SlideShare a Scribd company logo
INFORMATION SECURITY
Submitted
to Prof. Sandeep Ponde
By
Suraj
Shweta
Shreesha
Khusboo
Pooja
Pradeep
Contents
 Information Security

-Concept
Principles of Information Security
-Confidentiality
-Integrity
-Availability
 Types of threats
 Types of Risks
Information Security
 Information security means protecting

information and information systems from
unauthorized access, use, disclosure,
disruption, modification or destruction.
Need of Information Security
 Why

 For Managing Information System
performance and security
 How
 Controls
Information Security
Attributes
Principles of Information
security
Principles

Confidentiality
Preventing
Disclosure of
Information to
Unauthorized
Users

Integrity
To ensure that
information will
not change when
transmitted

Availability
Data is
accessible to
Authorized
Users when
they need it
Controls
 Control is a constraint applied to a system to

ensure proper use and security standards.
 To minimise errors, fraud and destruction

Categories
Controls

Common

Information
System

Procedural

Facility
Common controls

• Free from bugs
• Handle unforeseen
situations

• To protect against
loss of data caused
by- natural disasters,
computer virus or
human errors

Robustness

Back up

• Access to Authorised
users

Access
control
Common controls
• A single entry is
recorded in
different files for
different
purposes

• Documenting
facts like who,
what, which
transactions by
whose Approval

Atomic
transactions

Audit trial
Information System Controls

Input

Processing

Output

Controls:

Controls

Controls

• Encryption
• Data Entry Screens
• Error Signals
• Control totals

• Software
• Hardware
• Firewalls
• Check Points

• Encryption
• Control totals
• Control Listings
• End user feedback

Storage

Controls:
Encryption
Library Procedures
Database
administration
Processing Controls
Processing
Controls

Hardware Controls

Special Checks built into hardware
to verify the accuracy of computer
processing

Software Controls

Ensure that the right Data are
being processed
Hardware Controls
•Malfunction Detection

Circuit
•Redundant

Components
•(multiple read write
heads on magnetic tape
and disk)

•Special Purpose

microprocessors and
associated circuitry
•To support remote and

diagnostic maintenance
Software Controls
 E.g. The operating system or other software

checks the internal file labels at the beginning
and end of magnetic disk and tape files.
 Establishments of checkpoints during the

processing of a program
Storage Controls
Files of Computer
Program,
organizational
database

Data centre
specialists,
database
administrators
For maintenance and
controlling access to the
program libraries and
databases of the organization
Storage Controls
Database & File
Protection
Operation systems or security
monitors protect the
databases of real-time
processing systems

Unauthorised or
accidental use by
security programgs
Account codes, passwords
and other security codes
Used to allow access to
authorised users only with the
help of digital Catalog
Facility Controls
 Facility controls are methods that protect an

organizations computing and network
facilities and their contents from loss or
destruction.
Facility
Controls

Network
Security

Physical
Protection

Biometric
Controls

Computer
failure
Facility Controls
Network Security

Security may be provided by specialised system
software packages ‘System Security
Monitors’
Facility Controls
Physical Protection Controls
 Includes
 Door locks
 Burglar alarms

 Closed circuit TV,
 Fire detectors and extinguishers
 Dust controls
Facility Controls
Biometric Controls
 It is an automated method of verifying the
identify of a person, based on physiological or
behavioural characteristics.
 E.g., Photo of face, Fingerprints etc.
Facility Controls
Computer Failure Controls
 The information services department takes
steps to prevent computer failure.
 Computer with maintenance capability are
brought in. Hardware and software changes
are carefully made
Threats to Information
security
Threats

Human Errors

E.g. Design of H/W
& of Information
Sys.

Environmental Hazards

E.g. Earthquakes,
Floods,
Tornado
Smoke, heat ETC.

Computer Crimes

Computer Abuse
- Crime in which
computer is based
as tool.
Risks to Information
security

Risks

Hardware

Application & Data

Online Operations
Conclusion
“It used to be expensive to make things public
and cheap to make them private. Now it’s
expensive to make things private and cheap
to make them public.” — Clay Shirky, Internet
scholar and professor at N.Y.U.
DANKE
Thank You 

More Related Content

What's hot

Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
Kudzi Chikwatu
 
It security
It securityIt security
It security
avi2607
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
Dr. Rosemarie Sibbaluca-Guirre
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
lalithambiga kamaraj
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
Dr. Rosemarie Sibbaluca-Guirre
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
Jorge Sebastiao
 
3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data
QATestLab
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
Dhani Ahmad
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
Pallavi Agarwal
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
AaDi Malik
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
 
Security and management
Security and managementSecurity and management
Security and management
ArtiSolanki5
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
Vishal Patyal
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
ANAND MURALI
 

What's hot (19)

Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
It security
It securityIt security
It security
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data3 Characteristics of Well Protected Data
3 Characteristics of Well Protected Data
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Security and management
Security and managementSecurity and management
Security and management
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 

Viewers also liked

Tepco’s fukushima a nuclear alarm!!
Tepco’s fukushima a nuclear alarm!!Tepco’s fukushima a nuclear alarm!!
Tepco’s fukushima a nuclear alarm!!Suraj Vaidya
 
20120406183244644
2012040618324464420120406183244644
20120406183244644Mantosh Gpt
 
The Totyota Way, Principles of japanese manufuacturing philosophy
The Totyota Way, Principles of japanese manufuacturing philosophyThe Totyota Way, Principles of japanese manufuacturing philosophy
The Totyota Way, Principles of japanese manufuacturing philosophySuraj Vaidya
 

Viewers also liked (8)

Final fit presentation
Final fit presentationFinal fit presentation
Final fit presentation
 
Sekelumit tentang proposal
Sekelumit tentang proposalSekelumit tentang proposal
Sekelumit tentang proposal
 
Tepco’s fukushima a nuclear alarm!!
Tepco’s fukushima a nuclear alarm!!Tepco’s fukushima a nuclear alarm!!
Tepco’s fukushima a nuclear alarm!!
 
Strongbow
StrongbowStrongbow
Strongbow
 
Rihrih
RihrihRihrih
Rihrih
 
Bpr presentation
Bpr presentationBpr presentation
Bpr presentation
 
20120406183244644
2012040618324464420120406183244644
20120406183244644
 
The Totyota Way, Principles of japanese manufuacturing philosophy
The Totyota Way, Principles of japanese manufuacturing philosophyThe Totyota Way, Principles of japanese manufuacturing philosophy
The Totyota Way, Principles of japanese manufuacturing philosophy
 

Similar to Mis presentation by suraj vaidya

28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
marbimon
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
Kimarie Brown
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
Mohammad Abdul Matin Emon
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
Nawanan Theera-Ampornpunt
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
techuniverso01
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
Database security
Database securityDatabase security
Database security
afzaalkhalid1
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
Haseeb Ahmed Awan
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
Waseelsultan
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
bagotjesusa
 
Data security
Data securityData security
Data security
AbdulBasit938
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
Sudeb Das
 
47890finalpresentation-180407201958.pptx
47890finalpresentation-180407201958.pptx47890finalpresentation-180407201958.pptx
47890finalpresentation-180407201958.pptx
NareenAsad
 

Similar to Mis presentation by suraj vaidya (20)

28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
 
Overview
OverviewOverview
Overview
 
Unit v
Unit vUnit v
Unit v
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Database security
Database securityDatabase security
Database security
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
 
Data security
Data securityData security
Data security
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
 
47890finalpresentation-180407201958.pptx
47890finalpresentation-180407201958.pptx47890finalpresentation-180407201958.pptx
47890finalpresentation-180407201958.pptx
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Mis presentation by suraj vaidya