qualification Unit n.docx
1 Assignment front Sheet Qualification Unit n.docx
 
1 BBS300 Empirical Research Methods for Business .docx
1  BBS300 Empirical  Research  Methods  for  Business .docx1  BBS300 Empirical  Research  Methods  for  Business .docx
1 BBS300 Empirical Research Methods for Business .docx
 
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx1  ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docx
 
1 Assessment details for ALL students Assessment item.docx
1  Assessment details for ALL students Assessment item.docx1  Assessment details for ALL students Assessment item.docx
1 Assessment details for ALL students Assessment item.docx
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docx
 
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx1  BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
1 BIOL 102 Lab 9 Simulated ABO and Rh Blood Typing.docx
 
1 Business Intelligence Case Project Backgro.docx
1  Business Intelligence Case    Project Backgro.docx1  Business Intelligence Case    Project Backgro.docx
1 Business Intelligence Case Project Backgro.docx
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

1 1 Copyright © 2012, Elsevier Inc. All Rights Reserved .docx