What is resource allocation problem in DAA?
We consider scheduling problems in parallel and distributed
settings in which we need to schedule jobs on a
system offering a certain amount of some resource. Each job
requires a particular amount of the resource for its execution.
The total amount of the resource offered by the system is
different at different points of time. Our goal is to choose a
subset of jobs and schedule them such that at any timeslot,
the total amount of resource requirement does not exceed the
total amount of the resource available at that timeslot. We
wish to maximize the profit of the chosen subset of jobs.
The problem formulation is motivated by its applications
in environments such as cloud computing and bandwidth
allocation in networks. Below, we describe a real-life problem
encountered in scheduling scientific applications on a
massively parallel system.
We now describe a scheduling problem typically faced in
the scenario where a number of users are trying to execute
scientific applications on either a cluster of machines or a
supercomputer. The users have to make reservations for the
resources in order to execute their jobs. But, as there are
multiple users competing for the same resources, a user may
not be allocated all the resources she requested. For the sake
of simplicity, let us assume that the resources are processors
on the supercomputer or machines on the cluster. Consider
a particular user. The number of processors (or machines)
allocated to the user may be different at different points of
time (because of reservation policies and the presence of
critical jobs) The user gets to know in advance the number
of processors allocated to her for each timeslot. The user
has a set of jobs that she wishes to execute. Each job of the
user has a requirement on the number of processors needed
for execution. In addition, each job has a release time, a
processing time, a deadline and a profit. The user would
like to select a subset of jobs and schedule them in such
a way that at any timeslot, the total number of processors
required by the jobs active at the timeslot does not exceed the
total number processor available to the user at that timeslot.
Naturally, the user would wish to choose the subset of jobs
having the maximum profit. We would like to highlight that
such a scenario is frequently encountered in practice. We
assume that a job can be executed on any subset of machines
or processors as long as the resource requirement is met (i.e.,
the machines/processors are identical) and the jobs may not
be preempted. In fact, we consider a more general scenario
where job can even specify a set of time intervals where it
can be scheduled; note that this generalizes the notion of
release time and deadline.
Motivated by scheduling and bandwidth allocation scenarios
such as the above one, we study an abstract problem that
we call the Varying bandwidth resource allocation problem
with bag constraints (BAGVBRAP). We use bandwidth as
a generic term to refer to the quantity of the resource
under contention. So, the input will specify the bandwidth
available at each timeslot, and for each job, its bandwidth
requirement and the different time intervals in which it can
be scheduled. This kind of interval selection or interval
scheduling problems arise naturally in practice. We refer
to [1], [2], [3] for real-life applications of interval selection
and scheduling in parallel and distributed computing and
network management. The BAGVBRAP problem also has
applications in smart energy management. Here, we have a
set of electrical appliances that need to be scheduled over a
period of time, during which the amount of available power
may vary, due to the use of different power sources. The
BAGVBRAP problem generalizes several previously studied
scheduling and resource allocation problems. We next define
the problem and then discuss prior
What is the Oct 1 deadline for PCI Compliance?
As of October 2015, all restaurants and other merchants in in the USA are subjected to Europay, Mastercard, and Visa (EMV) standards, reflecting a shift from magnetic-stripe credit cards to chip-and-pin cards. Considered safer and widely used across Europe and other nations, the chip-based cards require insertion of the card into a terminal throughout the entire transaction. The chip-based cards are less susceptible to fraud becuse the chips are far more difficult and expensive to duplicate and counterfeit than a simple magnetic strip.
EMV compliance is required for credit card acquirers and processors, though it's not mandated for merchants and processors. But merchants assume liability for fraudulent purchases; this shift of risk responsibility has driven many to adopt the new standards and avoid the risk.
Downloading a cracked version of a video game is a form of - what?
Generally what is occurring when a game is "cracked" is that the copy protection has been defeated - so the cracked copy is an illegal copy - violating the copyright of the entity owning the copyright. In simple terms- it is usually theft. If someone downloads a cracked copy of a game they already own and does not share that game with anyone else, the issue is a bit murky.
What is the Security classification system?
The secure class of a system to make sure it is protected and secure from other nations.
Is there any hackers who block your computer and ask you to pay money to unblock it?
That depends on what you mean by "block". If you mean block access to the internet - that's pretty tough to sustain since you can usually resolve the problem by calling your ISP to get them to fix the problem there or by restoring the portions of your operating system that take care of establishing connections to the network and running your browser or other applications that utilize the network.
On the other hand, there are some @sshole criminals who will cause the contents of your files to become encrypted and then demand that you pay money to them to get the necessary cryptographic key to decrypt and restore your files. They usually target companies because they can extort more money from them but they have been known to attack individual users. Like any hostage situation, there is no guarantee that the victim will get the hostage (in this case data) back intact once they have paid the ransom. This is one of many reasons that good practice is to back up all critical files regularly and store them offline separate from the primary storage so that in the event of data loss, you can restore the lost files.
Note that most (albeit not all) of these criminals operate from countries where there are no laws or little enforcement of existing laws to prosecute cyber crimes so victims are usually left with only two choices:
1. try to recover their data another way (hopefully from backups)
or
2. pay the ransom and hope that they will really get their data back.
Involving the law may not do any good if the authorities in the country where the criminals reside are unable or unwilling to prosecute.
I suppose that a sufficiently wealthy and unethical company could hire someone to hack back to the criminals, locate them, and then send some goons to rough them up to get the data back, but that's a pretty shady way to approach it and still not a guarantee that the data would be recovered. Better to use appropriate measures to prevent the intrusion in the first place and have backups to permit recovery if the preventive measures fail.
In a software security regulations context, DAA stands for Designated Accrediting Authority (as per DoDI 8510.01). This is synonymous with "designated approving authority" and "delegated accrediting authority" - terms which were used in prior DoD IA regulations.
There are obviously different definitions for the acronym in other contexts.
How did they know your latitude and longitude?
Your ISP knows its own latitude and longitude. Your latitude and longitude is assumed to be the same as your ISP.
How might aggregating a lot of unclassified information affect the classification level?
Classification of information is based on the impact it would have if it were disclosed to unauthorized persons. Bits and pieces of information that would have minimal impact in isolation can become very sensitive when aggregated together. Think of it like this: knowing the location of one opposing soldier on a battlefield is useful but doesn't tell you much about what the opposing forces are doing or planning, however as you get information on 10 soldiers it becomes more useful - at 50 it is much more useful - at 100 - at 1000 - more and more useful. In fact by the time you get to 1000 you have a a pretty fair picture of how the opposition is deployed and can make good guesses at their plans and identify weak points. 1000 bits of information that are unclassified when taken separate from each other aggregate to being highly classified when taken together.
source for DIACAP resources and knowledge services
where?
What AR 25-2 requires to all users?
As per Section 4-5, paragraph a.(8)(a):
All users must receive IA awareness training tailored to the system and information accessible before issuance of a password for network access. The training will include the following:
False
Facebook Contet Delivery Network.
That's the place where content of Facebook is stored.
Under what circumstances can a DAA waive the certification requirements?
DAA may waive the certification requirement under severe operational or personnel constraints.
What is an acceptable list of DIACAP team members responsible for implementing?
DAA, CA, SIAO, PM, IAM, and IAO (or IASO)
What do Physical security standards include?
From NIST 800.53 rev 4:
Physical and Environmental Protection Policy and Procedures
Physical Access Authorizations
Physical Access Control
Access Control for Transmission Medium
Access Control for Output Devices
Monitoring Physical Access
Visitor Access Records
Power Equipment and Cabling
Emergency Shutoff
Emergency Power
Emergency Lighting
Fire Protection
Temperature and Humidity Controls
Water Damage Protection
Delivery and Removal
Alternate Work Site
Location of Information System components
Information Leakage
Asset Monitoring and Tracking.
==========
Physical access control to spaces where computer assets (computers, networking connections, cabling, etc.) are present.
Physical protection of documented information about instituted protections.
Environmental protections of computers and users to protect availability and integrity (for example, EM interference can compromise integrity of transmitted information)
Physical protections against eavesdropping, interception, alteration, and interference
Tamper evident seals
Protection from physical threats (for example: protecting data center from fires, floods, tornadoes, etc.)
Protection of storage media (tapes, disks, drives, etc) - access control, theft prevention, protection against damage
Such a website is usually called a "phishing website" because users are usually sent to them via a phishing message. It can also be legitimately called a "malicious website" because the information harvested from it is then usually used as part of an identity theft.
How does RMF differ from DIACAP?
DoD Information Assurance Certification and Accreditation Process (DIACAP) was based on the controls identified in Department of Defense Directive 8500.1 and Department of Defense Instruction 8500.2. Controls were assigned based on categorizing the system according to Confidentiality (Confidentiality Level - aka "CL" Classified/Sensitive/Public) and Availability (Mission Assurance Category - aka "MAC" I/II/III).
Risk Management Framework (RMF) for DoD Information Technology (IT) replaced DIACAP when the new DoDI 8510.01 was issued on March 12, 2014. Under RMF, systems are categorized according to their requirements for Confidentiality (High/Moderate/Low), Integrity (High/Moderate/Low) and Avaliability (High/Moderate/Low). The controls are further tailored/enhanced by adding addtional control overlays according to whether the system is Classified and/or whether it contains PII. The Navy has added a further overlay based on the CyberSafe grade for the system. All of the controls are derived from NIST SP 800.53 (as of September 2017, in Revision 4).
Where DIACAP had a couple hundred controls to address, RMF has potentially more than a thousand to consider - based on the base control and control enhancements. The greater number of controls is due to greater granularity of the the controls, the addition of more controls addressing Integrity, and many new controls imposing cybersecurity requirements for the supply chain and contracting.
Is downloading copyright files or torrents illegal?
Probably - it does depend on a few things however.
If you do not have the permission of the copyright owner, downloading copyrighted files is, indeed, illegal. As an analog - if you purchase a bootleg copy of a movie that someone made illegally both the seller and the buyer are breaking the law. If you download a copyrighted file without the permission of the copyright owner (which often includes paying them something for the right to download it) you are breaking the law and the person providing it to you is also breaking the law by providing it to you without the owner getting compensated. There are, of course, instances where a copyright owner may permit free downloading of a file but with restrictions on how it is used so that they can maintain their ownership rights. In that case, as long as you are not violating the conditions the owner imposes, you can legally download the file. An example would be that the owner may give others the permission to download the file but they are forbidden to re-distribute it
A system adminstrator is issued privileged and non-privileged user accounts.?
This is an example of applying the principle of least privilege. System administrators need to do a lot of different things on the system. Not all of them require privileged access, consequently they should be using a non-privileged account except when performing duties that require elevated privileges. Setting up the two different types of accounts makes this possible.
This method of impersonating a legitimate organization?
When internet fraudsters impersonate a business to trick you into giving out your personal information, it's called phishing. Like any kind of fraud, it is a crime, but the difficulty of catching the fraudster is increased due to the insulation of the criminal from the target by transient nature of thee accounts they launch their attacks from