Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Challenge form Computerized Corporation

Similar presentations


Presentation on theme: "Security Challenge form Computerized Corporation"— Presentation transcript:

1

2 Security Challenge form Computerized Corporation
Stealing Information Spy ware Illegal Access Hacker tools Confidential Information Disclosure Movable Storage · Instant Message · P2P Dialup · Printout Potential Security Risks System patches and vulnerabilities Virus Malice delete and changes Core Product Design Key Customer Information Sensitive Financial Information

3 Drawbacks of Information Technology
Play games · Trade Stocks · Chat Online Browse Web Pages · Print Personal Stuffs Online Movies · Radio · Download Music Cannot Troubleshoot Remote Computer Cannot Track Computer Assets Changes Administrator Faces Heavy Workload

4

5 IP-guard Desktop Management System
Protect Information Limit Activities IP-guard’s Core Value Plan Resources Control Information

6 Different Modules Suit for Different Corporations’ Needs
Document Operation Management Printing Management Device Management Network Control Application Management Website Management Management Instant Messaging Management Screen Monitoring Bandwidth Management Asset Management Remote Maintenance Removable Storage Management Basic Management

7 New Features Multi-Languages Easy Management Flexible Policy
Classes System Can be managed by computer or by user. Each with multi-level grouping and audit trail Policies are set with combination of group inherited policy, normal policy, and offline policy Custom defined classes to be used throughout the system Support Multi-Languages for multi-national corporations

8 Minimum Requirement Agent Module Console Module Server Module
Pentium III 500 128MB Memory 1G HDD OS Win 98/ Me / NT4 Win 2000 / XP Win 2003 Win 2008 Vista (32 bit only) Console Module Pentium III 1G 256MB Memory 4G HDD OS Win 2000 Win 2003 Win XP Win 2008 Vista (32 bit only) Server Module Pentium 4 2G 512MB Memory 50GB HDD OS Win 2000 SP4 / XP SP2 Win 2003 SP1/ 2008 Vista (32 bit only) Database SQL Server 2000 SP4 / 2005 SP1 / MSDE / 2005 Express

9 Design concepts and algorithms
Structural analysis - Input File Qual2E Input Data 표제 자료 Hec-Ras Basic information for modeling Control data BOD, DO, N, P, Algae Various parameters Parameters of temperature temperature Hec-Ras Length and condition of reaches Reach information Hec-Ras Data of catchments of each reach Catchments Data of incremental Incremental Hec-Ras Hydraulic parameters Hydraulic parameters Re-action parameters of BOD, DO, N, P, Algae Reaction parameters Initial condition of Temp, BOD, DO, N, P, Algae Initial condition II Delivery Coeff. Incremental information of BOD, DO, N, P, Algae Initial condition III Input data Information of junction Junction Headwater Headwater GIS Data Information of pollution Point pollution Parameters of re-aeration Re-aeration GIS Data Datum of climate climate

10 Design concepts and algorithms
Structural analysis - Classification Information of elements Control data Re-aeration Point source pollution Headwater Junction Initial conditions Re-action parameters Hydraulic parameters Incremental data Catchments of reach Spatial information Parameters of Temp. Various parameters Control Title data Result of HEC-RAS incremental of BOD, DO Using delivery coeff. GIS The user Users defined Automatic

11 Topics your audience cares about
1 2 3 4 Topics you know well Topics you love Topics your audience cares about

12 @PPT精选 整理收集 Thank You!


Download ppt "Security Challenge form Computerized Corporation"

Similar presentations


Ads by Google