A presentation discusses how data centers can prepare for a zombie apocalypse. Traditionally, data centers focus on physical and logical security to protect the confidentiality, integrity, and availability of data. However, these measures may be insufficient during a zombie outbreak. A zombie apocalypse could expose vulnerabilities if basic resources like staffing and utilities are compromised. The presentation recommends data centers strengthen their physical defenses, add redundant power and access controls, and plan for responding to crises without usual external support. Protecting against the unlikely zombie scenario highlights ways to bolster overall disaster preparedness.
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
This document discusses strategies for sourcing, verifying, and disseminating information during real-time crises using social media. It recommends identifying key social media accounts and hashtags to find initial information, then consolidating around official accounts. Verifying information requires applying skepticism, considering context, and using tools like reverse image searches to check photos. When disseminating, it is important to ensure information is still applicable and does not encourage harmful actions, and to establish organized communication channels.
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
What is Fake News, statistics related to it, tools to discover fake news,examples across countries, India scenario in the context of fake news, criticism of these tools and the effect of fake news on POTUS elections.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
The document discusses different types of media censorship including withholding information, destroying information, altering information, and self-censorship. It provides examples of each type, such as doctors withholding information from terminal patients, governments destroying information by banning media outlets, altering photos to change their meaning, and writers self-censoring due to fear of retaliation. The conclusion states that censorship has always been a part of media but now deprives people of truth and freedom of speech, raising insecurity and lack of trust among audiences.
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Gab Billones
This document discusses the rise of fake news and disinformation online. It defines different types of false information like misinformation, disinformation, and mal-information. It explains that over half of people regularly see fake news on social media. Some reasons why fake news spreads are for propaganda, website traffic/revenue, and personalized targeting in social media feeds. It provides tips for identifying fake news like checking for secure websites, URLs known for fake news, poor grammar/formatting, and excessive punctuation. Finally, it discusses ways to combat fake news like practicing news detox, engaging critically with shared content, and focusing on fact-checking authoritative sources.
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
Drawing on real-life examples and first-hand accounts of reporting on crisis situations in Eastern Europe, the first version of Plug & Play News was created in 2014 and presented at re:publica Berlin 2015 conference. Regardless of year or location, the tools and methods used to source, verify, and make critical information available to the public in real-time are applicable in similar contexts worldwide.
This document discusses strategies for sourcing, verifying, and disseminating information during real-time crises using social media. It recommends identifying key social media accounts and hashtags to find initial information, then consolidating around official accounts. Verifying information requires applying skepticism, considering context, and using tools like reverse image searches to check photos. When disseminating, it is important to ensure information is still applicable and does not encourage harmful actions, and to establish organized communication channels.
Fake news, its ramifications and tools to check this menace.Chetan Thathoo
What is Fake News, statistics related to it, tools to discover fake news,examples across countries, India scenario in the context of fake news, criticism of these tools and the effect of fake news on POTUS elections.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
The document discusses different types of media censorship including withholding information, destroying information, altering information, and self-censorship. It provides examples of each type, such as doctors withholding information from terminal patients, governments destroying information by banning media outlets, altering photos to change their meaning, and writers self-censoring due to fear of retaliation. The conclusion states that censorship has always been a part of media but now deprives people of truth and freedom of speech, raising insecurity and lack of trust among audiences.
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Gab Billones
This document discusses the rise of fake news and disinformation online. It defines different types of false information like misinformation, disinformation, and mal-information. It explains that over half of people regularly see fake news on social media. Some reasons why fake news spreads are for propaganda, website traffic/revenue, and personalized targeting in social media feeds. It provides tips for identifying fake news like checking for secure websites, URLs known for fake news, poor grammar/formatting, and excessive punctuation. Finally, it discusses ways to combat fake news like practicing news detox, engaging critically with shared content, and focusing on fact-checking authoritative sources.
El documento habla sobre los cambios culturales, sociales e individuales que han ocurrido debido a la tecnología de la información y la comunicación (TIC). Antes las personas se identificaban por la música que escuchaban o cómo bailaban, pero ahora es a través de las redes sociales. También, la comunicación ya no es a través de cartas sino mediante la TIC de manera más efectiva. La TIC permite expresarse de maneras inesperadas.
El documento contiene cuatro páginas de configuración de color para una impresora. Cada página muestra los niveles de tinta para uno de los colores principales (cian, magenta, amarillo y negro) y la fecha y hora en que se realizó la configuración.
Curso de qualificação profissional - Assistente Administrativo com InformáticaClayton de Almeida Souza
O documento apresenta um curso de qualificação profissional para assistente administrativo com informática. Apresenta o professor Clayton de Almeida Souza, suas qualificações e experiências. Detalha o conteúdo e objetivos do curso, incluindo matérias sobre administração, finanças, marketing e informática aplicadas às empresas.
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Contact us today to schedule an appointment and transform how your ride looks and feels.
El documento ofrece consejos para realizar presentaciones en diapositivas de manera efectiva, recomendando que sean breves (no más de 10 diapositivas y 20 minutos), atractivas visualmente pero sin distraer, y con texto de al menos 30 puntos. Además, enfatiza la importancia de alinear los elementos, usar títulos e imágenes claras, y hablar con un tono de voz adecuado.
Intrinsic motivation refers to doing something for its own sake rather than for some separable consequence. It is driven by an interest or enjoyment in the task itself, and exists within the individual rather than relying on external pressures or a desire for reward. Active listening is a communication technique used to improve mutual understanding and show empathy for the speaker. It involves fully concentrating on what is being said without distraction, accepting the person and their perspective without judgment, and reflecting back their feelings and ideas without inserting one's own views. These behaviors demonstrate trust, care, and support for the speaker.
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Whether you need a basic wash or a full interior-and-exterior package, trust Perfect Detailing Services for expert auto detailing that extends the life of your paint and upholstery.
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Whether you need a basic wash or a full interior-and-exterior package, trust Perfect Detailing Services for expert auto detailing that extends the life of your paint and upholstery.
Dois irmãos queriam ser pintores, mas só um poderia estudar. Um irmão trabalhou nas minas por 4 anos para pagar os estudos do outro, que se tornou um grande artista. Quando o irmão artista ofereceu pagar seus estudos, o outro disse que suas mãos foram destruídas pelo trabalho nas minas, mas ficou feliz por ter possibilitado o sonho do irmão.
La medicina basada en evidencias (MBE) utiliza las mejores pruebas disponibles para la atención de pacientes, uniendo la clínica con la epidemiología. Supone un proceso continuo de aprendizaje cuestionando experiencias clínicas no sistematizadas. Sin embargo, existen obstáculos como la falta de reconocimiento de lo que se desconoce, dificultades en la formulación de preguntas y búsqueda de información, y problemas en la aplicación de la evidencia al cuidado del paciente.
1) O homem vem desenvolvendo sua tecnologia ao longo da história por meio de descobertas e invenções como o fogo e a roda, que revolucionaram a vida humana.
2) No período Neolítico, o homem começou a cultivar plantas, domesticar animais e produzir cerâmica e instrumentos de metal, marcando avanços na agricultura e na metalurgia.
3) A escrita e a imprensa surgiram na Idade Moderna, permitindo novos desenvolvimentos nas ciências, na
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Contact us today to schedule an appointment and transform how your ride looks and feels.
This document discusses an experiment to analyze the impact of rare microbial community members on ecosystem function. The researchers maintained soil-seeded anaerobic switchgrass-degrading microcosms for over three years, isolating six novel species and genera that comprised 88-89% of 16S rDNA reads. Over 300 operational taxonomic units (OTUs) accounted for the remaining 11% and were considered rare members. The researchers rebuilt the community with only the abundant isolates and compared switchgrass degradation and fermentation products to the original whole community. Rebuilt communities outperformed in acetate production in one media but underperformed in another, showing rare members affect function but are not necessary. DNA sequencing will help understand the roles of abundant and rare
El documento describe el movimiento artístico surrealista, incluyendo sus objetivos, características y técnicas clave. Se originó en Francia en la década de 1920 impulsado por André Breton, plasmando imágenes del subconsciente y los sueños a través de técnicas como el automatismo, frottage, collage y cadáver exquisito. También presenta importantes artistas surrealistas como Dalí, Miró, Magritte y Frida Kahlo.
Este documento describe un estudio de variación y capacidad (R&R) de un sistema de medición. El estudio evaluó la repetibilidad, reproducibilidad y variación entre operadores al medir el peso de 10 unidades de un producto. Los resultados mostraron que la variación del sistema de medición representaba el 5.57% de la variación total, lo que indica que el sistema es aceptable pero marginalmente capaz de diferenciar entre partes dentro de las especificaciones.
O documento descreve um curso de Assistente Administrativo Completo oferecido pelo CEBRAc Messejana. O curso tem 180 horas de duração ao longo de 16 meses, dividido em projetos e módulos sobre administração, informática e pessoal. O objetivo é formar profissionais diferenciados e empreendedores capazes de lidar com os desafios do mercado de trabalho.
El documento describe diferentes medidas estadísticas para evaluar el riesgo y la asociación entre variables, incluyendo el riesgo absoluto, riesgo relativo, reducción del riesgo relativo, riesgo atribuible, número necesario para tratar, y odds ratio. Proporciona un ejemplo numérico para ilustrar cómo calcular estas medidas y comparar el riesgo de accidente cerebrovascular entre pacientes con y sin tratamiento para la hipertensión.
El documento describe diferentes medidas estadísticas para evaluar el riesgo y la asociación entre variables, incluyendo el riesgo absoluto, riesgo relativo, reducción del riesgo relativo, riesgo atribuible, número necesario para tratar, y odds ratio. Estas medidas se utilizan comúnmente en estudios epidemiológicos y ensayos clínicos para cuantificar el impacto de una intervención o exposición sobre los resultados.
Lighting systems and their design..mau --jmi-2014Mohd Azmatullah
An essential service in all the industries,
The power consumption by the industrial lighting varies between 2 to 10% of the total power depending on the type of industry.
Lightingisanarea,whichprovidesamajorscopetoachieveenergyefficiencyatthedesignstage,by incorporation of modern energy efficient lamps,luminaires and gears,apart from good operational practices.
Hawaii as a Group of Islands in the Pacific Ocean Essay Example .... Essay about hawaii - Get Help From Custom College Essay Writing and .... the hawaiian islands. Hawaii. From Facebook about the full meaning of aloha. Hawaiian quotes .... Hawaiis Pacific Centuries Essay Zócalo Public Square. Write the Conclusion Writing Activity - Hawaii, the Aloha State .... Hawaii - Google Docs. Hawaii State Study by Yvonne Crawford Teachers Pay Teachers. Welcome to-hawaii. Hawaii. BUILDING THE HAWAIIAN NATION - THE LEADERSHIP, WISDOM AND VISION OF O. Pros of the Overthrow of the Hawaiian Monarchy Essay Example GraduateWay. PDF When Did the Polynesians Settle Hawaii? A Review of 150 Years of .... Essay on hawaii. Swimming in the Ocean at Hawaii Essay Example Topics and Well Written .... Essay hawaii in island oahu sample vacation. Hawaii vacation. My Trip to Hawaii: My Trip to Hawaii- Descriptive Essay. The Biome of Hawaii Essay Example Topics and Well Written Essays .... Hawaii Presentation in English Hawaii Maui. HAWAII. Holokai Essay - Holokai is a Hawaiian word that is used to describe a .... Kindergarten Lifestyle: November 2013. Our Hawaii - The Value of Hawaii - Knowing the past and shaping the future. 5 paragraph essay about hawaii. Dream Vacation To Hawaii Free Essays .... Document. Welcome to Hawaii Reading Comprehension Worksheet - Have Fun Teaching. Excerpt from Hawaiis Story by Hawaiis Queen 1898 - Primary source .... Agence Lumière. The Hawaiian Monarchy Essay Example Topics and Well Written Essays .... Hawaii essay.docx - Unit 2 Lesson 2 Annexation of Hawaii, Argument .... Descriptive Essay on Hawaii - writeroz.web.fc2.com Essay About Hawaii Essay About Hawaii
16 Best Images Of Persuasive Writing WorkshNancy Ideker
The documentary "A Class Divided" shows how a teacher conducted an experiment to demonstrate how easily discrimination can influence children, by separating her class into two groups based on eye color and giving preferential treatment to one over the other, which quickly led the disadvantaged group to internalize feelings of inferiority. The purpose was to illustrate how discrimination creates psychological barriers and affects self-worth, making the impacts of prejudice difficult to overcome.
El documento habla sobre los cambios culturales, sociales e individuales que han ocurrido debido a la tecnología de la información y la comunicación (TIC). Antes las personas se identificaban por la música que escuchaban o cómo bailaban, pero ahora es a través de las redes sociales. También, la comunicación ya no es a través de cartas sino mediante la TIC de manera más efectiva. La TIC permite expresarse de maneras inesperadas.
El documento contiene cuatro páginas de configuración de color para una impresora. Cada página muestra los niveles de tinta para uno de los colores principales (cian, magenta, amarillo y negro) y la fecha y hora en que se realizó la configuración.
Curso de qualificação profissional - Assistente Administrativo com InformáticaClayton de Almeida Souza
O documento apresenta um curso de qualificação profissional para assistente administrativo com informática. Apresenta o professor Clayton de Almeida Souza, suas qualificações e experiências. Detalha o conteúdo e objetivos do curso, incluindo matérias sobre administração, finanças, marketing e informática aplicadas às empresas.
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Contact us today to schedule an appointment and transform how your ride looks and feels.
El documento ofrece consejos para realizar presentaciones en diapositivas de manera efectiva, recomendando que sean breves (no más de 10 diapositivas y 20 minutos), atractivas visualmente pero sin distraer, y con texto de al menos 30 puntos. Además, enfatiza la importancia de alinear los elementos, usar títulos e imágenes claras, y hablar con un tono de voz adecuado.
Intrinsic motivation refers to doing something for its own sake rather than for some separable consequence. It is driven by an interest or enjoyment in the task itself, and exists within the individual rather than relying on external pressures or a desire for reward. Active listening is a communication technique used to improve mutual understanding and show empathy for the speaker. It involves fully concentrating on what is being said without distraction, accepting the person and their perspective without judgment, and reflecting back their feelings and ideas without inserting one's own views. These behaviors demonstrate trust, care, and support for the speaker.
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Whether you need a basic wash or a full interior-and-exterior package, trust Perfect Detailing Services for expert auto detailing that extends the life of your paint and upholstery.
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Whether you need a basic wash or a full interior-and-exterior package, trust Perfect Detailing Services for expert auto detailing that extends the life of your paint and upholstery.
Dois irmãos queriam ser pintores, mas só um poderia estudar. Um irmão trabalhou nas minas por 4 anos para pagar os estudos do outro, que se tornou um grande artista. Quando o irmão artista ofereceu pagar seus estudos, o outro disse que suas mãos foram destruídas pelo trabalho nas minas, mas ficou feliz por ter possibilitado o sonho do irmão.
La medicina basada en evidencias (MBE) utiliza las mejores pruebas disponibles para la atención de pacientes, uniendo la clínica con la epidemiología. Supone un proceso continuo de aprendizaje cuestionando experiencias clínicas no sistematizadas. Sin embargo, existen obstáculos como la falta de reconocimiento de lo que se desconoce, dificultades en la formulación de preguntas y búsqueda de información, y problemas en la aplicación de la evidencia al cuidado del paciente.
1) O homem vem desenvolvendo sua tecnologia ao longo da história por meio de descobertas e invenções como o fogo e a roda, que revolucionaram a vida humana.
2) No período Neolítico, o homem começou a cultivar plantas, domesticar animais e produzir cerâmica e instrumentos de metal, marcando avanços na agricultura e na metalurgia.
3) A escrita e a imprensa surgiram na Idade Moderna, permitindo novos desenvolvimentos nas ciências, na
We offer professional detailing services to keep your vehicle looking its best. With a full suite of washing, polishing, and protection options, our experienced detailers can remove dirt, grime, and imperfections to restore your car's shine. Contact us today to schedule an appointment and transform how your ride looks and feels.
This document discusses an experiment to analyze the impact of rare microbial community members on ecosystem function. The researchers maintained soil-seeded anaerobic switchgrass-degrading microcosms for over three years, isolating six novel species and genera that comprised 88-89% of 16S rDNA reads. Over 300 operational taxonomic units (OTUs) accounted for the remaining 11% and were considered rare members. The researchers rebuilt the community with only the abundant isolates and compared switchgrass degradation and fermentation products to the original whole community. Rebuilt communities outperformed in acetate production in one media but underperformed in another, showing rare members affect function but are not necessary. DNA sequencing will help understand the roles of abundant and rare
El documento describe el movimiento artístico surrealista, incluyendo sus objetivos, características y técnicas clave. Se originó en Francia en la década de 1920 impulsado por André Breton, plasmando imágenes del subconsciente y los sueños a través de técnicas como el automatismo, frottage, collage y cadáver exquisito. También presenta importantes artistas surrealistas como Dalí, Miró, Magritte y Frida Kahlo.
Este documento describe un estudio de variación y capacidad (R&R) de un sistema de medición. El estudio evaluó la repetibilidad, reproducibilidad y variación entre operadores al medir el peso de 10 unidades de un producto. Los resultados mostraron que la variación del sistema de medición representaba el 5.57% de la variación total, lo que indica que el sistema es aceptable pero marginalmente capaz de diferenciar entre partes dentro de las especificaciones.
O documento descreve um curso de Assistente Administrativo Completo oferecido pelo CEBRAc Messejana. O curso tem 180 horas de duração ao longo de 16 meses, dividido em projetos e módulos sobre administração, informática e pessoal. O objetivo é formar profissionais diferenciados e empreendedores capazes de lidar com os desafios do mercado de trabalho.
El documento describe diferentes medidas estadísticas para evaluar el riesgo y la asociación entre variables, incluyendo el riesgo absoluto, riesgo relativo, reducción del riesgo relativo, riesgo atribuible, número necesario para tratar, y odds ratio. Proporciona un ejemplo numérico para ilustrar cómo calcular estas medidas y comparar el riesgo de accidente cerebrovascular entre pacientes con y sin tratamiento para la hipertensión.
El documento describe diferentes medidas estadísticas para evaluar el riesgo y la asociación entre variables, incluyendo el riesgo absoluto, riesgo relativo, reducción del riesgo relativo, riesgo atribuible, número necesario para tratar, y odds ratio. Estas medidas se utilizan comúnmente en estudios epidemiológicos y ensayos clínicos para cuantificar el impacto de una intervención o exposición sobre los resultados.
Lighting systems and their design..mau --jmi-2014Mohd Azmatullah
An essential service in all the industries,
The power consumption by the industrial lighting varies between 2 to 10% of the total power depending on the type of industry.
Lightingisanarea,whichprovidesamajorscopetoachieveenergyefficiencyatthedesignstage,by incorporation of modern energy efficient lamps,luminaires and gears,apart from good operational practices.
Hawaii as a Group of Islands in the Pacific Ocean Essay Example .... Essay about hawaii - Get Help From Custom College Essay Writing and .... the hawaiian islands. Hawaii. From Facebook about the full meaning of aloha. Hawaiian quotes .... Hawaiis Pacific Centuries Essay Zócalo Public Square. Write the Conclusion Writing Activity - Hawaii, the Aloha State .... Hawaii - Google Docs. Hawaii State Study by Yvonne Crawford Teachers Pay Teachers. Welcome to-hawaii. Hawaii. BUILDING THE HAWAIIAN NATION - THE LEADERSHIP, WISDOM AND VISION OF O. Pros of the Overthrow of the Hawaiian Monarchy Essay Example GraduateWay. PDF When Did the Polynesians Settle Hawaii? A Review of 150 Years of .... Essay on hawaii. Swimming in the Ocean at Hawaii Essay Example Topics and Well Written .... Essay hawaii in island oahu sample vacation. Hawaii vacation. My Trip to Hawaii: My Trip to Hawaii- Descriptive Essay. The Biome of Hawaii Essay Example Topics and Well Written Essays .... Hawaii Presentation in English Hawaii Maui. HAWAII. Holokai Essay - Holokai is a Hawaiian word that is used to describe a .... Kindergarten Lifestyle: November 2013. Our Hawaii - The Value of Hawaii - Knowing the past and shaping the future. 5 paragraph essay about hawaii. Dream Vacation To Hawaii Free Essays .... Document. Welcome to Hawaii Reading Comprehension Worksheet - Have Fun Teaching. Excerpt from Hawaiis Story by Hawaiis Queen 1898 - Primary source .... Agence Lumière. The Hawaiian Monarchy Essay Example Topics and Well Written Essays .... Hawaii essay.docx - Unit 2 Lesson 2 Annexation of Hawaii, Argument .... Descriptive Essay on Hawaii - writeroz.web.fc2.com Essay About Hawaii Essay About Hawaii
16 Best Images Of Persuasive Writing WorkshNancy Ideker
The documentary "A Class Divided" shows how a teacher conducted an experiment to demonstrate how easily discrimination can influence children, by separating her class into two groups based on eye color and giving preferential treatment to one over the other, which quickly led the disadvantaged group to internalize feelings of inferiority. The purpose was to illustrate how discrimination creates psychological barriers and affects self-worth, making the impacts of prejudice difficult to overcome.
How To Write A Hypothesis Statement For A ResearchAngelica Ortiz
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund option for plagiarized work.
BeeHive Varna
http://beehive.bg
Тема:
Компютърна сигурност, анонимност, защита на лични данни в Интернет
Заглавие на лекцията:
"Privacy Is Dead, Get Over It REDUX", BeeHive Varna
Лектор:
Мурад Касим, Project Manager & Software Developer at 158 Ltd.
Дата:
10.12.2014 19:10, BeeHive Varna
Място:
BeeHive Co-Working Space, Varna, Bulgaria
Описание:
Това е продължението на оригиналната лекция "Privacy Is Dead" (https://www.youtube.com/watch?v=k_C_2...), която се проведе през октомври 2014 във BeeHive Varna (http://beehive.bg/). Целта на лекцията е да запознае всички хора с това до каква дълбока степен се събират лични данни по всеки един възможен начин за нас и че вече е невъзможно да бъдем аномни в интернет, благодарение на това че ние сами споделяме със всеки един нашите най-съкровени тайни. За всеки човек се изгражда много подробно досие, с което се търгува и ескпериментира по всякакъв възможен начин благодарение на нашето постоянно безразборно споделяне на лична информация.
Първо ще започнем с кратък преглед на причините, заради които компаниите имат интерес да изграждат поведенчески модели за нас, след това ще дадем няколко забавни примери за това как понякога хората споделят твърде лични неща с напълно непознати хора. След това следва една "по-техническа" част, където ще разгледаме накратко как големи компании като Facebook и Google събират данни за потребителите си, какво твърдят, че правят с тях и какво реално правят. Ще си поговорим и малко за нашумялата в последни години мрежа за анонимност Tor. Накрая ще завърша с някои наистина крайно авангардни технологии за следене и наблюдение, които са разработени и патентовани през последните няколко години и вече започват да се прилагат в САЩ.
Събитието във Facebook:
https://www.facebook.com/events/84997...
Благодарим на следните компании, за подкрепата им към събитието:
Beehive Varna - http://beehive.bg/
158 Ltd - http://158ltd.com
телевизия bTV - http://www.btv.bg/
телевизия "Черно Море" - http://www.cherno-more.tv/
списание "VIP" - http://spisanievip.com/
beehive varna, beehive coworking space, beehive.bg, beehive варна, споделено работно място варна, 158, 158ltd, 158ltd.com, компютърна сигурност, лични данни, анонимност, Tor, privacy, computer security, anonymity, network security, security, privacy, personal data, data protection, cybersecurity, privacy protection, protect your data, data collection, google, facebook, personal data collection, privacy policy
College Thesis Template - Googl. Online assignment writing service.Lisa Garcia
The War of 1812 causes curiosity about difficulties the US faced and why it was viewed as a victory. Andrew Jackson's presidency distinguished him from predecessors by refining the role of president. There remains questions about westward expansion and how it shaped America.
Psychologists are interested in explaining cultural phenomena like zombies. Zombies are popular in films, games, and zombie walks involving thousands of people. There are a few psychological explanations for our fascination with zombies. One theory is that zombies represent our fear of death by displacing it onto a creature we can fight. Another view is from an evolutionary perspective, finding that zombies resemble real threats like those wanting to eat us, or their jerky movements and decomposing appearance trigger instinctive fears of predators and disease. Studies have found that successful horror films are those rated highest for evoking fears of predation and contagion.
A George Washington ... Writing Paper By Regina DEmily Smith
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, and the company offers refunds for plagiarized work.
Up In The Air Movie Essay. Online assignment writing service.Tammy Blood
The document provides instructions for using a writing assistance service called HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, and the service offers refunds for plagiarized work.
Do Aliens Exist | Teaching Resources. Do Aliens Exist? Text Analysis KS3 Lesson PP | Teaching Resources. Professor of Physics suggests that governments are covering up the .... The best creepy alien pictures that look so real it could be proof they .... Do aliens exist? Astronomer to give talk in Nashville. Do Aliens Exist Essay Example | Topics and Well Written Essays - 1750 words. 009 Essay Example Do Aliens Exist Persuasive ~ Thatsnotus. Beautiful Do Aliens Exist Persuasive Essay ~ Thatsnotus. Do Aliens Exist Essay Typer. 004 Do Aliens Exist Persuasive Essay Alien Sample Essays ~ Thatsnotus. Are aliens real persuasive essay - proofreadingx.web.fc2.com. Best Essay Writers Here - Do aliens exist persuasive essay .... Do Aliens and UFOs Exist? - 586 Words | Essay Example. Short essay - aliens. Does aliens exist essay - presentationbackgrounds.web.fc2.com. Alien essay - ealcberkeley.x.fc2.com. Do aliens really exist essay - writingessay.web.fc2.com. Why do aliens exist essay - candiescornercom.
Do Aliens Exist | Teaching Resources. Do Aliens Exist? Text Analysis KS3 Lesson PP | Teaching Resources. Professor of Physics suggests that governments are covering up the .... The best creepy alien pictures that look so real it could be proof they .... Do aliens exist? Astronomer to give talk in Nashville. Do Aliens Exist Essay Example | Topics and Well Written Essays - 1750 words. 009 Essay Example Do
Slumdog Millionaire: Lifestyles of the Broke and Unknown Free Essay Example. Slumdog Millionaire by Vikas Swarup Essay Example | Topics and Well .... Slumdog millionaire character essay. Film analysis: Slumdog millionaire Essay Example | Topics and Well ....
The document provides an overview of the documentary "Future Radicals" which tracks the history and growth of the hacktivist group Anonymous from its beginnings on 4chan to its evolution into a more organized group conducting cyber protests in support of issues like Wikileaks and the Arab Spring. It discusses how Anonymous employs the same digital technologies it aims to protect to conduct distributed denial-of-service attacks and website defacements. The documentary includes insider accounts of Anonymous operations and interviews with cybersecurity experts and Anonymous members on the group's activities and increasing surveillance from law enforcement agencies around the world.
The document discusses the author's frustration with the priorities of security researchers. The author feels they focus too much on obscure and unlikely scenarios, rather than practical issues like making passwords easier to generate and remember. The author provides examples of overly complex talks and papers they have encountered. The author argues security researchers should focus more on common-sense advice for regular users to stay safe from everyday threats, rather than unrealistic doomsday scenarios. The Mossad is presented as an unstoppable threat beyond any security precautions. In conclusion, the author urges the field to better align with practical user needs around passwords and common online threats.
Traditional And Progressive Education Essays.pdfTraditional And Progressive E...Melissa Elliott
The document discusses challenges with essay writing and introduces a service called HelpWriting.net that aims to help individuals overcome these challenges. Specifically, it outlines that essay writing requires skills like research, organization, and adherence to formatting styles, which can be daunting tasks that cause frustration. As pressure to produce high-quality essays increases, people often seek assistance navigating the complex writing process. HelpWriting.net provides a professional essay writing service with reliable and experienced writers who deliver customized essays on time while maintaining confidentiality. The service aims to help people save stress and achieve success by handling the task of essay writing for them.
George Washington Page BorderWriting Frame (NarrWendy Belieu
The document summarizes the use of mise-en-scene in the final whale scene of the film Whale Rider. Various camera techniques are used, including close-ups of Paikea touching the whale and of characters' facial expressions, as well as extreme long shots of people trying to drag the whale into water. These techniques convey how traditions can both separate and connect people in Maori culture. Sound effects of the whales further immerse the viewer.
Topic 2 Science and the Media- Zombies and EbolaZombies and E.docxrowthechang
Topic 2: Science and the Media- Zombies and Ebola
Zombies and Ebola are quite prevalent in popular media. Yet how do you know if the information you see, read, or hear is scientifically valid? Possibly the most important skill to take away from any introduction to science course is to be able to evaluate the source of information and determine if it is scientifically valid. Here we use media examples of zombies and Ebola and ask what you think about their validity.
In your response or this topic:
Choose either Zombies or Ebola.
Read/ watch the associated links below.
Provide your analysis of what you think is scientifically valid or in valid and why.
Zombies
Human Zombies in science fiction often arise because of a widespread infection. Some people have described certain animal behavior as “zombie” specifically caterpillars and snails. What do you think?
Suggested Links:
(
Note: some of these may not be scientifically valid- your job is to sort out what is from what isn’t.
)
The Science of Zombism
How a Zombie Outbreak Could Happen in Real Life
Video:
Snail Zombie
(
transcript
)
Video:
Zombie Caterpillar
(
transcript
)
Ebola
The outbreak of Ebola in Africa is receiving a lot of media attention. Of all the ideas and media reports, what seems scientifically valid to you and what seems exaggerated? Why? (Give specific links and examples of both scientifically valid information and exaggerated or even incorrect information from links below and those you find on your own.)
Suggested Links:
(
Note: some of these may not be scientifically valid- your job is to sort out what is from what isn’t.
)
Ebola: What you need to know
Ebola Hemorrhagic Fever
Bitter Kola will Cure Ebola and AIDS
UK raises fear of Ebola “dirty bomb”…
250 WORDS APA FORMAT PLEASE
...
1. Social media has proliferated rapidly since the late 1990s and early 2000s with the rise of platforms like Flickr, Wikipedia, LinkedIn, Blogger, MySpace, Skype, Digg, Facebook, Ning, YouTube, Twitter, and Spotify.
2. As theoretical rights have become inevitable practice on social media, questions have emerged around what constitutes truth and expertise online. There is no longer a clear monopoly on knowledge or truth.
3. The document discusses several challenges around truth and expertise in the social media age, including filter bubbles, contextual truth, entrapment by technology, and the illusion of expertise for all with the death of experts and rise of influence metrics. Independent critical thinking
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
From its roots in culture jamming, we look at the early days of hacktivism from the early manifesto by The Mentor to the exploits of The Electronic Disturbance Theater, The Electrohippies, the Hong Kong Blondes, et.
The Impact Of Childhood Obesity On Health - Free EJennifer Cruz
The document discusses how to evaluate the safety culture and implementation of a Safety Management System (SMS) at an organization. It defines safety culture as the shared beliefs, practices, and attitudes that exist within an establishment. Assessing an organization's safety culture and SMS implementation is important to ensure proper safety protocols and risk management are in place.
Similar to W_F_Slater_and_ITMT_535_Students_for_Forensecure_2016_v15_FINAL (20)
1. 4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 1
2. 4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 2
Is Your Data Center Prepared
for the Zombie Apocalypse?
3. IS YOUR DATA CENTER
PREPARED FOR THE ZOMBIE
APOCALYPSE?
WILLIAM F. SLATER, III, M.S. MBA, PMP, CISSP, CISA
ADJUNCT PROFESSOR, IIT SCHOOL OF APPLIED TECHNOLOGY
-AND-
LOUIS-PHILIAS, SEBRINA NEAL, JORIS EKPANGBO & TEMILOLU OLANIYAN
ITMT 535 – DATA CENTER ARCHITECTURE STUDENTS
A PRESENTATION FOR FORENSECURE 2016
4. AGENDA
❖Introduction
What is a Data Center?
Traditional Data Center Security Concepts
and Limits
The Zombie Apocalypse & how it can
expose n our Data Centers?
How can we prepare our Data Centers
for the Zombie Apocalypse?
❖Conclusion
❖Questions
❖References
4/1/2016 4Is Your Data Center Prepared for the Zombie Apocalypse?
7. WHAT IS A DATA
CENTER?
4/1/2016 7Is Your Data Center Prepared for the Zombie Apocalypse?
8. DATA CENTER DEFINITION
It generally includes redundant or
backup power supplies,
redundant data communications
connections, environmental
controls (e.g., air conditioning, fire
suppression) and various security
devices. Large data centers are
industrial scale operations using
as much electricity as a small
town.
31 March 2016 8Is Your Data Center Prepared for the Zombie Apocalypse?
9. WHY DATA CENTER MATTERS?
“The internet was done so well that most people think of it as a
natural resource like the Pacific Ocean”
-Alan Kay-
11. CIA – THE SECURITY TRIAD
114/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse?
TRADITIONAL DATA CENTER SECURITY CONCEPTS
12. TRADITIONAL DATA CENTER SECURITY CONCEPTS
The security in a Data Center is based on
safeguarding of data and other IT assets (the
CIA TRIAD) and consists of two types:
❖The Physical Security
❖The Logical Security
4/1/2016 12Is Your Data Center Prepared for the Zombie Apocalypse?
13. TRADITIONAL DATA CENTER SECURITY CONCEPTS
❖Physical security building best practices:
1. Build on the right spot
2. Have redundant utilities,
3. Pay attention to the walls, how they are built
4. Avoid windows
5. Use landscaping for protection,
6. Keep a 100-foot buffer zone around the site,
7. Use retractable crash barriers at vehicle entry points,
8. Plan for bomb detection
9. Limit entry points,
10. Make fire doors exit only,
Sarah Scalet
4/1/2016 13Is Your Data Center Prepared for the Zombie Apocalypse?
14. 4/1/2016 14Is Your Data Center Prepared for the Zombie Apocalypse?
TRADITIONAL DATA CENTER SECURITY CONCEPTS
Sarah Scalet
15. 11. Use cameras as much as possible,
12. Protect the building's machinery,
13. Plan for secure air handling,
14. Ensure nothing can hide in the walls and ceilings,
15. Use two-factor authentication
16. Harden the core with security layers
17. Watch the exits too,
18. Prohibit food in the computer rooms,
19. Install visitor restrooms.
❖The logical security (Antivirus software, firewalls and
intrusion-detection systems for instance)
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 15
Sarah Scalet
17. LIMITS
❖Be Diligent Against the Biggest Threat: People
▪ Whether it is intentional sabotage, social engineering, carelessness
or lack of following a defined policy, people working in the facility
can be the biggest risk. For example, social engineering is a
common threat because most people by nature want to be helpful.
It’s important to train people to stick to the security policy and
require them to be 100 percent accountable for their access.
▪ Furthermore, the redundancy of IT equipment is the first goal to
meet in any data center to assure its availability, to make it free of
disruption. But the people working in a data center are its most
important « engine », and cannot be redundant.
4/1/2016 17Is Your Data Center Prepared for the Zombie Apocalypse?
18. THE ZOMBIE
APOCALYPSE & HOW
IT CAN EXPOSE OUR
DATA CENTERS
4/1/2016 18Is Your Data Center Prepared for the Zombie Apocalypse?
20. WHAT ARE ZOMBIES?
❖A zombie (Haitian French: zombi, Haitian Creole: zonbi) is a
fictional undead being created through the reanimation of a
human corpse.
❖The English word "zombie" is first recorded in 1819, in a
history of Brazil by the poet Robert Southey, in the form of
"zombi". The Oxford English Dictionary gives the origin of
the word as West African, and compares it to the Kongo
words nzambi (god) and zumbi (fetish).
❖One of the first books to expose Western culture to the
concept of the voodoo zombie was The Magic Island by
W.B. Seabrook in 1929. This is the sensationalized account
of a narrator who encounters voodoo cults in Haiti and their
resurrected thralls.
4/1/2016 20Is Your Data Center Prepared for the Zombie Apocalypse?
21. THE STORY OF FELICIA FELIX MENTOR
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 21
Felicia Felix-Mentor was a Haitian woman believed to have been
made into a zombie in the early part of the 20th century. She
reportedly died in 1907, after a sudden illness of the type that
Haitian belief finds to be characteristic of a person marked to be
made into a zombie.
In 1936 a woman in ragged clothing was found wandering the
streets, and made her way to a farm which she claimed belonged
to her father. The owners identified the woman as Felicia Felix-
Mentor, long thought dead, and Felix-Mentor’s husband also
confirmed this. Due to her poor health, she was sent to a
government hospital. A doctor who interviewed her described her
behavior.
Her occasional outbursts of laughter were devoid of emotion, and
very frequently she spoke of herself in either the first or the third
person without any sense of discrimination. She had lost all
sense of time and was quite indifferent to the world of things
around her.
22. WEST AFRICAN ZOMBIES (BENIN)
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 22
23. WHAT IS THE ZOMBIE APOCALYPSE?
❖Intimately tied to the concept of the modern zombie is the "zombie apocalypse"; the
breakdown of society as a result of an initial zombie outbreak that spreads. This
archetype has emerged as a prolific subgenre of apocalyptic fiction and has been
portrayed in many zombie-related media after Night of the Living Dead. In a zombie
apocalypse, a widespread (usually global) rise of zombies hostile to human life
engages in a general assault on civilization. Victims of zombies may become zombies
themselves. This causes the outbreak to become an exponentially growing crisis: the
spreading phenomenon swamps normal military and law enforcement organizations,
leading to the panicked collapse of civilized society until only isolated pockets of
survivors remain, scavenging for food and supplies in a world reduced to a pre-
industrial hostile wilderness.
❖This fictional event has gained gradually recognition:
▪ In government media
▪ On 18 May 2011, the United States' Centers for Disease Control and Prevention (CDC)
published a graphic novel, Preparedness 101: Zombie Apocalypse providing tips to survive
a zombie invasion as a "fun new way of teaching the importance of emergency4/1/2016 23Is Your Data Center Prepared for the Zombie Apocalypse?
24. WHAT IS THE ZOMBIE APOCALYPSE?
▪ In music
Michael Jackson's music video Thriller (1983), in which he dances with
a troop of zombies, has been preserved as a cultural treasure by the
Library of Congress' National Film Registry
▪ In literature
Max Brooks's novel World War Z (2006) became a New York Times
bestseller.
▪ In theoretical academic papers
Adam Chodorow of the Sandra Day O'Connor College of Law at
Arizona State University investigated the estate and income tax
implications of a zombie apocalypse under United States federal and
state tax codes.
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 24
25. NOTABLE ORGANIZATIONS THAT BELIEVE IN THE
ZOMBIE APOCALYPSE
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 25
27. AMERICAN CITIES – BEST AND WORST PLACES FOR
THE ZOMBIE APOCALYPSE
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 27
28. THE ZOMBIE APOCALYPSE THREAT & HOW CAN IT
EXPOSE OUR DATA CENTERS
❖Threat modeling (often related to the logical security in Data Center)
There are at least three general approaches to threat modeling:
❖Attacker-centric
Attacker-centric threat modeling starts with an attacker, and evaluates their goals, and how they
might achieve them. Attacker's motivations are often considered, for example, "The NSA wants
to read this email," or "Jon wants to copy this DVD and share it with his friends." This approach
usually starts from either entry points or assets
❖Software-centric
Software-centric threat modeling (also called 'system-centric,' 'design-centric,' or 'architecture-
centric') starts from the design of the system, and attempts to step through a model of the
system, looking for types of attacks against each element of the model. This approach is used
in threat modeling in Microsoft's Security Development Lifecycle
❖Asset-centric
Asset-centric threat modeling involves starting from assets entrusted to a system, such as a
collection of sensitive personal information
4/1/2016 28Is Your Data Center Prepared for the Zombie Apocalypse?
29. Any high security data center can actually prevent any disaster including a
zombie apocalypse :
❖A hardened, secure, windowless facility will keep the staff and the servers safe
and protect them from hordes of brain-hungry, shambling corpses pounding at
the front door
❖If “clever” zombies somehow manage to get hold of a keycard or passcode,
multi-factor security that includes biometrics (zombies, after all, don’t have the
body warmth and heartbeats of a living human) should prevent the flesh-eaters
from getting in
❖What if the walking dead attack during a shift change at the local power plant? No
problem: your uninterruptible power supply (UPS) will bridge the few seconds it
takes for the generators to reach full power
4/1/2016 29Is Your Data Center Prepared for the Zombie Apocalypse?
THE ZOMBIE APOCALYPSE THREAT & HOW CAN IT
EXPOSE OUR DATA CENTERS
30. ❖Having a secondary site can be a nice safeguard if zombies find a hole in security at a
less secure site.
The remaining question is: What if the danger
comes from within the data center?
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 30
THE ZOMBIE APOCALYPSE THREAT & HOW CAN IT
EXPOSE OUR DATA CENTERS
31. Are you going to quarantine them? Or kill them?
No logic would lead the contaminated staff so the worst has to be expected. The data
center will be likely to be destroyed because :
• Delete/modify the data
• Infect other people
• Causing a Virus to spread
• Press the RED button
The most astonishing fact is that there are no palliative solutions for those dramatic
events up to now in any data center disaster recovery plan.
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 31
THE ZOMBIE APOCALYPSE THREAT & HOW CAN IT
EXPOSE OUR DATA CENTERS
32. HOW WILL YOU KNOW THE ZOMBIE APOCALYPSE IS
HAPPENING?
Source: http://hisz.rsoe.hu/alertmap/index2.php?area=usa&lang=eng
RSOE - Emergency and Disaster Information Service
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 31
33. “Noah did not wait until it was raining to start building the Ark.”
4/1/2016 33
“BETTER SAFE THAN SORRY”
Is Your Data Center Prepared for the Zombie Apocalypse?
34. “BETTER SAFE THAN SORRY”
❖Data center designers generally do a good job preparing for conventional risks like
earthquakes, fires, floods, and hurricanes, but if the disaster recovery plan doesn’t
include provisions for dealing with the undead, the risk mitigation strategy has a gaping
hole
❖Unlike conventional disaster recovery (DR)/business continuity planning (BCP),
zombie preparedness has a unique set of goals beyond data protection and business
resumption:
Ensure the long-term Survivability of your
facilities AND your people
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 34
35. HOW CAN WE PREPARE
OUR DATA CENTERS
FOR THE ZOMBIE
APOCALYPSE?
4/1/2016 35Is Your Data Center Prepared for the Zombie Apocalypse?
36. NECESSARY SURVIVAL KIT :
WATER
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 35
37. NECESSARY SURVIVAL KIT :
FOOD
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 36
38. NECESSARY SURVIVAL KIT :
WEAPONS
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 37
39. DATA CENTER FORTIFICATION CONCEPTS TO
SURVIVE A ZOMBIE APOCALYPSE
❖Shelter in Place
❖Highly-Available, Redundant
▪ Power
▪ Cooling
▪ Communications
❖Entertainment
❖Communications Equipment
(Raspberry Pi, radio FM transmitter)
❖Sleeping quarters
❖Sanitary Facilities
❖Sensors (presence sensors etc)
❖First-Aid Kits
❖Medical Supplies
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 39
40. LET’S BE PRAGMATIC!
Odds are, an outbreak of zombies is for
now unlikely to happen. But there are still
plenty of other potential threats that could
spell disaster for your data center if you’re
not prepared. So make sure you take the
time to consider all possibilities as you
build out your IT infrastructure, have a
disaster plan in place and hold a test drill
every so often to make sure everyone
knows what to do to keep your facilities
online. Always best to prepare for
zombies, even when there is no perceived
threat of zombies
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 40
41. OUR RECOMMENDATIONS
❖Improve your Disaster Recovery Plan and your Business
Continuity Plan
❖Actively fortify your Data Center
❖Equip and Train every member of your Data Center Staff
❖Plan to for the Long-Term Survivability of the Human
Element
❖Take the Online Quiz: http://bit.ly/1MJRVLn
4/1/2016 41Is Your Data Center Prepared for the Zombie Apocalypse?
43. Discussion of DoS Attacks
In early February 2000, a series of well organized
denial-of-service attacks were launched against
some major e-commerce websites…
53. REFERENCES
4/1/2016 53Is Your Data Center Prepared for the Zombie Apocalypse?
Google Hacking for penetration
testers, By Long J. & Gardner
B. & Brown J.
Everything you ever wanted to
know abut zombies, By Mogk
M.
54. REFERENCES
4/1/2016 54Is Your Data Center Prepared for the Zombie Apocalypse?
The Zombie Survival Guide, By
Brooks M.
The Maker’s Guide to the
Zombie Apocalypse, By Monk
S.
55. • Ashford, W. (2015, May 26). Linking threat modelling and risk analysis key to cyber
security. Retrieved March 31, 2016, from
http://www.computerweekly.com/news/4500246898/Linking-threat-modelling-and-risk-analysis-
key-to-cyber-security
• Castro, D. (2014, October 29). Is US Tech Policy Ready For A Zombie Apocalypse? –
InformationWeek. Retrieved March 31, 2016, from http://www.informationweek.com/it-life/is-us-
tech-policy-ready-for-a-zombie-apocalypse/a/d-id/1316987
• Dougherty B. (2012): Is your data center ready for the coming zombie apocalypse?
Retrieved from http://www.ragingwire.com/blog/disaster-recovery-business-continuity-planning-
and-zombie-preparedness on March 31st, 2016
• Grimes, R. A. (2014, April 8). Repeat after me: Model your security threats first. Retrieved
March 31st, 2016, from http://www.infoworld.com/article/2610847/security/repeat-after-me--
model-your-security-threats-first.html
• Hudson, G. (2012, February 13). 6 Green Data Centers that Could Survive a Zombie
Apocalypse. Retrieved March 31st, 2016, from http://cleantechnica.com/2012/02/13/6-green-
data-centers-that-could-survive-a-zombie-apocalypse/
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 55
REFERENCES
56. • Jackson, M. (1982). Michael Jackson - Thriller. Retrieved March 31, 2016, from
https://www.youtube.com/results?search_query=thriller+michael+jackson
• Khan, A. S. (2011, May 16). Preparedness 101: Zombie Apocalypse. Retrieved March 31st,
2016, from http://blogs.cdc.gov/publichealthmatters/2011/05/preparedness-101-zombie-
apocalypse
• Miller, R. (2013, March 4). Brocade Data Center Repels Zombie Attack | Data Center
Knowledge. Retrieved March 31, 2016, from
http://www.datacenterknowledge.com/archives/2013/03/04/brocade-data-center-repeals-zombie-
attack/
• Scalet S. (2006): 19 Ways to Build Physical Security Into a Data Centre. Retrieved March
31st, 2016 from
http://www.cio.com.au/article/181324/19_ways_build_physical_security_into_data_centre/ on
March 24th, 2016
• Threat modeling. (n.d.) Retrieved March 31st, 2016, from
https://en.wikipedia.org/wiki/Threat_model
• Trend micro: Security threats to evolving data centers - Trend micro U.S.A. (n.d.). Retrieved
March 31, 2016, from http://www.trendmicro.com/cloud-content/us/pdfs/security-
intelligence/reports/rpt_security-threats-to-datacenters.pdf
• Warwick A. (2015): Linking threat modelling and risk analysis key to cyber security.
REFERENCES
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 55
57. PRESENTER BIO:
WILLIAM F. SLATER, III
❖ Current Positions –
Project Manager / Sr. IT Consultant at Adecco North America,
President & CEO of Slater Technologies, Inc. , and Adjunct
Professor at the Illinois Institute of Technology - Working on
projects related to
▪ Global Cybersecurity Manager at a $4.5 Billion company
▪ Software Development and Migration at the U.S. Department of
Veterans Affairs
▪ Security reviews and auditing
▪ ISO 27001 Project Implementations
▪ Subject Matter Expert for preparing Risk Management and
Security Exams at Western Governor’s State University in UT
▪ Created an eBook with articles about Security, Risk
Management, Cyberwarfare, Project Management and Data
Center Operations
▪ Providing subject matter expert services to Data Center product
vendors and other local businesses.
▪ Also Developing and presenting technical training materials for
undergraduate and graduate students at the Illinois Institute of
Technology in the areas of Data Center Operations, Data Center
Architecture, Cyber Security Management, and Information
Technology hardware and software.
4/1/2016 Is Your Data Center Prepared for the Zombie Apocalypse? 57
58. BIO’S OF CO-PRESENTERS :
ITMT 535 STUDENTS
Student Name Bio Major Graduation
Date
Sebrina Neal Sebrina is an undergraduate
majoring in ITM, she earned her
Associates Degree in Computer
Information Systems (CIS) from
Kennedy King College in 2014,
a scholar in One Million
Degrees Scholarship Program,
and an IT intern at HBK
Engineering, LLC.
Information
Technology &
Management
December
2016
Joris Ekpangbo Graduate student in ITM - Data
Management in a double
degree program taking also a
professional Master in
Information Systems
Engineering at ESIGELEC/FR
Information
Technology &
Management
December
2016
4/1/2016 58Is Your Data Center Prepared for the Zombie Apocalypse?
59. BIO’S OF CO-PRESENTERS :
ITMT 535 STUDENTS
Student Name Bio Major Graduation
Date
Louis-Adrien
Philias
Louis is a graduate student in
a double degree program from
France in ITM with a
specialization in Data Center
Operations & Management
Information
Technology &
Management
August 2016
Temilolu
Olaniyan
Temi had her undergraduate
degree in computer
engineering and is currently
pursuing her Graduate studies
in Information Technology and
Management at Illinois
Institute of Technology
Information
Technology &
Management
December 2016
4/1/2016 59Is Your Data Center Prepared for the Zombie Apocalypse?