2016 Maintenance Innovation Challenge

Slides:



Advertisements
Similar presentations
Hardware Lesson 3 Inside your computer.
Advertisements

Fragmentation is the degree to which pieces that make up files are spread across the hard disk.
Upgrading your computer 3 rd May Why upgrade? Current computer will not run some new wanted software or support desired hardware Current computer.
SAM SPENCER Server Virtualization. Agenda Introduction History Server Virtualization Software Server Virtualization Hardware Determining Server Hardware.
Michael Henderson. Objectives for chapter  To show the importance of computer maintenance computing.  Identify problems that can occur if harware is.
MXL to FireFinder XLS Total Migration Solution
We all know the world is changing… Upgrades may break apps We need sufficient time to test Our key software vendors need time to test & issue statements.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
IT Systems Memory EN230-1 Justin Champion C208 –
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Installing software on personal computer
Moving to Win 7 Considerations Dean Steichen A2CAT 2010.
Home button this will take you back to ‘the components’ page. You will start on the components page. To get to the page for each component you click on.
Secured Hosting Services Frank Adams / Tom Carter.
Random access memory is a form of computer data storage. A random-access device allows stored data to be accessed directly in any random order.
Computer maintenance chapters 1-7 review By Benjamin Houlton.
By Joseph Campbell. Objectives  Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be performed.
The Impact of Physical Security on Network Security
Operating Systems What do you have left on your computer after you strip away all of the games and application programs you bought and installed? Name.
Memory Hierarchy.
Elements of a Computer System Dr Kathryn Merrick Thursday 4 th June, 2009.
1 Understanding and Assessing Hardware To buy or upgrade? Evaluating your system: –CPU –RAM –Storage devices –Video output –Sound systems –Computer ports.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Random access memory.
Configuration.
BIOS. Accessing System BIOS You can use the System Setup utility to change variable BIOS information, such as the type of hard drive you have installed.
Open MTIP Meeting April 5, Issues with current lab setup (from last meeting) Easier/faster application deployment and maintenance Client diversity.
Unit 3: Computer Systems OCR Level 3 Cambridge Technicals in IT.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Inside your computer. Hardware Review Motherboard Processor / CPU Bus Bios chip Memory Hard drive Video Card Sound Card Monitor/printer Ports.
Inside your computer. Hardware Motherboard Processor / CPU Bus Bios chip Memory Hard drive Video Card Sound Card Monitor/printer Ports.
1 Computer Maintenance Upgrading Your PC: Flash Memory and Gathering User Information Copyright © Texas Education Agency, All rights reserved.
Lesson 4 By: Matthew Cheser. Objectives Identify problems that can occur if hardware is not properly maintained. Identify routine maintenance that can.
OCR GCSE Computing © Hodder Education 2013 Slide 1 OCR GCSE Computing Chapter 2: Memory.
Parts of the Computer System
Looking Inside the Computer System
Understanding Memory.
in the Learning Environment
BMTS 242: Computer and Systems Lecture 2: Memory, and Software Yousef Alharbi Website
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Done by: Chelsea Bryan Friday, October 10,2014.   The BIOS (aka) Basic input/output system, is a built in software that determines what's a computer.
1 Image Search/Thinkin g Look at a computer or a photo of a computer. What parts can you identify? 2 Web Search What is hardware? What are three.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 1 Looking Inside the Computer System.
Explain what the OS is and its purpose. The OS controls input and output functions. In addition, the entered data is manipulated inside of the computer,
NT1110 Computer Structure and Logic Unit 8 (Module 5A) COMPUTER OPERATION AND SECURITY.
Chapter 2 content Basic organization of computer What is motherboard
Chapter 6: Securing the Cloud
2016 Maintenance Innovation Challenge Innovative Training Solutions
Computer systems is a 10-credit unit
2016 Maintenance Innovation Challenge
Random Access Memory (RAM)
Hardware and Software Hardware refers to the physical devices of the computer system e.g. monitor, keyboard, printer, RAM etc. Software is a set of programs,
The CPU is the brain of the computer
INTRODUCTION TO COMPUTERS
Installation and maintenance hardware.
2016 Maintenance Innovation Challenge
Introduction to Computers
Computer Architecture
Computers: Hardware and Software
Upgrading Your PC: Flash Memory and Gathering User Information
Device management How does the operating system manage the hardware and peripheral devices? Device Driver: Each device is attached to your computer with.
Computer Based Technology:
Fundamentals of Computer Organisation and Architecture
Unit 2 Computer Systems HND in Computing and Systems Development
2.C Memory GCSE Computing Langley Park School for Boys.
Hardware Main memory 26/04/2019.
Motherboard BIOS and Troubleshooting
DIMETRA™ EXPRESS SYSTEM SERVICES
Presentation transcript:

2016 Maintenance Innovation Challenge Cost-wise Cyber Risk Management Using Static RAM Drives PROBLEM STATEMENT BENEFITS This disruptive technology will reduce cyber-risk to nearly all DoD Information Technology (IT) enabled systems at low cost. Hardware solution is software agnostic. i.e. will work for all Operating Systems and software. Breaks the cycle of updating legacy systems to the latest software and patching. Provides a technical solution for risk reduction of legacy systems that are too expensive or impossible to upgrade. Depot avionics and mechanical parts are repaired using cyber-vulnerable industrial systems. Examples include programmable chips installed on circuit cards and machines that fabricate flight critical mechanical parts. The cost to modernize legacy Operating Systems and software is expensive, recurring, and won’t yield the desired risk reduction. How can DoD Depot repair facilities ensure they are producing “Cybersafe” parts? TECHNOLOGY SOLUTION GRAPHIC Develop a Static Image Random Access Memory (RAM) Drive (SIRD) as a form-fit-function replacement for a standard hard drive. Booting is only allowed from an encrypted, authenticated, validated, static image of any Operating System and software. Only files on the RAM drive are executable at boot. Any malicious software encountered during operation remains in volatile memory and will be destroyed by cycling power.