This document provides an overview of a lesson on securing network devices. The lesson objectives include describing how to configure secure router administration access, SSH, privilege levels, and role-based CLI access. It discusses concepts like router hardening, administrative access configuration, and network monitoring techniques. Specific configuration examples are provided for setting passwords, virtual login security, and SSH. The document also summarizes using SDM to configure the SSH daemon and assigning administrative roles through privilege levels and role-based CLI access.
This document provides instructions for a lesson on securing network devices. It discusses concepts like router hardening, secure administrative access, and network monitoring techniques. It also outlines objectives like configuring a secure network perimeter and demonstrating secure router administration access. Finally, it provides details on implementing security features like banners, SSH, privilege levels, role-based CLI access, resilient configuration, and password recovery procedures.
This document discusses securing Cisco routers. It covers topics like securing physical and remote access to routers, configuring administrative roles and views, and monitoring router activity. Some key points include assigning privilege levels to restrict commands, creating CLI views to control command access for different user roles, and using login features like quiet mode, block lists, and banners to restrict failed login attempts. The document provides examples of securing routers by configuring services like SSH and encrypting passwords.
This document discusses authentication, authorization, and accounting (AAA) security on Cisco devices. It provides an overview of authentication methods including password-only, local database, and remote access. It also covers the configuration of AAA features such as usernames, passwords, and authentication.
This document provides an overview of authentication, authorization, and accounting (AAA) and describes how to implement AAA using local and remote methods. It discusses the importance of AAA and covers topics like local and server-based authentication, TACACS+ and RADIUS protocols, AAA authorization and accounting. The document also provides instructions for configuring AAA on Cisco routers using both the command-line interface and Security Device Manager.
CCNA Security 05- securing the management planeAhmed Habib
The document discusses securing the management plane of routers. It describes different perimeter security implementations like single router, defense-in-depth, and DMZ approaches. It also covers securing the physical router, operating system, and hardening the router. The document discusses configuring SSH and optional SSH commands. It describes connecting to routers via SSH and shows privilege levels, role-based CLI access, views and superviews. Other topics covered include resilient configuration, preventing password recovery, syslog, Cisco AutoSecure and associated commands.
The document discusses securing the management plane of Cisco routers. It describes 9 steps to secure the management plane: 1) follow a router security policy, 2) secure physical access, 3) use strong encrypted passwords, 4) control access to the router, 5) secure management access using AAA, 6) use secure management protocols like SSH, 7) implement system logging, 8) backup configurations periodically, and 9) disable unneeded services. It also discusses authenticating users locally and with RADIUS/TACACS+ servers.
This document provides an overview of securing network devices by configuring router hardening, secure administrative access, and network monitoring techniques. It discusses topics like configuring a secure network perimeter, securing router administration access, enhancing security for virtual logins, and configuring an SSH daemon for secure remote management. The document also covers securing the Cisco IOS image and configuration files using the resilient configuration feature.
This document provides an overview of firewall fundamentals and Cisco firewall solutions. It discusses the basics of standard and extended ACLs, stateful packet inspection, and zone-based policy firewalls. The key steps to configure Cisco's zone-based policy firewall using CLI are defined as: 1) create security zones, 2) define traffic classes with class-maps, 3) create policy maps to apply actions, and 4) apply policies to zone pairs and assign interfaces to zones.
This document provides instructions for a lesson on securing network devices. It discusses concepts like router hardening, secure administrative access, and network monitoring techniques. It also outlines objectives like configuring a secure network perimeter and demonstrating secure router administration access. Finally, it provides details on implementing security features like banners, SSH, privilege levels, role-based CLI access, resilient configuration, and password recovery procedures.
This document discusses securing Cisco routers. It covers topics like securing physical and remote access to routers, configuring administrative roles and views, and monitoring router activity. Some key points include assigning privilege levels to restrict commands, creating CLI views to control command access for different user roles, and using login features like quiet mode, block lists, and banners to restrict failed login attempts. The document provides examples of securing routers by configuring services like SSH and encrypting passwords.
This document discusses authentication, authorization, and accounting (AAA) security on Cisco devices. It provides an overview of authentication methods including password-only, local database, and remote access. It also covers the configuration of AAA features such as usernames, passwords, and authentication.
This document provides an overview of authentication, authorization, and accounting (AAA) and describes how to implement AAA using local and remote methods. It discusses the importance of AAA and covers topics like local and server-based authentication, TACACS+ and RADIUS protocols, AAA authorization and accounting. The document also provides instructions for configuring AAA on Cisco routers using both the command-line interface and Security Device Manager.
CCNA Security 05- securing the management planeAhmed Habib
The document discusses securing the management plane of routers. It describes different perimeter security implementations like single router, defense-in-depth, and DMZ approaches. It also covers securing the physical router, operating system, and hardening the router. The document discusses configuring SSH and optional SSH commands. It describes connecting to routers via SSH and shows privilege levels, role-based CLI access, views and superviews. Other topics covered include resilient configuration, preventing password recovery, syslog, Cisco AutoSecure and associated commands.
The document discusses securing the management plane of Cisco routers. It describes 9 steps to secure the management plane: 1) follow a router security policy, 2) secure physical access, 3) use strong encrypted passwords, 4) control access to the router, 5) secure management access using AAA, 6) use secure management protocols like SSH, 7) implement system logging, 8) backup configurations periodically, and 9) disable unneeded services. It also discusses authenticating users locally and with RADIUS/TACACS+ servers.
This document provides an overview of securing network devices by configuring router hardening, secure administrative access, and network monitoring techniques. It discusses topics like configuring a secure network perimeter, securing router administration access, enhancing security for virtual logins, and configuring an SSH daemon for secure remote management. The document also covers securing the Cisco IOS image and configuration files using the resilient configuration feature.
This document provides an overview of firewall fundamentals and Cisco firewall solutions. It discusses the basics of standard and extended ACLs, stateful packet inspection, and zone-based policy firewalls. The key steps to configure Cisco's zone-based policy firewall using CLI are defined as: 1) create security zones, 2) define traffic classes with class-maps, 3) create policy maps to apply actions, and 4) apply policies to zone pairs and assign interfaces to zones.
This document provides an overview of authentication, authorization, and accounting (AAA) and describes how to configure AAA using local and server-based methods. It covers the purpose and components of AAA, including authentication, authorization, and accounting. It also describes how to configure local AAA authentication using the command line interface or Security Device Manager and how to troubleshoot local AAA. Finally, it introduces server-based AAA, comparing it to local AAA, and provides an overview of the TACACS+ and RADIUS protocols used for server-based AAA communication.
This document covers securing network devices in Chapter 2 of the CCNA Security v2.0 course. It discusses securing device access through authentication, authorization, and monitoring. Specific topics include configuring secure administrative roles, using SSH for remote access, implementing automated security features like ACLs, and securing the control plane.
This document outlines a lesson plan for securing the local area network. It covers major concepts like endpoint vulnerabilities and protection methods, Catalyst switch security features like port security and storm control. The objectives are to describe endpoint, wireless, VoIP and SAN security and how technologies like Cisco NAC, IronPort, Security Agent and switch hardening features ensure security. Attack methods like MAC spoofing, table overflow and their mitigations are discussed.
This chapter discusses building and managing a small network. It covers network design including common devices, protocols, and applications used. It also discusses network security threats and mitigation techniques, using commands like ping, traceroute, and show commands to evaluate performance, and applying troubleshooting methodologies to resolve issues like interface, IP addressing, and DNS problems. The goal is to explain how a small network operates and can later scale to become part of a larger network infrastructure.
The document outlines a 12-step program for developing network security strategies. It discusses identifying network assets and security risks, analyzing security requirements and tradeoffs, developing a security plan and policy, implementing technical security strategies, and maintaining security. It also covers securing different parts of the network like internet connections, servers, remote access, services, and wireless networks using mechanisms like firewalls, authentication, encryption, and wireless security protocols.
This document provides instructions on configuring network devices using Cisco IOS software. It covers topics such as navigating the Cisco IOS command line interface, setting hostnames and passwords, saving configurations, assigning IP addresses, and testing connectivity. The document is divided into several sections that explain how to initially access Cisco devices, secure device access, configure basic settings like IP addressing, and verify connectivity between devices on the network.
The document discusses Cisco IOS, the operating system used on Cisco networking devices. It covers topics such as IOS modes of operation including user EXEC and privileged EXEC modes, configuration files, and methods of accessing the IOS command-line interface including console, Telnet, SSH, and AUX ports. Learning objectives are provided for a chapter on configuring and testing networks.
This document provides an overview of the features and content covered in Module 2: Basic Switch and End Device Configuration. The module objectives are to implement initial settings including passwords, IP addressing, and default gateway parameters on a network switch and end devices. The module covers topics such as Cisco IOS access, IOS navigation, the command structure, basic device configuration, saving configurations, ports and addresses, configuring IP addressing, and verifying connectivity. Interactive features like animations, videos, quizzes and labs are included to help learners understand the concepts.
This document provides information about implementing firewall technologies in Cisco devices. It includes details on configuring and applying access control lists (ACLs) using both the command line interface and the Security Device Manager. Standard and extended ACLs are described, as well as techniques such as reflexive ACLs, dynamic ACLs, time-based ACLs, and Context-Based Access Control. The document provides configuration examples and guidelines for applying different types of ACLs in network devices.
This chapter discusses campus network security and focuses on security features for Cisco switches including port security, storm control, DHCP snooping, IP Source Guard, dynamic ARP inspection, securing VLAN trunks, and private VLANs. It provides an overview of common switch security issues like MAC flooding attacks, VLAN hopping, spoofing attacks, and vulnerabilities in protocols like CDP, SSH, and Telnet. The document emphasizes the importance of enabling security features by default and implementing layers of security to protect the campus network.
This document summarizes Chapter Three of the CCNA Security curriculum, which covers authentication, authorization, and accounting (AAA). It discusses local authentication using passwords and a local user database. It then introduces the AAA framework and describes how remote authentication can be implemented using the RADIUS and TACACS+ protocols. The objectives cover configuring and troubleshooting AAA locally and with external servers.
This document provides instructions for securing network devices, including securing administrative access, implementing device hardening, and implementing traffic filtering. It discusses securing access to the device through the console port, VTY lines, and auxiliary port by configuring login passwords. It also recommends encrypting all passwords, configuring session timeouts, implementing access levels for administrators, and configuring warning banners. For the management plane, it suggests securing protocols like SNMP, SSH, and disabling unneeded services. Device hardening includes securing the management, control, and data planes through password policies and encryption. Traffic filtering can be implemented through access control lists.
The document discusses router configurations, including accessing the router through the command line interface, different command modes like user EXEC and privileged EXEC, and basic router configurations like setting the hostname, enabling IP on interfaces, and verifying interface settings. It provides instructions on securing device access with passwords, saving configuration files, and documenting network addressing.
This document contains questions about router security configuration and concepts. It covers topics like AAA configuration, SSH, SNMP, SDM wizards, and Cisco IOS resilience features. The questions ask about commands, default settings, and characteristics related to securing and hardening a Cisco router.
The document discusses several ways to secure network devices like routers. It recommends:
1) Physically securing devices in a locked room and having backup power and components;
2) Using the latest stable operating system version and keeping backups; and
3) Restricting access to devices through secure passwords, login timeouts, and disabling unused ports and services.
300 101 Dumps - Implementing Cisco IP RoutingSara Rock
Braindumpskey gives a free demo of Cisco 300-101 exam. 300-101 exam is also known as Implementing Cisco IP Routing. With the complete collection of questions & answers, Braindumpskey has gathered to take you through Cisco 300-101 dumps Answers for your Exam training. In this Cisco package, we have organized actual exam questions with their solutions so that you can prepare and pass the exam in your first try. If you are troubled about your Cisco 300-101 exam & you are not prepared so, now you don't need to take any pressure about it. Now get through us most updated 300-101 braindumps with 100% authentic answers.
Complete File Link:
http://braindumpskey.com/exam/300-101.html
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
This document provides an overview of authentication, authorization, and accounting (AAA) and describes how to configure AAA using local and server-based methods. It covers the purpose and components of AAA, including authentication, authorization, and accounting. It also describes how to configure local AAA authentication using the command line interface or Security Device Manager and how to troubleshoot local AAA. Finally, it introduces server-based AAA, comparing it to local AAA, and provides an overview of the TACACS+ and RADIUS protocols used for server-based AAA communication.
This document covers securing network devices in Chapter 2 of the CCNA Security v2.0 course. It discusses securing device access through authentication, authorization, and monitoring. Specific topics include configuring secure administrative roles, using SSH for remote access, implementing automated security features like ACLs, and securing the control plane.
This document outlines a lesson plan for securing the local area network. It covers major concepts like endpoint vulnerabilities and protection methods, Catalyst switch security features like port security and storm control. The objectives are to describe endpoint, wireless, VoIP and SAN security and how technologies like Cisco NAC, IronPort, Security Agent and switch hardening features ensure security. Attack methods like MAC spoofing, table overflow and their mitigations are discussed.
This chapter discusses building and managing a small network. It covers network design including common devices, protocols, and applications used. It also discusses network security threats and mitigation techniques, using commands like ping, traceroute, and show commands to evaluate performance, and applying troubleshooting methodologies to resolve issues like interface, IP addressing, and DNS problems. The goal is to explain how a small network operates and can later scale to become part of a larger network infrastructure.
The document outlines a 12-step program for developing network security strategies. It discusses identifying network assets and security risks, analyzing security requirements and tradeoffs, developing a security plan and policy, implementing technical security strategies, and maintaining security. It also covers securing different parts of the network like internet connections, servers, remote access, services, and wireless networks using mechanisms like firewalls, authentication, encryption, and wireless security protocols.
This document provides instructions on configuring network devices using Cisco IOS software. It covers topics such as navigating the Cisco IOS command line interface, setting hostnames and passwords, saving configurations, assigning IP addresses, and testing connectivity. The document is divided into several sections that explain how to initially access Cisco devices, secure device access, configure basic settings like IP addressing, and verify connectivity between devices on the network.
The document discusses Cisco IOS, the operating system used on Cisco networking devices. It covers topics such as IOS modes of operation including user EXEC and privileged EXEC modes, configuration files, and methods of accessing the IOS command-line interface including console, Telnet, SSH, and AUX ports. Learning objectives are provided for a chapter on configuring and testing networks.
This document provides an overview of the features and content covered in Module 2: Basic Switch and End Device Configuration. The module objectives are to implement initial settings including passwords, IP addressing, and default gateway parameters on a network switch and end devices. The module covers topics such as Cisco IOS access, IOS navigation, the command structure, basic device configuration, saving configurations, ports and addresses, configuring IP addressing, and verifying connectivity. Interactive features like animations, videos, quizzes and labs are included to help learners understand the concepts.
This document provides information about implementing firewall technologies in Cisco devices. It includes details on configuring and applying access control lists (ACLs) using both the command line interface and the Security Device Manager. Standard and extended ACLs are described, as well as techniques such as reflexive ACLs, dynamic ACLs, time-based ACLs, and Context-Based Access Control. The document provides configuration examples and guidelines for applying different types of ACLs in network devices.
This chapter discusses campus network security and focuses on security features for Cisco switches including port security, storm control, DHCP snooping, IP Source Guard, dynamic ARP inspection, securing VLAN trunks, and private VLANs. It provides an overview of common switch security issues like MAC flooding attacks, VLAN hopping, spoofing attacks, and vulnerabilities in protocols like CDP, SSH, and Telnet. The document emphasizes the importance of enabling security features by default and implementing layers of security to protect the campus network.
This document summarizes Chapter Three of the CCNA Security curriculum, which covers authentication, authorization, and accounting (AAA). It discusses local authentication using passwords and a local user database. It then introduces the AAA framework and describes how remote authentication can be implemented using the RADIUS and TACACS+ protocols. The objectives cover configuring and troubleshooting AAA locally and with external servers.
This document provides instructions for securing network devices, including securing administrative access, implementing device hardening, and implementing traffic filtering. It discusses securing access to the device through the console port, VTY lines, and auxiliary port by configuring login passwords. It also recommends encrypting all passwords, configuring session timeouts, implementing access levels for administrators, and configuring warning banners. For the management plane, it suggests securing protocols like SNMP, SSH, and disabling unneeded services. Device hardening includes securing the management, control, and data planes through password policies and encryption. Traffic filtering can be implemented through access control lists.
The document discusses router configurations, including accessing the router through the command line interface, different command modes like user EXEC and privileged EXEC, and basic router configurations like setting the hostname, enabling IP on interfaces, and verifying interface settings. It provides instructions on securing device access with passwords, saving configuration files, and documenting network addressing.
This document contains questions about router security configuration and concepts. It covers topics like AAA configuration, SSH, SNMP, SDM wizards, and Cisco IOS resilience features. The questions ask about commands, default settings, and characteristics related to securing and hardening a Cisco router.
The document discusses several ways to secure network devices like routers. It recommends:
1) Physically securing devices in a locked room and having backup power and components;
2) Using the latest stable operating system version and keeping backups; and
3) Restricting access to devices through secure passwords, login timeouts, and disabling unused ports and services.
300 101 Dumps - Implementing Cisco IP RoutingSara Rock
Braindumpskey gives a free demo of Cisco 300-101 exam. 300-101 exam is also known as Implementing Cisco IP Routing. With the complete collection of questions & answers, Braindumpskey has gathered to take you through Cisco 300-101 dumps Answers for your Exam training. In this Cisco package, we have organized actual exam questions with their solutions so that you can prepare and pass the exam in your first try. If you are troubled about your Cisco 300-101 exam & you are not prepared so, now you don't need to take any pressure about it. Now get through us most updated 300-101 braindumps with 100% authentic answers.
Complete File Link:
http://braindumpskey.com/exam/300-101.html
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.