Queste slide sono state presentate all'Evento "Banche e Sicurezza 2015" e descrivono come utilizzare il modulo di sicurezza di Sentinet3 per monitorare la superficie di attacco di una infrastruttura IT
CisCon 2018 - [LAB] Conosci il tuo nemico: il punto di vista di un attackerAreaNetworking.it
Relatore: Rocco Sicilia, Ethical Hacker in Versivo
L’attuale contesto storico e la capillarità tecnologica ci impone di approcciare il cyber-spazio come fosse un vero e proprio campo di battaglia.
Non è per nulla folle rifarsi a concetti peculiari del mondo «militare»; Sun Tzu, stratega militare cinese, insegnava che “chi conosce il proprio nemico e conosce se stesso potrà affrontare senza timore cento battaglie”. L’aforisma risulta oggi quanto mai calzante se rapportato ad uno tra i più efficaci approcci alla cyber security dove la strategia di difesa viene costruita attorno alla reale esposizione al rischio della propria azienda.
Nel corso del nostro intervento approfondiremo cosa significa conoscere il «proprio nemico», cosa significa osservare un’azienda dal punto di vista dell’Attacker e su queste evidenze costruiremo la più appropriata strategia di difesa.
The document discusses the potential for universities and research in Second Life. It provides data on Second Life usage trends over time and by demographic group. It then lists over 50 examples of universities, research centers, and other organizations that have a presence in Second Life. It argues that Second Life allows for new forms of collaboration and education between institutions. Being in-world can foster real-world collaboration and impact individuals and institutions. However, the social aspects of Second Life are inseparable from research and study activities, making it an interesting area for sociological and pedagogical analysis.
Queste slide sono state presentate all'Evento "Banche e Sicurezza 2015" e descrivono come utilizzare il modulo di sicurezza di Sentinet3 per monitorare la superficie di attacco di una infrastruttura IT
CisCon 2018 - [LAB] Conosci il tuo nemico: il punto di vista di un attackerAreaNetworking.it
Relatore: Rocco Sicilia, Ethical Hacker in Versivo
L’attuale contesto storico e la capillarità tecnologica ci impone di approcciare il cyber-spazio come fosse un vero e proprio campo di battaglia.
Non è per nulla folle rifarsi a concetti peculiari del mondo «militare»; Sun Tzu, stratega militare cinese, insegnava che “chi conosce il proprio nemico e conosce se stesso potrà affrontare senza timore cento battaglie”. L’aforisma risulta oggi quanto mai calzante se rapportato ad uno tra i più efficaci approcci alla cyber security dove la strategia di difesa viene costruita attorno alla reale esposizione al rischio della propria azienda.
Nel corso del nostro intervento approfondiremo cosa significa conoscere il «proprio nemico», cosa significa osservare un’azienda dal punto di vista dell’Attacker e su queste evidenze costruiremo la più appropriata strategia di difesa.
The document discusses the potential for universities and research in Second Life. It provides data on Second Life usage trends over time and by demographic group. It then lists over 50 examples of universities, research centers, and other organizations that have a presence in Second Life. It argues that Second Life allows for new forms of collaboration and education between institutions. Being in-world can foster real-world collaboration and impact individuals and institutions. However, the social aspects of Second Life are inseparable from research and study activities, making it an interesting area for sociological and pedagogical analysis.
Streamlining the Quota Process for a World-Class Sales OrganizationCallidus Software
Jim Parker discusses streamlining Novell's quota setting process. Novell is a global infrastructure software company with $1 billion in annual revenue. Previously, Novell's quota setting process was inefficient, inflexible, and inconsistent, involving 50 people over 4-5 months. Novell implemented a new centralized process using the TrueQuota software system. This standardized the methodology, provided automated linkages between quotas, and reduced the Americas process to under a week. The new process and system improved accuracy, flexibility, and management visibility into quotas.
Presentatie bij de Workshop "Het Voordeel van de Twijfel" o phet congres Systemisch Werken, 30 mei 2015 te Baarn. In eendrachtige samenwerking met Larissa Verbeek
Networking: New Capabilities for Amazon Virtual Private CloudAmazon Web Services
This document summarizes a presentation about new capabilities for Amazon Virtual Private Cloud (VPC). It discusses VPC endpoints which allow resources within a VPC private access to AWS services like S3 without use of internet gateways. It also covers VPC Flow Logs, which provide network traffic logs similar to Netflow to increase visibility of traffic permitted or denied within a VPC by security groups and network access control lists. The presentation provides examples of how to configure rich security controls for VPC endpoints and S3 buckets using IAM policies, VPC endpoint policies, and S3 bucket policies.
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014Jeremy Fuksa
As responsive design and progressive enhancement become mainstream design practices, the decades old approach of using Adobe Photoshop to comp up page designs for clients is becoming increasingly irrelevant. A quick search online shows designers quickly clamoring for a better way to do their work.
Along with new tools to learn, there’s also the challenge of acclimating a client base that has been used to seeing fully-rendered Photoshop designs for decades. How do these new practices benefit them?
This presentation looks at some “post-Photoshop” design practices and how they might fit into a designer’s workflow. Additionally, Jeremy will share how a new design workflow has worked for his team at Clickfarm and how clients have received this new way of looking at their projects.
The document discusses territorial living labs, which integrate the living lab approach into a territory and its citizens, governance, and strategic plans. Territorial living labs were discussed at ENoLL-World Bank meetings in February 2012. Examples of territorial living labs presented included ones in Sicily, Italy focused on citizen involvement in strategic planning, and the MedLab project model involving regional policy frameworks, ICT platforms, local authorities, citizens, and businesses in multi-level governance. Pilot experiments in various European regions applied the living labs approach to issues like rural ICT services, coastal environment monitoring, and sustainable tourism.
The author has been working hard cleaning up their garden by removing weeds and fallen autumn leaves. After clearing the area and adding compost, it is time to make rows to plant seeds. They have already planted many lettuces which seem to be taking root. The garden is watered weekly. Soon they will be able to harvest the lettuces, so they are preparing bags. They are excited for the produce.
Flüchtige Macht? YouTube im Kreuzfeuer - Facebook & Co greifen an #rp15 #mcb15Bertram Gugel
Spannende Zeiten auf dem Online-Video-Markt. Neue Konkurrenten fordern den Platzhirsch YouTube heraus: Vine, Twitch und YouNow bieten Features und Darstellungsformen, die auf YouTube kaum bedient werden. Facebook löst das Discovery-Problem. Snapchat erlaubt flüchtige Videos, Vessel lockt mit Premium-Umfeldern, und Twitter hat die direkte Verknüpfung ins Fernsehen. Alle diese Plattformen brauchen Inhalte, Geschichten und Stars. So kommt Bewegung in den Markt. Schien YouTube vor einem Jahr noch uneinholbar, verliert die Plattform gerade an Strahlkraft und damit an Macht. Ein Überblick der Plattformen von Bertram Gugel bei mabb @ Media Convention / re:poublica am 6.5.2015.
Digital presentations are increasingly important within schools. "Death by PowerPoint" is also common in schools. Technology and graphic design are famously neutral. It is people that are boring! It is time to reflect on our use of digital presentations and perhaps explore different approaches. It is also time to give some consideration to the design of the individual slides and the most effective ways of getting our message across. Enjoy!
If you are a geography teacher and you have the time, please consider filling in the questionnaire which accompanies this presentation and return it to alandohertyuk@yahoo.co.uk. Much appreciated. Thanks!
AVANET Seminar - Digitale Collectie Nederland & EUscreenGeert Wissink
Een overzicht van het Europeana platform, de manieren om binnen Nederland content aan te bieden, uitleg over Linked Open Data en een korte beschrijving van het project EUscreen
(1) Current knowledge sharing tools have evolved from traditional top-down Web 1.0 sites to more collaborative Web 2.0 sites where information is shared bidirectionally and content is continually updated by users.
(2) Popular collaboration tools include wikis, blogs, social networks, and enterprise platforms like SharePoint that facilitate team communication and knowledge sharing.
(3) To solve information problems, organizations should identify information-sharing roles, investigate social software solutions, and encourage hands-on use of collaborative tools.
The document outlines a damage control plan for the Leicestershire Police following public outrage over corruption issues. The plan aims to increase trust by educating the public on review actions, strengthening the force's image through awareness of reforms, and reeducating departments on ethics. Tactics include press statements, public announcements by the Chief of Police, and open meetings. Progress will be evaluated through private research firm reports and public opinion polls.
Surface computing is an interface that replaces the traditional GUI with touch-sensitive surfaces that allow users to interact directly using their hands and fingers instead of mice or keyboards. Microsoft Surface is one example of this technology, featuring a flat computing table where people can interact with devices by placing them on the surface. Potential uses include browsing menus at restaurants, paying bills, downloading content to phones, and organizing media collections using touch interactions on surfaces instead of traditional inputs.
Streamlining the Quota Process for a World-Class Sales OrganizationCallidus Software
Jim Parker discusses streamlining Novell's quota setting process. Novell is a global infrastructure software company with $1 billion in annual revenue. Previously, Novell's quota setting process was inefficient, inflexible, and inconsistent, involving 50 people over 4-5 months. Novell implemented a new centralized process using the TrueQuota software system. This standardized the methodology, provided automated linkages between quotas, and reduced the Americas process to under a week. The new process and system improved accuracy, flexibility, and management visibility into quotas.
Presentatie bij de Workshop "Het Voordeel van de Twijfel" o phet congres Systemisch Werken, 30 mei 2015 te Baarn. In eendrachtige samenwerking met Larissa Verbeek
Networking: New Capabilities for Amazon Virtual Private CloudAmazon Web Services
This document summarizes a presentation about new capabilities for Amazon Virtual Private Cloud (VPC). It discusses VPC endpoints which allow resources within a VPC private access to AWS services like S3 without use of internet gateways. It also covers VPC Flow Logs, which provide network traffic logs similar to Netflow to increase visibility of traffic permitted or denied within a VPC by security groups and network access control lists. The presentation provides examples of how to configure rich security controls for VPC endpoints and S3 buckets using IAM policies, VPC endpoint policies, and S3 bucket policies.
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014Jeremy Fuksa
As responsive design and progressive enhancement become mainstream design practices, the decades old approach of using Adobe Photoshop to comp up page designs for clients is becoming increasingly irrelevant. A quick search online shows designers quickly clamoring for a better way to do their work.
Along with new tools to learn, there’s also the challenge of acclimating a client base that has been used to seeing fully-rendered Photoshop designs for decades. How do these new practices benefit them?
This presentation looks at some “post-Photoshop” design practices and how they might fit into a designer’s workflow. Additionally, Jeremy will share how a new design workflow has worked for his team at Clickfarm and how clients have received this new way of looking at their projects.
The document discusses territorial living labs, which integrate the living lab approach into a territory and its citizens, governance, and strategic plans. Territorial living labs were discussed at ENoLL-World Bank meetings in February 2012. Examples of territorial living labs presented included ones in Sicily, Italy focused on citizen involvement in strategic planning, and the MedLab project model involving regional policy frameworks, ICT platforms, local authorities, citizens, and businesses in multi-level governance. Pilot experiments in various European regions applied the living labs approach to issues like rural ICT services, coastal environment monitoring, and sustainable tourism.
The author has been working hard cleaning up their garden by removing weeds and fallen autumn leaves. After clearing the area and adding compost, it is time to make rows to plant seeds. They have already planted many lettuces which seem to be taking root. The garden is watered weekly. Soon they will be able to harvest the lettuces, so they are preparing bags. They are excited for the produce.
Flüchtige Macht? YouTube im Kreuzfeuer - Facebook & Co greifen an #rp15 #mcb15Bertram Gugel
Spannende Zeiten auf dem Online-Video-Markt. Neue Konkurrenten fordern den Platzhirsch YouTube heraus: Vine, Twitch und YouNow bieten Features und Darstellungsformen, die auf YouTube kaum bedient werden. Facebook löst das Discovery-Problem. Snapchat erlaubt flüchtige Videos, Vessel lockt mit Premium-Umfeldern, und Twitter hat die direkte Verknüpfung ins Fernsehen. Alle diese Plattformen brauchen Inhalte, Geschichten und Stars. So kommt Bewegung in den Markt. Schien YouTube vor einem Jahr noch uneinholbar, verliert die Plattform gerade an Strahlkraft und damit an Macht. Ein Überblick der Plattformen von Bertram Gugel bei mabb @ Media Convention / re:poublica am 6.5.2015.
Digital presentations are increasingly important within schools. "Death by PowerPoint" is also common in schools. Technology and graphic design are famously neutral. It is people that are boring! It is time to reflect on our use of digital presentations and perhaps explore different approaches. It is also time to give some consideration to the design of the individual slides and the most effective ways of getting our message across. Enjoy!
If you are a geography teacher and you have the time, please consider filling in the questionnaire which accompanies this presentation and return it to alandohertyuk@yahoo.co.uk. Much appreciated. Thanks!
AVANET Seminar - Digitale Collectie Nederland & EUscreenGeert Wissink
Een overzicht van het Europeana platform, de manieren om binnen Nederland content aan te bieden, uitleg over Linked Open Data en een korte beschrijving van het project EUscreen
(1) Current knowledge sharing tools have evolved from traditional top-down Web 1.0 sites to more collaborative Web 2.0 sites where information is shared bidirectionally and content is continually updated by users.
(2) Popular collaboration tools include wikis, blogs, social networks, and enterprise platforms like SharePoint that facilitate team communication and knowledge sharing.
(3) To solve information problems, organizations should identify information-sharing roles, investigate social software solutions, and encourage hands-on use of collaborative tools.
The document outlines a damage control plan for the Leicestershire Police following public outrage over corruption issues. The plan aims to increase trust by educating the public on review actions, strengthening the force's image through awareness of reforms, and reeducating departments on ethics. Tactics include press statements, public announcements by the Chief of Police, and open meetings. Progress will be evaluated through private research firm reports and public opinion polls.
Surface computing is an interface that replaces the traditional GUI with touch-sensitive surfaces that allow users to interact directly using their hands and fingers instead of mice or keyboards. Microsoft Surface is one example of this technology, featuring a flat computing table where people can interact with devices by placing them on the surface. Potential uses include browsing menus at restaurants, paying bills, downloading content to phones, and organizing media collections using touch interactions on surfaces instead of traditional inputs.
Intellisystem Technologies: Soluzioni hi tech per la telemedicina e la telere...Cristian Randieri PhD
Telerefertazione Radiografica
L’idea base:
..considerando il fatto che la digitalizzazione ed invio di una radiografia implica il possesso di macchinari costosi con un tempo di trasmissione delle immagini a mezzo Internet non indifferente..
Perché non pensare ad una soluzione in grado di “Navigare” all’interno di una radiografia con la possibilità di scorgerne e fotografarne i particolari ?..
Project Management & Industrial Cyber Security (ICS) by Enzo M. TieghiEnzo M. Tieghi
Why and How should You include Industrial Cyber Security among the topics to be covered during the definition of an industrial or infrastructural Project?
In Aziende medio grandi, con centinaia di postazioni di lavoro, dispositivi mobile e server in cloud e on premises, la Digital Forensics e soprattutto l’approccio DFIR sono strumenti fondamentali per gestire in efficienza ed efficacia situazioni di incident handling come data breach o violazione dei sistemi, ma anche per la gestione di indagini e investigazioni informatiche aziendali per la tutela del patrimonio aziendale: proprietà intellettuale, protezione dati, dipendenti infedeli, furti di informazioni riservate; inoltre processi e strumenti della DF e della DFIR possono essere usati proficuamente per Audit di sicurezza in ambito ISO, Dlgs 231/01, GDPR, COBIT, etc.. garantendo una raccolta delle prove di tipo "forense".
Velociraptor e AWX Ansible due strumenti open molto diversi che si usano in ambito corporate per eseguire indagini informatiche e raccogliere prove su larga scala con modalità forensi.
SCADA Cybersecurity: Sessione live di Attacco e Difesa by Lutech & Phoenix Co...Francesco Faenzi
L’avvento dell’era digitale ha portato le imprese a fronteggiare
una crescita esponenziale sia delle opportunità di sviluppo che
dei rischi e dei pericoli connessi con l’impiego delle reti.
Oggi sono pochissime le realtà industriali che conoscono bene
i diversi tipi di minaccia da cui difendersi e sono consapevoli dei rischi a cui sono esposte. Non solo: spesso le imprese produttive ritengono che la Cyber Security sia un argomento che riguarda solo altre realtà.
La crescita vertiginosa dei fenomeni di hacking registrati nell’ultimo
periodo nel mondo industriale conferma tuttavia la notevole
vulnerabilità delle aziende e i rischi per la loro produzione.
Gli obiettivi Il convegno offre alle aziende e agli operatori un’occasione di confronto sul tema “Industrial Cyber Security”, per aumentare la consapevolezza relativa ai rischi e orientarli nel percorso di implementazione delle misure necessarie a prevenire i pericoli insiti nella rete e ad ostacolare gli attacchi informatici.
Durante l’incontro saranno descritte le diverse minacce esistenti in ambito industriale, presentati gli aspetti fondamentali del Cyber Crime e proposte misure efficaci per proteggere la produttività degli impianti e la riservatezza dei dati.
Vincenzo Calabrò - Tracciabilita' delle Operazioni in Rete e Network ForensicsVincenzo Calabrò
Il 4 giugno 2011, presso il Centro Studi Informatica Giuridica di Reggio Calabria, Vincenzo Calabrò ha tenuto un seminario dal titolo: Tracciabilita' delle Operazioni in Rete e Network Forensics. Questo seminario ha come obiettivo l'analisi delle problematiche lagate alla tracciabilità delle operazioni in Rete e cenni di Network Forensics.
https://www.vincenzocalabro.it
Rossetti-Silvi, Ontologia sociale del documento giuridicoAndrea Rossetti
INFORMATICA GIURIDICA E DIRITTO DELL'INFORMATICA: ESPERIENZE NAZIONALI ED EUROPEE ALL'UNIVERSITÀ DEGLI STUDI DELL'INSUBRIA
venerdì 3 ottobre a partire dalle 9.30 presso l’Aula Magna dell’Università in Via Sant’Abbondio a Como.
Durante la giornata, dopo i saluti del Rettore dell’Università degli Studi dell’Insubria, Alberto Coen Porisini, e di Laura Castelvetri, direttore del Dipartimento di Diritto, Economia e Culture, si svolgeranno gli interventi di Gianni Penzo Doria, direttore generale dell’Università degli Studi dell'Insubria e, tra l’altro, esperto di diplomatica del documento digitale e responsabile scientifico del progetto “UniDOC”; Filippo Pappalardo, referente del Processo Telematico di Milano - Unione Lombarda Ordini Forensi; Andrea Orlandoni, referente del Processo Telematico di Como - Unione Lombarda Ordini Forensi; Francesca Ferrari, ricercatrice di diritto processuale civile all’Università degli Studi dell’Insubria; Andrea Rossetti, professore associato di Filosofia del Diritto all’Università̀ degli Studi Milano Bicocca; Marco Silvi, docente di
Davide Gabrini, Cloud computing e cloud investigationAndrea Rossetti
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Alessio Pennasilico, Cybercrime e cybersecurityAndrea Rossetti
Primo incontro del ciclo: Cybercrime, Digital Evidence e Digital Forensics - webminario organizzato da Giuseppe Vaciago per la cattedra di Informatica giuridica della Bicocca.
Francesca Bosco, Cybercrime e cybersecurity. Profili internazionaliAndrea Rossetti
Primo incontro del ciclo: Cybercrime, Digital Evidence e Digital Forensics - webminario organizzato da Giuseppe Vaciago per la cattedra di Informatica giuridica della Bicocca.
Carlo Prisco, Profili giuridici della corrispondenza elettronica
Presentazione Sicurezza Stabile
1. INFOGIURE LINUXDAY Università degli Studi di Milano 22 Maggio 2008 La Sicurezza informatica ai sensi del Decreto Legislativo 196/2003 a costo zero: utility di backup, firewall ed antivirus gratuiti dott. francesco stabile
2. Il D. Lgs. 196/2003 Prevede le “Misure di sicurezza” (art. 31) DATI: custoditi – controllati “ ...idonee e preventive misure di sicurezza...” “ ...in relazione alle conoscenze acquisite in base al progresso tecnico...” infogiure linuxday 22 maggio 2008 Università degli studi di Milano Dott. Francesco Stabile
3.
4.
5. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Antivirus - ClamWin Open Source, rilasciato sotto GPL NOTE: Non dispone di uno scanner in tempo reale http://it.clamwin.com Dott. Francesco Stabile
6. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Firewall Può essere software (i cd personal firewall ) o hardware La sua finalità è la prevenzione delle intrusioni in modo passivo, filtrando le connessioni in entrata ed in uscita dal una rete (o da un computer, in caso di firewall software) Dott. Francesco Stabile
7. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Firewall Funziona tramite regole che impongono sul traffico in ingresso ed in uscita tre diversi tipi di operazioni sui “pacchetti”: controllo monitoraggio modifica Dott. Francesco Stabile
8. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Firewall – Comodo Personal Firewall Personal firewall, la versione precedente all'attuale è gratuita per qualsiasi uso. http://personalfirewall.comodo.com NOTE: Può risultare invadente, ma è molto personalizzabile e compatibile con Windows Dott. Francesco Stabile
9. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Backup Tutte le attività di stoccaggio ridondante delle informazioni problemi hardware fattore “umano” Dott. Francesco Stabile
10. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Backup – Karen's Replicator Sincronizza cartelle tra di loro può risultare complesso da configurare regole molto flessibili Dott. Francesco Stabile http://www.karenware.com/powertools/ptreplicator.asp
11. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Backup – alternative logiche Copiare i files in un'altra posizione operazione più lunga – richiede più spazio spesso creano archivi Dott. Francesco Stabile http://www.snapbackup.com corruzione
12. infogiure linuxday 22 maggio 2008 Università degli studi di Milano Domande Dott. Francesco Stabile