the NEIGHBORHOODS NETWORK

Slides:



Advertisements
Similar presentations
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Advertisements

Robust Tools for Archiving and Preserving Digital Data Joseph JaJa, Mike Smorul, and Mike McGann Institute for Advanced Computer Studies Department of.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Software Process and Product Metrics
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Content Management Systems A content management system is software that loads on your web host’s server and manages all content on your web site dynamically.
Introduction to Software Engineering
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
A Limited Definition of Web Services Paul Kopacz CIS* Service Oriented Architecture Instructor: Qusay H. Mahmoud, Ph.D. February.
7.5 Intrusion Detection Systems Network Security / G.Steffen1.
Chapter Nineteen Understanding Information and e-Business.
SEMINAR TOPIC ON “RAIN TECHNOLOGY”
OpenRegistry MACE-Dir 5/18/09 1 OpenRegistry Initiative Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University May 2009.
1 CASE Computer Aided Software Engineering. 2 What is CASE ? A good workshop for any craftsperson has three primary characteristics 1.A collection of.
Ian Bird, CERN WLCG Project Leader Amsterdam, 24 th January 2012.
Eco Construction: Enhancing the Bidding Process with the Ariba® Discovery AdvantagePlus Program​ Company (Seller) Eco Construction and Maintenance Management.
SIEM Rotem Mesika System security engineering
Exchange Online Advanced Threat Protection
Chapter 16 – Careers in Information Technology
the NEIGHBORHOODS NETWORK
Internet, Intranet and Extranets
Rekayasa Perangkat Lunak Part-10
Rekayasa Perangkat Lunak
the NEIGHBORHOODS NETWORK
Emerging technologies
WORK GROUPS The NEIGHBORHOODS NETWORK
the NEIGHBORHOODS NETWORK
Network Topology Name: Dua'a Alfadhli ID: Section: 201
tNN INTRODUCTION to the NEIGHBORHOODS NETWORK Thanks for joining us!
tNN INTRODUCTION TO the NEIGHBORHOODS NETWORK PART 2 – THE SOLUTION
Internet, Intranet and Extranets
Software Engineering B.Tech Ii csE Sem-II
The Object-Oriented Thought Process Chapter 09
Advance Software Engineering
Organizational Environment and Cultures
THE STEPS TO MANAGE THE GRID
Exchange Online Advanced Threat Protection
SECURITY IN DISTRIBUTED FILE SYSTEMS
Internet, Intranet and Extranets
What are the Common Warning Signs of Faulty Oil Pressure Sensor.
CIS 333 Competitive Success/snaptutorial.com
Content  What is Marketing?  Benefit Of Marketing  Mailcot Marketing  Why Mailcot ?
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
ACC 210 Education for Service-- tutorialrank.com
Contact Norton Antivirus | Norton Antivirus Support UK
Team Leader Training Communications
Privacy Through Anonymous Connection and Browsing
Rekayasa Perangkat Lunak
High Level Commitments
Simplify ÷ 5 × ½.
the NEIGHBORHOODS NETWORK
System Testing.
CS385T Software Engineering Dr.Doaa Sami
How would you define media? Give an example
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
REST APIs Maxwell Furman Department of MIS Fox School of Business
An Introduction to Software Engineering
Cyber Literacy Week 9.
Engine Part ID Part 1.
Engine Part ID Part 2.
Engine Part ID Part 2.
Future of Finance Carli, Emma & Paula..
NIKE’S ETHICAL ANALYSIS
Management Functions & Behaviour
Challenges Of Network Security
Nathan Vargoshe What is Artificial Intelligence?
Principles of Information Technology
OU BATTLECARD: Oracle Identity Management Training
Demo for Partners and Customers
Presentation transcript:

the NEIGHBORHOODS NETWORK tNN INTEGRITY 1

tNN INTEGRITY of tNN tNN Must Nurture and Protect Itself Every organization has to concern itself with its proper functioning and its growth to maturity. To properly function, its structural parts have to be monitored and maintained. Organizations have to evolve to adapt to changing circumstances, to correct faulty architecture in itself, and to upgrade its structural components. There are those who abhor democracy and who will work to inhibit and destroy tNN. 2

tNN INTEGRITY of tNN tNN Must Function Properly At first, simple communication and simple lists of other NUs will suffice. This will be the embryonic tNN. As the NUs grow in number, formal Registries will have to be built to list them. Relays will have to be built. The NIN will have to emerge. Formal computer programs and data bases will have to be built along with search engines. Growth will have to be regularized with methods for helping new NUs get started and operating effectively. 3

tNN INTEGRITY of tNN tNN Must Maintain Its Integrity Registries should be examined for correctness of their NU data and proper operation of their access forms. Relays should be tested for proper handling of IDs, PDs, and MDAs. Material inserted into the NIN should be checked for accuracy, and the search engines and organization of the data should be tested for accuracy and ease of access. Each NU should probably have a small work group whose primary function is to randomly check the network. 4

tNN INTEGRITY of tNN tNN Must Evolve As tNN begins only the simplest structure is required for NUs to communicate and collaborate. A more mature tNN, to properly function, must monitor its structural parts and be maintained. Organizations have to evolve to adapt to changing circumstances, to correct faulty architecture in itself, and to upgrade their structural components. With time, the NUs constituting tNN should constantly find ways to become more efficient and effective. 5

tNN INTEGRITY of tNN Those Who Abhor Democracy Will Work to Destroy tNN tNN is an existential threat to those who benefit from the aristocratic form of society. Others, who simply fear rule by the people, will side with the aristocrats. These will vilify tNN in the mass media, and will try to subvert tNN in a variety of ways. 6

tNN INTEGRITY of tNN Specific Attacks May Be: Creation of phantom NUs, devoid of real neighborhood members, consisting only of malicious web-sites, operated only to create malicious IDs and PDs to embarrass tNN and create bad publicity and internal confusion. Our best protection will be to function openly, honestly, and produce good results; and to vigilantly test and maintain tNN's vital structures: the Registries, Relays and the NIN. 7

tNN tNN INTEGRITY END of PRESENTATION 8