IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008.

Slides:



Advertisements
Similar presentations
First, some basic info. What is iTunes U? What is a podcast?
Advertisements

Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Data Storage & Security Dr Alastair F. Brown Head of Computing MRC Human Genetics Unit MRC Institute of Genetics and Molecular Medicine The University.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
SCSC 455 Computer Security Virtual Private Network (VPN)
GLI Regulator Roundtable Feb 2008 Benefits for Regulators with the G2S Communication Protocol GLI Regulator’s Roundtable 2008.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
Computer Hardware Chapter 5. Motherboard 1: Ports 3: Expansion slots 6: Central processing unit.
SSL From Your Smartphone Support for Android Smartphones /
Security Measures Most governments use Secure Sockets Layer(SSL) on their websites. It creates a secure link between the user’s browser and the government’s.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
E - Safety What is it?. When do we need to be e-safe?
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Hands-On Microsoft Windows Server 2008
Windows XP End of Life Microsoft support for Windows XP SP3 and Office 2003 ends April 8, 2014.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
THE BASICS. “ A free, open source customized distribution of FreeBSD tailored for use as a firewall and router ”
Web Design Vocab 12 The Last one! Applet, HTTPS, RGB Color, Rollover, Server.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
1 AQA ICT AS Level © Nelson Thornes 2008 Operating Systems What are they and why do we need them?
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
HOW-TO guide This tutorial has sound.
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
KISTI Grid CA Operation KISTI Supercomputing Center Sangwan Kim, Soonwook Hwang CA Operators Contact: Jan. 8, 2007.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Free Cookies and Other Security and Privacy Issues.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Communications & Networks National 4 & 5 Computing Science.
Security in many layers  Application Layer –  Transport Layer - Secure Socket Layer  Network Layer – IPsec (VPN)  Link Layer – Wireless Communication.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Copy of the from the secure website - click on the AccoridaLife.zip link.
Basic Computer Terms Introduction to Computer Applications Mrs. Sorrell.
Collaborating with the UCSF Library Wiki UCSF Sharecase
 Collect your past paper  Collect a starter sheet – do it as your computer is logging on.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 11 © 2015 Ph. Janson Information, Computing & Communication Module 3 : Systems.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
FIX HP PCS – “COMPUTER DOES NOT SHUT DOWN” ISSUE.
Cloud-Computing Cloud Web-Blog Software Application Download Software.
Canon Printer Support Phone Number
Dial Canon printer Tech support toll free number to resolve customer technical troubleshooting issues and Install Driver provides 24/7 tech support service.instant solution for all the Canon printer issues through their experts technicians
Important Changes to WizManagePre & WizEnter!! April 6th, 2015
Downloading Arduino FOR WINDOWS.
How to have an Espresso Espresso User Guide.
BITDEFENDER ANTIVIRUS TECHNICAL SUPPORT CALL SUPPORT NUMBER:
3.2 Virtualisation.
Operating Systems What are they and why do we need them?
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
About CodeTwo We are a trusted software vendor and Microsoft partner delivering Office 365 and Exchange solutions to over businesses all over the.
Unit 2 Computer Systems HND in Computing and Systems Development
Computer-Based Processing: Developing an Audit Assessment Approach
GSBS IT Resources and Security
Important Changes to WizManagePre & WizEnter!!
Firewalls Routers, Switches, Hubs VPNs
How To Watch Game Of Thrones Season 8? Game of Thrones Season 8 Airs 14 th April 2019 If you’re outside the US, you can’t stream the Game of Thrones online.
How To Watch Game Of Thrones Season 8? Game of Thrones Season 8 Airs 14 th April 2019 If you’re outside the US, you can’t stream the Game of Thrones online.
By Elizabeth Goldstein ‘19
Loaders and Linkers.
A Glimpse Into a Few Current Tech Projects
Presentation transcript:

IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

EGM Security Bring the Game Up –Socketed BIOS is checked –BIOS contains authentication algorithm and driver for high capacity storage device –BIOS checks the Operating System, –Operating system check the gaming application program

IEEE Computer Society Technology Summit 2008 Download Software Get the Software in the Casino –Set up a communication link with identified endpoints – VPN, HTTPS, etc. –Firewall keeps most bad guys out –Store new Game content on Content Server –Authenticate software on Content Server

IEEE Computer Society Technology Summit 2008 Download to the EGM Get the software to the EGM –Secure the link between Content Server and EGM (1.066(3)) –Download software into segregated portion of memory (1.066(7)) –Two separate logs record download action –Authenticate software before any other action - no decrypting, decompressing, etc. –Authentic software can be installed

IEEE Computer Society Technology Summit 2008 Questions Questions? Contact Info: Marc McDermott Ph: