'COMPUTER'에 해당되는 글 13건

  1. 2009.04.22 What Oracle Sees in Sun by CEOinIRVINE
  2. 2009.03.24 How E-Books Make (A Lot) Of Cents by CEOinIRVINE
  3. 2009.03.07 Early Glance: Computer companies by CEOinIRVINE
  4. 2008.12.27 Why Tech Can't Cure Medical Inflation by CEOinIRVINE
  5. 2008.12.12 Your World View Doesn't Compute by CEOinIRVINE
  6. 2008.12.09 China irks US with computer security review rules by CEOinIRVINE
  7. 2008.12.04 Security Job by CEOinIRVINE
  8. 2008.12.02 Early Glance: Computer companies by CEOinIRVINE
  9. 2008.11.29 Creating a Computer Security Incident Response Team: A Process for Getting Started by CEOinIRVINE
  10. 2008.11.22 Dell's Quarter Saved by Cost Cuts by CEOinIRVINE

What Oracle Sees in Sun

IT 2009. 4. 22. 13:08

Over the past 13 years, Sun Microsystems' Java language has become one of the computer industry's best known brands—and underappreciated assets.

The tension wasn't lost on Sun's new owner, Oracle (ORCL), which on Apr. 20 said it will purchase Silicon Valley pioneer Sun (JAVA) for $7.4 billion in cash. If Oracle has its way, Java will emerge not only as a strong revenue source but also a key component of plans to keep customers loyal for years to come.

During a conference call with analysts on Apr. 20, Oracle CEO Larry Ellison called Java "the single most important software asset we have ever acquired." It's a bold statement from a chief executive who has spent in excess of $40 billion to buy more than 50 software companies since 2005.

Powering PCs and Cell Phones

Ellison is willing to make that call because the Java programming language, widely used to write much of the world's business software, is a key ingredient in Oracle's recipe for ensuring the many products it has already acquired work smoothly together. Java also runs on 800 million PCs and 2.1 billion mobile phones. PC makers and cell-phone vendors, including Nokia (NOK), pay royalties to license the software. "When you look at those numbers, they're enormous," Citigroup (C) analyst Brent Thill says of Java's potential. "Oracle looks at this and says, 'This could be a $1 billion business.'" Yet Java supplied just $220 million of Sun's $13.9 billion in 2008 revenue. "Java is the most valuable brand in software that has no value," says Joshua Greenbaum, principal of industry analysis firm Enterprise Applications Consulting.

Oracle hopes to wring value from the deal in part by cutting costs to make Sun's hardware and software businesses profitable. Oracle also wants to sell Sun's Solaris operating system and servers in tandem with its market-leading database software. Citigroup's Thill estimates Oracle could cut between 40% and 70% of Sun's roughly 33,000 employees. Excluding restructuring costs, Oracle expects Sun to add $1.5 billion in profit during the first year after the acquisition closes this summer, and another $2 billion the following year. Oracle executives declined to say how many jobs would be eliminated.

Buying Sun gives Oracle access to popular software it can wield against its competitors. In addition to Java, Oracle gains Solaris, widely used in industries including telecom and finance. Oracle also picks up the MySQL database, which is available free under an open-source licensing arrangement, and could help Oracle check sales of Microsoft's SQL Server database to smaller companies. "Sun is not a well-managed company," says one industry executive familiar with its business. "But it does have assets that can become lethal weapons for the one owning them."

Little Hardware Experience

But to gain those assets, Oracle also has to take on a hardware business, something it has little experience running. Ellison will have to make a success of Sun's server business, which has been losing money. Oracle has made its own forays into the hardware business, striking a deal with Hewlett-Packard (HPQ) last year to produce servers designed to provide a performance boost to Oracle databases that run on them.

'IT' 카테고리의 다른 글

Ahead of the Bell: Apple to post 2Q earnings  (0) 2009.04.22
AT&T 1Q earnings fall, but tops view  (0) 2009.04.22
Oracle to Buy Sun Microsystems  (0) 2009.04.22
Chrysler lenders offer to swap $2.5B for equity  (0) 2009.04.22
Yahoo! Silent On Microsoft  (0) 2009.04.22
Posted by CEOinIRVINE
l

 

Andrew Savikas, 03.23.09, 06:00 AM EDT

O'Reilly talks about the lessons learned by its foray into e-book publishing.


 

Many people, both inside and outside of the publishing and media industry, are skeptical about the potential of paid content on mobile phones, especially given the troubled history of e-books. I beg to differ. In December 2008, O'Reilly's "iPhone: The Missing Manual" was published as an iPhone app. Since its release, the app has outsold the printed book, which is a best seller in its own right. We're learning a lot from the experience. Here our some of the questions that we're starting to answer.

Was the iPhone app for the "Missing Manual" an anomaly? After all, iPhone owners are the most likely audience for the "Manual."




O'Reilly: Conventional wisdom suggests that when choosing pilot projects, you pick ones with a high likelihood of success. This was a best-selling author on a red-hot topic. We're gearing up to release about 20 more books as iPhone apps, but realistically we don't expect any of those to sell as well as this first one.

Is the iPhone the most convenient place to get content about problems you're trying to solve on a computer?

For many of our readers, a first or second pass through one of our programming books is mainly about orienting to the landscape and getting a sense of the platform and what's possible, not about solving a particular problem at hand. The iPhone is a perfectly suitable environment for that kind of reading.

Won't you make less money selling iPhone apps than books? The computer book market is the computer book market, period. It has a certain size, and that's it. If you convert that market into iPhone app buyers instead of book buyers, say good-bye to your publishing business.

It would be economically bad news to sell a $5 product to someone who would otherwise pay $50. But it's good to sell a $5 product to someone who would not otherwise be a customer (provided, of course, that the marginal revenue exceeds marginal cost). For Safari Books Online, for direct sales of our e-books and now for this (single) iPhone app, the data suggests that they have created growth without sacrificing print market share. For example, our market share for printed computer books sold at retail was 14% in 2004, and is now 16%. According to Nielsen Bookscan data, the print version of iPhone: The Missing Manual has sold nearly as many copies as the next two competing titles combined in the time period since the app version went on sale in December.

This data only goes back to mid-January, but the 90-, 30- and seven-day averages on Amazon sales rank for the printed book have been steadily improving, suggesting that sales of the iPhone app version are not cannibalizing print sales--and may even be helping them.

'IT' 카테고리의 다른 글

"New" 17-inch iMac is Actually the "old" 17-inch iMac  (0) 2009.03.24
Canada's Suncor to buy Petro-Canada  (0) 2009.03.24
Warner Bros. brings film vault into digital age  (0) 2009.03.24
Top 10 Tiny & Awesome Utilities  (0) 2009.03.22
How Cell Towers Work  (0) 2009.03.22
Posted by CEOinIRVINE
l

Shares of some top computer companies are mixed at 10 a.m.:

Apple (nasdaq: AAPL - news - people ) Inc fell $1.90 or 2.1 percent, to $86.94.

Dell (nasdaq: DELL - news - people ) Inc rose $.14 or 1.7 percent, to $8.53.

Hewlett Packard (nyse: HPQ - news - people ) fell $.36 or 1.3 percent, to $26.72.

IBM (nyse: IBM - news - people ) fell $.77 or .9 percent, to $86.71.

Real-Time Quotes
03/06/2009 12:51PM ET
  • HPQ
  • $25.87
  • -4.47%
  • IBM
  • $84.32
  • -3.61%
  • LXK
  • $15.49
  • -1.96%

Lexmark rose $.10 or .6 percent, to $15.90.

Copyright 2009 Associated Press. All rights reserved. This material may not be published broadcast, rewritten, or redistributed

'Business' 카테고리의 다른 글

In Ohio, Obama Calls for 'Bold Action' to Revive Economy  (0) 2009.03.07
Microsoft versus the Big Three  (0) 2009.03.07
At MaxMara  (0) 2009.03.06
Dead End For General Motors?  (0) 2009.03.06
The U.S. Financial System Is Effectively Insolvent  (0) 2009.03.06
Posted by CEOinIRVINE
l

Why Tech Can't Cure Medical Inflation

Lee Gomes, 12.18.08, 06:00 PM EST
Forbes Magazine dated January 12, 2009

Computers in medicine aren't a cure. They might even make the system sicker.

pic

Whenever President-elect Obama is asked how he'll pay for his ambitious health care reform plans, he invariably talks about the $80 billion in annual savings he'll get from bringing computerized recordkeeping to doctors' offices and hospitals.

If only that were true. While there are benefits that might be had from using computers more widely in medicine, doing so won't save us any money and, in fact, will likely make things more expensive. There's even a chance that the quality of care might get worse along the way.

That's probably counterintuitive to anyone contemplating the wall of file drawers in a typical doctor's office. Medicine clearly has yet to join the rest of the world in going digital; no wonder, the thought goes, that U.S. health care is so expensive.

But while paper records certainly have their inconveniences--filling out your thousandth questionnaire, say--they play a very minor role in galloping health care inflation.

Instead, the heart of the problem is the U.S. fee-for-service system, in which doctors get paid to do things to people. The more technical and invasive the procedure, the more money they make. Doctors have responded in the expected Pavlovian manner, collectively shifting away from basic primary care toward expensive specializations that run up costs without necessarily improving medical outcomes.

As any chief information officer can tell you, adding computers to this sort of inefficient process only makes the inefficiency happen more quickly.

Much of what doctors or policymakers know about technology comes from vendors, who are busy guilt-tripping the medical sector about being slow to get with it. But more quietly, health care economists have been studying the actual impact of these systems. Their findings should disturb those who look to information technology for an easy fix.


Posted by CEOinIRVINE
l

pic

Since computers are, if nothing else, starkly logical, for as long as they have been around, there have been people who have hoped that the machines might serve as an example to their human overlords, helping to make certain human affairs--politics, say--a little more logical too.

One of them is Scott Aaronson, a computer scientist at M.I.T. with an idea for a program designed to help people appreciate that the logical path they have just traveled in a political or other discussion might not have been entirely straight and narrow.

Despite being just 27 years old and in only the second year of his professorship, Aaronson is widely known in his field, quantum computing.

Quantum computers work in ways utterly different from conventional ones, and can do some tasks--breaking encryption, say--unimaginably quickly. So far, only small-scale, prototype quantum computers have been built, and it's not yet clear whether one big enough to be useful will ever be technically possible.

Aaronson's work involves quantum software, meaning, as members of his field like to say, that he spends his time thinking about programs for machines that might never get built.

One of his side projects, though, is a work-in-progress political program called the Worldview Manager. It has nothing to do with quantum machines or, indeed, of advanced computing of any sort. In fact, it's so simple and straightforward an idea that you could write it with macros in Excel.

The goal of Worldview Manager, explains Aaronson, is to help people appreciate the inconsistencies and contradictions that might crop up in their social and political beliefs.

Posted by CEOinIRVINE
l

The Chinese government is stirring trade tensions with Washington with a plan to require foreign computer security technology to be submitted for government approval, in a move that might require suppliers to disclose business secrets.

Rules due to take effect May 1 require official certification of technology widely used to keep e-mail and company data networks secure. Beijing has yet to say how many secrets companies must disclose about such sensitive matters as how data-encryption systems work. But Washington complains the requirement might hinder imports in a market dominated by U.S. companies, and is pressing Beijing to scrap it.

"There are still opportunities to defuse this, but it is getting down to the wire," said Duncan Clark, managing director of BDA China Ltd., a Beijing technology consulting firm. "It affects trade. It's potentially really wide-scale."

Beijing tried earlier to force foreign companies to reveal how encryption systems work and has promoted its own standards for mobile phones and wireless encryption.

Those attempts and the new demand reflect Beijing's unease about letting the public keep secrets, and the government's efforts to use its regulatory system to help fledgling Chinese high-tech companies compete with global high-tech rivals. Yin Changlai, the head of a Chinese business group sanctioned by the government, has acknowledged that the rules are meant to help develop China's infant computer security industry by shielding companies from foreign rivals that he said control 70 percent of the market.

The computer security rules cover 13 types of hardware and software, including database and network security systems, secure routers, data backup and recovery systems and anti-spam and anti-hacking software. Such technology is enmeshed in products sold by Microsoft Corp. (nasdaq: MSFT - news - people ), Cisco Systems Inc. (nasdaq: CSCO - news - people ) and other industry giants.

Giving regulators the power to reject foreign technologies could help to promote sales of Chinese alternatives. But that might disrupt foreign manufacturing, research or data processing in China if companies have to switch technologies or move operations to other countries to avoid the controls. Requiring disclosure of technical details also might help Beijing read encrypted e-mail or create competing products.





Posted by CEOinIRVINE
l

Security Job

Hacking 2008. 12. 4. 12:41

Rank 544 658
Rank change on same period last year Up+114
Matching permanent IT job ads 331 333
As % of all UK permanent IT job ads sampled 0.222 % 0.151 %
As % of the category below 0.378 % 0.273 %
Salaries quoted 260 245
Average minimum salary £49,504 £47,462
Average salary £55,087 £53,437
% change on same period last year +3.08 %
Average maximum salary £60,670 £59,412
UK excluding London average salary £53,532 £52,738
% change on same period last year +1.50 %
IT Job Market, Processes & Methodologies Processes & Methodologies
UK
Matching permanent IT job ads 87580 122189
As % of all UK permanent IT job ads sampled 58.83 % 55.45 %
Salaries quoted 73512 98005
Average minimum salary £42,973 £44,478
Average salary £46,983 £48,593
% change on same period last year -3.31 %
Average maximum salary £50,994 £52,707
UK excluding London average salary £42,938 £44,651
% change on same period last year -3.83 %

Penetration Testing
Demand Trend

The chart provides the 3-month moving total beginning in 2004 of permanent IT jobs citing Penetration Testing within the UK as a proportion of the total demand within the Processes & Methodologies category.

Penetration Testing Demand Trend

Penetration Testing
Salary Trend

The chart provides the 3-month moving average for salaries quoted in permanent IT jobs citing Penetration Testing within the UK.

Penetration Testing Salary Trend

Penetration Testing
Salary Histogram

The chart provides a salary histogram for IT jobs citing Penetration Testing over the 3 months to 3 December 2008 within the UK.

Penetration Testing Salary Histogram

Penetration Testing
Top 30 Job Locations

The table below looks at the demand and provides a guide to the average salaries quoted in IT jobs citing Penetration Testing within the UK over the 3 months to 3 December 2008. The 'Rank Change' column provides an indication of the change in demand within each location based on the same 3 month period last year. A positive number indicates a relative increase in demand.

Location Rank Change
on Same Period
Last Last
Matching
Permanent
IT Job Ads
Average Salary
Last 3 Months
Average Salary
% Change
on Same Period
Last Year
England Up+137 312 £55,205 +7.46 %
South East Up+122 98 £58,093 +17.60 %
London Up+79 94 £58,864 +8.30 %
West Sussex New entry- 41 £66,220 -
Gatwick New entry- 41 £66,220 -
North West Up+28 31 £43,542 -10.44 %
Manchester Up+17 28 £43,571 -9.15 %
South West Up+18 24 £47,250 -24.40 %
Yorkshire Up+41 23 £42,900 +7.79 %
West Yorkshire Up+22 21 £42,375 +6.47 %
Berkshire Up+56 18 £51,885 -20.48 %
City of London Down-12 17 £57,917 +27.16 %
West Midlands Up+18 15 £48,889 +33.94 %
East of England Up+46 14 £51,727 +18.00 %
Hampshire Up+26 14 £43,846 +3.77 %
Somerset Down-24 13 - -
Bath Down-26 13 - -
Leeds Up+20 11 £41,667 +4.69 %
Surrey Up+44 9 £50,056 +2.85 %
Hammersmith New entry- 8 £37,500 -
Staffordshire Up+9 7 £48,333 -
Worcestershire New entry- 5 - -
Cambridge Up+15 5 £45,000 +23.71 %
Canary Wharf New entry- 5 £69,000 -
Essex New entry- 5 £61,000 -
Cambridgeshire Up+26 5 £45,000 +23.71 %
Hertfordshire Up+15 4 £43,000 -26.80 %
Reading Up+6 4 £46,250 -33.24 %
Cheltenham New entry- 4 £45,000 -
Watford New entry- 4 £43,000 -

Penetration Testing
Top 30 Related IT Skills

For the 6 months to 3 December 2008, IT jobs within the UK citing Penetration Testing also mentioned the following IT skills in order of popularity. The figures indicate the number of jobs and their proportion against the total number of IT job ads sampled that cited Penetration Testing.

1 212 (29.65 %) Information Security
2 210 (29.37 %) CISSP
3 183 (25.59 %) Network Security
4 174 (24.34 %) Firewall
5 129 (18.04 %) Finance
6 124 (17.34 %) Security Testing
7 113 (15.80 %) Degree
8 101 (14.13 %) Cisco
9 99 (13.85 %) UNIX
10 90 (12.59 %) TCP/IP
11 88 (12.31 %) ISO27001
12 86 (12.03 %) PCI DSS
13 85 (11.89 %) Security Cleared
14 81 (11.33 %) Windows
15 76 (10.63 %) Risk Assessment
16 72 (10.07 %) Linux
17 71 (9.930 %) Microsoft
17 71 (9.930 %) Government
18 66 (9.231 %) Security Management
18 66 (9.231 %) Internet
19 65 (9.091 %) Ethical Hacking
20 64 (8.951 %) SC Cleared
21 62 (8.671 %) Perl
22 61 (8.531 %) Risk Management
23 60 (8.392 %) Java
24 59 (8.252 %) VPN
25 54 (7.552 %) Cisco Certification
26 51 (7.133 %) CheckPoint
26 51 (7.133 %) Telecoms
27 49 (6.853 %) CISM

Penetration Testing
Top Related IT Skills by Category

For the 6 months to 3 December 2008, IT jobs within the UK citing Penetration Testing also mentioned the following IT skills grouped by category. The figures indicate the number of jobs and their proportion against the total number of IT job ads sampled that cited Penetration Testing. Up to 20 skills are shown per category.

IT Job Market, Application DevelopmentApplication Development
1 34 (4.755 %) .NET
2 20 (2.797 %) CSS
2 20 (2.797 %) Ruby on Rails
3 16 (2.238 %) ASP.NET
4 12 (1.678 %) WebServices
5 7 (0.979 %) XML
6 6 (0.839 %) JSP
7 5 (0.699 %) WebSphere
8 4 (0.559 %) Java ME
8 4 (0.559 %) AJAX
9 3 (0.420 %) Spring
9 3 (0.420 %) SOAP
9 3 (0.420 %) Struts
9 3 (0.420 %) J2EE
9 3 (0.420 %) ASP
10 2 (0.280 %) HTML
10 2 (0.280 %) Java SE
10 2 (0.280 %) FIX Protocol
10 2 (0.280 %) CGI
10 2 (0.280 %) LAMP
IT Job Market, Application PlatformsApplication Platforms
1 7 (0.979 %) IIS
2 4 (0.559 %) MS Exchange
2 4 (0.559 %) WebLogic
3 3 (0.420 %) Apache
3 3 (0.420 %) SharePoint
4 1 (0.140 %) ColdFusion
4 1 (0.140 %) Exchange Server 2003
IT Job Market, ApplicationsApplications
1 17 (2.378 %) MS Excel
2 15 (2.098 %) MS Office
IT Job Market, Communications & NetworkingCommunications & Networking
1 183 (25.59 %) Network Security
2 174 (24.34 %) Firewall
3 90 (12.59 %) TCP/IP
4 66 (9.231 %) Internet
5 59 (8.252 %) VPN
6 44 (6.154 %) Intrusion Detection
7 40 (5.594 %) LAN
8 33 (4.615 %) Wireless
9 32 (4.476 %) VoIP
10 31 (4.336 %) WAN
11 27 (3.776 %) Cisco PIX
12 23 (3.217 %) NetScreen
13 18 (2.517 %) LDAP
14 17 (2.378 %) H.323
14 17 (2.378 %) Cisco IOS
15 16 (2.238 %) IPsec
15 16 (2.238 %) SSL
15 16 (2.238 %) WLAN
16 15 (2.098 %) HTTP
17 12 (1.678 %) FTP
IT Job Market, Database & Business IntelligenceDatabase & Business Intelligence
1 49 (6.853 %) GIS
2 36 (5.035 %) SQL Server
3 20 (2.797 %) MySQL
4 15 (2.098 %) DB2
5 11 (1.538 %) Oracle 8/8i
IT Job Market, Development ApplicationsDevelopment Applications
1 17 (2.378 %) Paros
1 17 (2.378 %) Metasploit
2 5 (0.699 %) AppScan
3 3 (0.420 %) LoadRunner
4 2 (0.280 %) Rational Robot
4 2 (0.280 %) JMeter
4 2 (0.280 %) QuickTest Pro
4 2 (0.280 %) SilkTest
4 2 (0.280 %) QARun
4 2 (0.280 %) WATIR
4 2 (0.280 %) Selenium
4 2 (0.280 %) WebLOAD
4 2 (0.280 %) FitNesse
IT Job Market, GeneralGeneral
1 129 (18.04 %) Finance
2 71 (9.930 %) Government
3 51 (7.133 %) Telecoms
4 49 (6.853 %) Banking
5 44 (6.154 %) Auditing
6 31 (4.336 %) Financial Institution
7 25 (3.497 %) Insurance
8 20 (2.797 %) FMCG
9 17 (2.378 %) Health
10 13 (1.818 %) Education
10 13 (1.818 %) Investment Banking
10 13 (1.818 %) Pensions
11 9 (1.259 %) Legal
12 7 (0.979 %) Home Office
12 7 (0.979 %) International Banking
13 6 (0.839 %) Online Betting
13 6 (0.839 %) Games
14 4 (0.559 %) Retail
15 3 (0.420 %) Military
16 2 (0.280 %) Publishing
IT Job Market, Job TitlesJob Titles
1 214 (29.93 %) Consultant
2 134 (18.74 %) Tester
3 129 (18.04 %) Penetration Tester
4 95 (13.29 %) Security Manager
5 90 (12.59 %) Security Consultant
6 76 (10.63 %) Analyst
7 70 (9.790 %) Security Analyst
8 39 (5.455 %) IT Security Manager
9 36 (5.035 %) Security Specialist
10 29 (4.056 %) Senior Consultant
11 26 (3.636 %) Security Engineer
12 24 (3.357 %) Team Leader
13 22 (3.077 %) Information Manager
14 21 (2.937 %) Test Consultant
14 21 (2.937 %) Developer
15 20 (2.797 %) Operations Analyst
15 20 (2.797 %) Internet Developer
16 18 (2.517 %) Senior Analyst
16 18 (2.517 %) Applications Tester
17 15 (2.098 %) Senior Security Analyst
IT Job Market, MiscellaneousMiscellaneous
1 45 (6.294 %) Computer Science
2 35 (4.895 %) CESG
3 24 (3.357 %) Management Information System
4 20 (2.797 %) PKI
5 19 (2.657 %) Biometrics
6 18 (2.517 %) Data Protection Act
7 16 (2.238 %) Cryptography
8 12 (1.678 %) Mainframe
9 10 (1.399 %) Client/Server
10 8 (1.119 %) CESG CLAS
11 6 (0.839 %) French Language
12 3 (0.420 %) German Language
13 2 (0.280 %) Italian Language
13 2 (0.280 %) Russian Language
13 2 (0.280 %) Spanish Language
13 2 (0.280 %) IBM Mainframe
13 2 (0.280 %) iSeries
13 2 (0.280 %) SecurID
14 1 (0.140 %) Clustering
14 1 (0.140 %) N-Tier
IT Job Market, Operating SystemsOperating Systems
1 99 (13.85 %) UNIX
2 81 (11.33 %) Windows
3 72 (10.07 %) Linux
4 26 (3.636 %) Solaris
5 9 (1.259 %) Windows Server 2003
6 4 (0.559 %) Windows XP
6 4 (0.559 %) AIX
7 3 (0.420 %) HPUX
8 1 (0.140 %) Windows 2000
8 1 (0.140 %) Windows NT
8 1 (0.140 %) Windows Server 2008
IT Job Market, Processes & MethodologiesProcesses & Methodologies
1 212 (29.65 %) Information Security
2 124 (17.34 %) Security Testing
3 85 (11.89 %) Security Cleared
4 76 (10.63 %) Risk Assessment
5 66 (9.231 %) Security Management
6 65 (9.091 %) Ethical Hacking
7 64 (8.951 %) SC Cleared
8 61 (8.531 %) Risk Management
9 44 (6.154 %) Business Continuity
10 39 (5.455 %) Identity Management
11 35 (4.895 %) Vulnerability Assessment
12 33 (4.615 %) BCP
13 29 (4.056 %) Data Protection
14 26 (3.636 %) Business Development
15 19 (2.657 %) OWASP
15 19 (2.657 %) ITIL
16 18 (2.517 %) Service Delivery
17 17 (2.378 %) OSSTMM
18 16 (2.238 %) Project Management
18 16 (2.238 %) Data Security
IT Job Market, Programming LanguagesProgramming Languages
1 62 (8.671 %) Perl
2 60 (8.392 %) Java
3 37 (5.175 %) C++
4 33 (4.615 %) Python
5 32 (4.476 %) C
6 28 (3.916 %) Ruby
7 24 (3.357 %) JavaScript
7 24 (3.357 %) PHP
8 22 (3.077 %) SQL
9 11 (1.538 %) VB
10 10 (1.399 %) Shell Script
11 8 (1.119 %) C#
12 5 (0.699 %) VBScript
13 2 (0.280 %) DHTML
13 2 (0.280 %) Jython
IT Job Market, QualificationsQualifications
1 210 (29.37 %) CISSP
2 113 (15.80 %) Degree
3 54 (7.552 %) Cisco Certification
4 49 (6.853 %) CISM
5 40 (5.594 %) CEH
6 37 (5.175 %) ISEB
7 31 (4.336 %) CISA
8 21 (2.937 %) CCNA
9 20 (2.797 %) CCNP
9 20 (2.797 %) Microsoft Certification
10 18 (2.517 %) GIAC
11 13 (1.818 %) MCSE
12 12 (1.678 %) CCIE
13 11 (1.538 %) CCSP
13 11 (1.538 %) CCDP
14 8 (1.119 %) CCSE
15 6 (0.839 %) CCSA
16 4 (0.559 %) CHFI
17 2 (0.280 %) SCNA
18 1 (0.140 %) CISMP
IT Job Market, Quality Assurance & ComplianceQuality Assurance & Compliance
1 88 (12.31 %) ISO27001
2 86 (12.03 %) PCI DSS
3 41 (5.734 %) PCI QSA
4 30 (4.196 %) Sarbanes-Oxley
5 15 (2.098 %) COBIT
5 15 (2.098 %) BS7799
6 9 (1.259 %) ISO17799
7 4 (0.559 %) QA
8 1 (0.140 %) HIPAA
8 1 (0.140 %) PABP
8 1 (0.140 %) COSO
IT Job Market, System SoftwareSystem Software
1 32 (4.476 %) Active Directory
2 25 (3.497 %) Nmap
3 17 (2.378 %) ISA Server
4 5 (0.699 %) WebInspect
5 2 (0.280 %) ProxySG
6 1 (0.140 %) Snort
6 1 (0.140 %) Backup Exec
IT Job Market, Systems ManagementSystems Management
1 27 (3.776 %) Nessus
2 15 (2.098 %) CA SiteMinder
3 4 (0.559 %) MOM
4 1 (0.140 %) Systems Management Server (SMS)
4 1 (0.140 %) MAILsweeper
IT Job Market, VendorsVendors
1 101 (14.13 %) Cisco
2 71 (9.930 %) Microsoft
3 51 (7.133 %) CheckPoint
4 44 (6.154 %) Oracle
5 28 (3.916 %) Juniper
6 17 (2.378 %) Nortel
7 12 (1.678 %) Blue Coat
8 11 (1.538 %) HP
9 10 (1.399 %) Symantec
10 9 (1.259 %) Nokia
10 9 (1.259 %) Sybase
11 8 (1.119 %) IBM
12 7 (0.979 %) McAfee Security
13 6 (0.839 %) Crossbeam
14 5 (0.699 %) Reuters
15 3 (0.420 %) VMware
15 3 (0.420 %) WatchGuard
15 3 (0.420 %) IronPort
16 2 (0.280 %) Finjan
16 2 (0.280 %) Websense

'Hacking' 카테고리의 다른 글

Getting Started Reverse Engineering  (0) 2008.12.16
Problems with Penetration Testing  (0) 2008.12.08
Manual Unpacking of UPX Packed PE File  (0) 2008.12.04
General IP Stack Tuning Recommendations  (0) 2008.11.29
Denial of Service Attacks  (0) 2008.11.29
Posted by CEOinIRVINE
l

Shares of some top computer companies are down at 10 a.m.:

Apple (nasdaq: AAPL - news - people ) Inc fell $2.61 or 2.8 percent, to $90.06.

Dell (nasdaq: DELL - news - people ) Inc fell $.72 or 6.4 percent, to $10.45.

Hewlett Packard (nyse: HPQ - news - people ) fell $1.28 or 3.6 percent, to $34.00.

IBM (nyse: IBM - news - people ) fell $2.34 or 2.9 percent, to $79.26.

Lexmark fell $.47 or 1.8 percent, to $25.71.

Posted by CEOinIRVINE
l
 

Creating a Computer Security Incident Response Team: A Process for Getting Started

Introduction
What are the questions?
What are some of the best practices for creating a CSIRT?
     Step 1: Obtain management support and buy-in
     Step 2: Determine the CSIRT strategic plan
     Step 3: Gather relevant information
     Step 4: Design the CSIRT vision
     Step 5: Communicate the CSIRT vision and operational plan
     Step 6: Begin CSIRT implementation
     Step 7: Announce the operational CSIRT
     Step 8: Evaluate CSIRT effectiveness
Remember that patience can be a key
Resources and more information on creating a CSIRT


Keeping organizational information assets secure in today's interconnected computing environment is a true challenge that becomes more difficult with each new "e" product and each new intruder tool. Most organizations realize that there is no one solution or panacea for securing systems and data; instead a multi-layered security strategy is required. One of the layers that many organizations are including in their strategy today is the creation of a Computer Security Incident Response Team, generally called a CSIRT.

Motivators driving the establishment of CSIRTs include

  • a general increase in the number of computer security incidents being reported
  • a general increase in the number and type of organizations being affected by computer security incidents
  • a more focused awareness by organizations on the need for security policies and practices as part of their overall risk-management strategies
  • new laws and regulations that impact how organizations are required to protect information assets
  • the realization that systems and network administrators alone cannot protect organizational systems and assets

What Are the Questions?

As organizations begin to build their incident response capability, they are looking to determine the best strategy for putting such a structure in place. They not only want to know what has worked well for others, but also want some guidance on the process and requirements they must follow to establish an effective incident response capability.

CSIRTs and their parent organizations have numerous questions they want answered to help them design their response capability. They are also interested in knowing what other teams in similar industry sectors are doing. Typical questions being asked include but are not limited to the following:

  • What are the basic requirements for establishing a CSIRT?
  • What type of CSIRT will be needed?
  • What type of services should be offered?
  • How big should the CSIRT be?
  • Where should the CSIRT be located in the organization?
  • How much will it cost to implement and support a team?
  • What are the initial steps to follow to create a CSIRT?

There is not a standard set of answers to these questions. CSIRTs are as unique as the organizations they service, and as a result, no two teams are likely to operate in the exact same manner. It is important for the organization to decide why it is building a CSIRT and what it wants that CSIRT to achieve. Once this is determined, then the unique set of answers to these questions can be formulated.

This document is the first in a series of articles that will discuss the issues and decisions to be addressed when planning and implementing a CSIRT. This first article will focus on an overview of the basic high-level steps to be taken by organizations as they design and build a CSIRT. The article is written as a general guideline for any organization that is thinking about undertaking such an endeavor or for any individuals who are members of a project team that is working to establish a CSIRT.

What Are Some Best Practices for Creating a CSIRT?

Although CSIRTs will differ in how they operate depending on the available staff, expertise, budget resources, and unique circumstances of each organization, there are some basic practices that apply to all CSIRTs. We will discuss some of those practices as they relate to creating a CSIRT. (For more information on what a CSIRT is, see the CSIRT FAQ.) Although these actions are presented as steps, the process is not sequential; many steps can occur in parallel.

The steps are as follows:

Step 1: Obtain Management Support and Buy-In

Our experience shows that without management approval and support, creating an effective incident response capability can be extremely difficult and problematic. This support must be shown in numerous ways, including the provision of resources, funding, and time, to the person or group of people who will act as the project team for implementing the CSIRT. This also includes executive and business or department managers and their staffs committing time to participate in this planning process; their input is essential during the design effort.

It is important to elicit management's expectations and perceptions of the CSIRT's function and responsibilities. Without this information, a team may be built whose services and authority are not understood or appropriately used by the rest of the organization.

Along with obtaining management support for the planning and implementation process, it is equally important to get management commitment to sustain CSIRT operations and authority for the long term. Once the team is established, how is it maintained and expanded with budget, personnel, and equipment resources? Will the role and authority of the CSIRT continue to be backed by management across the various constituencies or parent organization? Without this continued support the CSIRT's long-term success may be in jeopardy.

Step 2: Determine the CSIRT Development Strategic Plan

Think about how to manage the development of the CSIRT. What administrative issues must be dealt with, and what project management issues must be addressed?

  • Are there specific timeframes to be met? Are they realistic, and if not, can they be changed?
  • Is there a project group? Where do the group members come from? You want to ensure that all stakeholders are represented. Some may not be on the team for the whole project, but brought in to provide subject matter expertise and input as needed. You also want to incorporate best practices in project management, organizational behavior theory, and communications theory into your plan. If anyone has a background in these areas, consider having them participate on the team.
  • How do you let the organization know about the development of the CSIRT? A memo sent from the CIO, CEO, or other high-level manager announcing the project and asking each key stakeholder and area to provide assistance in any way possible is a good way to start. Letting the organization know about the plan for a CSIRT in the early stages of development can help staff feel they are part of the design process.
  • If you have a project team, how do you record and communicate the information you are collecting, especially if the team is geographically dispersed?

Step 3: Gather Relevant Information

Gather information to determine the incident response and service needs that the organization has. Take a look at the types of incident activity currently being reported within your constituency. This helps determine not only what type of services to offer but also the types of skills and expertise the CSIRT staff will need. For example, if your organization has been the victim of computer virus or worm activity, you will need staff with virus experience to handle the response. You will also need virus scanning, elimination, and recovery procedures, along with the appropriate anti-virus tools. You may want people with good training and documentation skills to help develop user awareness programs as a proactive step in dealing with virus activity.

Identify what information you need to know to plan and implement the CSIRT. Determine who has that information and how best to elicit that information, either through general discussions or interviews or by making them part of the project.

Meet with key stakeholders to discuss not only their incident response needs, but to achieve an initial consensus on the expectations, strategic direction, definitions, and responsibilities of the CSIRT. Your definition of what a CSIRT is and does may be very different from your manager's definition or the definition of another part of your organization. Use these discussions with the stakeholders to outline and identify how each group will need to interact with the CSIRT. The stakeholders could include but are not limited to

  • Business managers. They need to understand what the CSIRT is and how it can help support their business processes. Agreements must be made concerning the CSIRT's authority over business systems and who will make decisions if critical business systems must be disconnected from the network or shut down.
  • Representatives from IT. How does the IT staff and the CSIRT interact? What actions are taken by IT staff and what actions are taken by CSIRT members during response operations? Will the CSIRT have easy access to network and systems logs for analysis purposes? Will the CSIRT be able to make recommendations to improve the security of the organizational infrastructure?
  • Representatives from the legal department. When and how is the legal department involved in incident response efforts? Legal staff may also be needed to review non-disclosure agreements, develop appropriate wording for contacting other sites and organizations, and determine site liability for computer security incidents.
  • Representatives from human resources. They can help develop job descriptions to hire CSIRT staff, and develop policies and procedures for removing internal employees found engaging in unauthorized or illegal computer activity.
  • Representatives from public relations. They must be prepared to handle any media inquiries and help develop information-disclosure policies and practices.
  • Any existing security groups, including physical security. The CSIRT will need to exchange information with these groups about computer incidents and may share responsibility with them for resolving issues involving computer or data theft.
  • Audit and risk management specialists. They can help develop threat metrics and vulnerability assessments, along with encouraging computer security best practices across the constituency or organization.
  • General representatives from the constituency, who can provide insight into their needs and requirements.

Stakeholders should also include anyone who will be involved in the incident-handling or notification process. Think about who will need to be notified during different types of incidents. Are there people in other parts of the organization or constituency who can provide information or input to the CSIRT or with whom the CSIRT will need to share or obtain information? These may include other parts of the IT or security departments, including any groups doing vulnerability assessments, intrusion detection, or network monitoring. Knowing what the CSIRT will need to do can help you identify the right people to be involved in developing the procedures.

Find out if anyone else is currently performing any of the services that the CSIRT may be looking to provide. Determine if those services should stay with the current group or move to the CSIRT over some agreed-to period of time. Addressing these types of issues in the planning stages can help identify what responsibilities will need to be delineated and what information will need to be gathered.

There may also be some resources available for review that will help in your information gathering. These may include

  • organization charts for the enterprise and specific business functions
  • topologies for organizational or constituency systems and networks
  • critical system and asset inventories
  • existing disaster-recovery or business-continuity plans
  • existing guidelines for notifying the organization of a physical security breach
  • any existing incident-response plans
  • any parental or institutional regulations
  • any existing security policies and procedures

Reviewing these documents serves a dual purpose: first, to identify existing stakeholders, resources, and system owners; and second, to provide an overview of existing policies to which the CSIRT must adhere. As a bonus, these documents may contain text that can be adapted when developing CSIRT policies, procedures, or documentation. They may also include general notification lists of organizational representatives who must be contacted during emergencies. Such lists may be adapted for CSIRT work and processes.

In addition, investigate what similar organizations are doing to provide incident handling services or to organize a CSIRT. If you have contacts at these organizations, see if you can talk to them about how their team was formed. Take a look at other CSIRTs' web sites, and check their missions, charters, funding scheme, and service listing. This may give you ideas for organizing your team. Review any books or other publications about incident handling or CSIRTs. An initial list of resources can be found at the CERT CSIRT Development web page.

Attend courses or conferences that include sessions for developing incident response strategies or creating CSIRTs. These venues can provide you with opportunities to exchange ideas and interact with others in the incident response field. A good place to start may be to attend the annual FIRST conference.

Step 4: Design your CSIRT Vision

As the information gathered brings to the forefront the incident response needs of the constituency and as you build your understanding of management expectations, you can begin to identify the key components of the CSIRT. This allows you to define the vision for the CSIRT and its goals and functions. You need both management and constituent buy-in and support of these goals and functions for the CSIRT to be successful.

It is important to achieve clear agreement on the definition and expectations for the CSIRT being formed. What the CSIRT staff thinks the team will do and what the managers and general constituency think the CSIRT will do may be completely different. A number of people have the perception that a CSIRT is a "cyber cop" for an organization or constituency. While this may be true for a small number of teams, it is not generally the main focus of a CSIRT. The main focus is to prevent and respond to incidents. The vision for the CSIRT must include a clear explanation of where these CSIRT functions fit into the current organizational structure and how the CSIRT interacts with its constituency. The vision explains what benefits the CSIRT provides, what processes it enacts, who it coordinates with, and how it performs its response activities.

In creating your vision, you should

  • Identify your constituency. Who does the CSIRT support and service?
  • Define your CSIRT mission, goals, and objectives. What does the CSIRT do for the identified constituency?
  • Select the CSIRT services to provide to the constituency (or others). How does the CSIRT support its mission?
  • Determine the organizational model. How is the CSIRT structured and organized?
  • Identify required resources. What staff, equipment, and infrastructure is needed to operate the CSIRT?
  • Determine your CSIRT funding. How is the CSIRT funded for its initial startup and its long-term maintenance and growth?

Step 5: Communicate the CSIRT Vision

Communicate the CSIRT vision and operational plan to management, your constituency, and others who need to know and understand its operations. As appropriate, make adjustments to the plan based on their feedback.

Communicating your vision in advance can help identify process or organizational problems before implementation. It is a way to let people know what is coming and allow them to provide input into CSIRT development. This is a way to begin marketing the CSIRT to the constituency and gaining the needed buy-in from all organizational levels.

You may receive information that was missed or not available during the information-gathering stage. Use this information and input to make any final adjustments to the CSIRT organizational structure and processes.

Step 6: Begin CSIRT Implementation

Once management and constituency buy-in is obtained for the vision, begin the implementation:

  • Hire and train initial CSIRT staff.
  • Buy equipment and build any necessary network infrastructure to support the team.
  • Develop the initial set of CSIRT policies and procedures to support your services.
  • Define the specificiations for and build your incident-tracking system.
  • Develop incident-reporting guidelines and forms for your constituency.

A main resource you will need for your constituency is your incident-reporting guidelines. These guidelines define how your constituency interacts with your CSIRT, what constitutes an incident, what types of incidents to report, who should report an incident, why an incident should be reported, the process for reporting an incident, and the process for responding to an incident. They should be clear and understandable by the constituency being served.

The process for reporting an incident includes a detailed description of the mechanisms for submitting reports: phone, email, web form, or some other mechanism. It should also include details about what type of information should be included in the report.

The process for responding to an incident details how the CSIRT prioritizes and handles received reports. This includes how the person reporting an incident is notified of its resolution, any response timeframes that must be followed, and any other notification that occurs.

For an example of incident reporting guidelines, see the CERT/CC Incident Reporting Guidelines.

Step 7: Announce the CSIRT

When the CSIRT is operational, announce it broadly to the constituency or parent organization. It is best if this announcement comes from sponsoring management. Include the contact information and hours of operation for the CSIRT in the announcement. This is an excellent time to make available the CSIRT incident-reporting guidelines. You may also want to develop information to publicize the CSIRT, such as a simple flyer or brochure outlining the CSIRT mission and services, which can be distributed with the announcement. Some teams have held an open house or special celebration to announce the operational CSIRT.

Step 8: Evaluate the Effectiveness of the CSIRT

Once the CSIRT has been in operation for a while, management will want to determine the effectiveness of the team and use evaluation results to improve CSIRT processes and ensure that the team is meeting the needs of the constituency. The CSIRT, in conjunction with management and the constituency, will need to develop a mechanism to perform such an evaluation.

Information on effectiveness can be gathered through a variety of feedback mechanisms, including

  • benchmarking against other CSIRTs
  • general discussions with constituency representatives
  • evaluation surveys distributed to constituency members on a periodic basis
  • creation of a set of criteria or quality parameters that is then used by an audit or third party group to evaluate the team

It may be helpful to review previously collected information on the state of the constituency or organization before the implementation of the team. This information can be used as a baseline in determining the effect of the CSIRT on the constituency. Information collected for comparison may include

  • number of reported incidents
  • response time or time-to-live of an incident
  • number of incidents successfully resolved
  • information reported to the constituency about computer security issues or ongoing activity
  • attentiveness to security issues within the organization
  • preventative techniques and security practices in place

See section 2.2.4 of the Handbook for Computer Security Incident Response Teams for more information on evaluating the quality of CSIRT services.

Remember that Patience Can Be a Key

The length of time it will take to design, plan, and implement a team will vary with each organizational situation. We have seen CSIRTs become operational across a wide range of times, from two months to two years. It is important to realize that it can take about 12-18 months to work out the processes and procedures, especially for a large, distributed enterprise. After the team is operational, it can take another 12-18 months to obtain a good level of trust and comfort with your constituency. Many teams show a large growth in the number of incidents reported over their first year of operation. The longer you are in operation, the more your constituency will understand the work you are doing and the more likely that they will report to you.

Resources and More Information on Creating a CSIRT

The components discussed above are more fully discussed in the following:

These resources may provide additional insight:

  • Forming an Incident Response Team
    A paper examining the role a response team may play in the community and the issues that should be addressed both during the formation and after commencement of operations. This paper was written by a former member of the Australian Computer Emergency Response Team.

  • Expectations for Computer Security Incident Response (RFC 2350)
    This is a best practices document, which recommends general requirements and behaviors that a CSIRT should follow when establishing or operating a team. It focuses on methods for letting the CSIRT constituency know about the team's services and processes.

  • Avoiding the Trial-by-Fire Approach to Security Incidents
    This article discusses the importance of having an organized and defined process for detecting and responding to computer security incidents.

  • The CERT® Guide to System and Network Security Practices
    The CERT security practices have been compiled in this book published by Addison-Wesley and available at walk-in and online bookstores. Using a practical, phased approach, the book shows administrators how to protect systems and networks against malicious and inadvertent compromise based on security incidents reported to the CERT/CC
Posted by CEOinIRVINE
l

Defying investors' fears that its earnings would fall victim to slumping tech demand, Dell turned in a surprisingly profitable third fiscal quarter by taking a big ax to costs.

Although Dell's (DELL) sales were more than $1 billion short of Wall Street estimates for the quarter that ended Oct. 31, a combination of job cuts, a hiring freeze, and lower materials costs helped earnings reach 37¢ per share, beating analysts' modest expectations of 31¢ per share. Shares of Dell gained more than 5% in extended trading. Earlier, the stock had lost 54¢, or 5.2%, to close at 9.81, amid a market slump.

Revenue and net income declined from a year earlier, but investors said Dell was successfully protecting profit amid a global economic slowdown that's sapped business and consumer demand for new computers and other tech gear. "In previous quarters it looked like the company was willing to grow share at any cost," says Bill Kreher, a technology analyst at Edward Jones who has a buy rating on Dell. That's what happened in the second quarter, when profit fell 17% on overly aggressive price cuts (BusinessWeek.com, 8/29/08). "In this environment they're aware that investors are more concerned with the bottom line," Kreher says.

Tough Act to Follow

For now, Dell may need to keep running the cost-cutting play, one of its few options in an environment that's forced other tech bellwethers, including Intel (INTC) and Cisco Systems (CSCO), to issue dour forecasts. Dell sliced 2,200 jobs and took advantage of lower PC component prices, analysts said. "Can they continue to cut costs like this?" says Jayson Noland, an analyst at Robert W. Baird, who has a neutral rating on Dell shares. The company may have to do so to boost its stock performance, since "nobody expects the economy to be a benefit to anyone."

From a cost-cutting perspective, the third quarter will be a tough act to follow. Sales declined 3%, to $15.16 billion, missing analysts' consensus expectation for $16.22 billion in sales. Net income fell 5%, to $727 million. But operating expenses fell 11%, and operating income rose 22%, the biggest gain in two-and-a-half years. Dell's consumer PC business, which it's counting on for future growth, posted an operating profit of $112 million, more than the last six quarters combined, according to Baird's Noland.

During a conference call with analysts, CEO Michael Dell said the company would continue to emphasize profit over market share. "Given the choice between profits and growth, we're going to go for the profits," he said. That's in large part because of "deteriorating demand" for tech products, Chief Financial Officer Brian Gladden added. "We had a stronger August than we had September or October," he told analysts. Cutting costs "is the one lever we can control."

Posted by CEOinIRVINE
l