ENGINEERS | ENGINEERING JOBS | ENGINEERING COLLEGES

Tuesday 2 July 2013

PPT ON VULNERABILITY ASSESSMENT


CLICK HERE TO DOWNLOAD  PPT ON Vulnerability Assessment
Vulnerability Assessment  Presentation Transcript
1.Vulnerability Assessment
2.Introduction
Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that may result in a security breach or a violation of the system's security policy.

Threat: The potential for a specific vulnerability to be exercised either intentionally or accidentally

Control: measures taken to prevent, detect, minimize, or eliminate risk to protect the Integrity, Confidentiality, and Availability of information.

Vulnerability Assessment: The process of identifying,  quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

3. Vulnerability Assessment Basics
Vulnerability Assessment is a subset of Vulnerability Management
Proactive vs. reactive
Vulnerability assessment  vs. penetration testing
Examples of IT vulnerability assessments
4. Why Do Vulnerability Assessments?
System accreditation
Risk assessment
Network auditing
Provide direction for security controls
Can help justify resource expenditure
Can provide greater insight into process and architecture
Compliance checking
Continuous monitoring
5.Vulnerabilities
Where do they come from?
Flaws in software
Faulty configuration
Weak passwords
Human error
Inappropriately assigned permission levels
System inappropriately placed in infrastructure/environment
Vulnerabilities don’t go away by themselves
6.Best Practices
Establish chain of command/authority
Create official purpose and procedures
Decide on schedule
Build your reputation
Build relationships
Think in terms of risk
Document everything!
Know your environment
Be prepared
7.CERT Methodology
1) Setup

2) Test Execution

3) Vulnerability Analysis

4) Reporting

5) Remediation
Repeat!
8.Step 1: Setup
Begin documentation
Secure permission
Update tools
Configure tools
9.Step 2: Test Execution
Run the tools
Document as you go
Run a packet capture while running the assessment tools
10.Step 3: Vulnerability Analysis
Human interpretation is required to make results meaningful
That interpretation includes
Assessing risk presented by vulnerabilities
Comparing the results to security policy
Verifying vulnerabilities
Prioritizing vulnerabilities
11.Step 3: Vulnerability Analysis
Assessing risk and prioritizing vulnerabilities
A subjective process but you can be objective by using CVSS
Common Vulnerability Scoring System (CVSS)
NIST provides a CVSS calculator at http://nvd.nist.gov/cvss.cfm?calculator
By adjusting the different values based on the characteristics of the vulnerability, the CVSS score will go either up or down depending  on the risk presented to your specific environment
12.Researching vulnerabilities
Without a CVE number
Google
Security Sites
Security email list archives http://seclists.org
Be careful who you get information from/trust
Best to go to a known good security site (e.g. sans.org)
CERIAS Cassandra service - https://cassandra.cerias.purdue.edu
Verify with a trusted source or multiple sources if possible
13.Causes of errors during vulnerability analysis
Environmental Issues
Timing Issues
Privilege Issues
Tool Issues
People/knowledge Issue
14.Error types
False Positive - Identifying a vulnerability that is not present
False Negative - Failing to identify the presence of a vulnerability
Error prevention
Use several different tools for verification
Examine the traffic generate by tools
Consult with the system owner/administrator
15.Goals
Present a meaningful summary of the vulnerabilities found
Prioritize and explain vulnerabilities
Provide possible remediation suggestions
16.Anatomy of a report
Header
Summary
List of vulnerabilities - For each vulnerability, at a minimum provide:
Unique tracking number
Risk level
High - Immediate action
Medium - Action required
Low - Action recommended
Brief description
Appendices - At a minimum the following two should be included
Vulnerability details
Assessment Setup
17.Step 4: Reporting
Metrics
Tracking progress of key metrics over time allows progress to be quantified
Also a good idea to tie metrics to cost savings
Examples:
Number of vulnerabilities found by criticality
Average number of vulnerabilities found
Number of vulnerabilities remediated
Time from vulnerability discovery to remediation
Time per assessment
Total assessments done
18.Best Practices
Standardization
Know your audience
Avoid fluff
Prioritize by risk
Track progress
19.Step 5: Remediation
Vulnerability remediation is the process of fixing vulnerabilities
Pick the issues you want to fix because you may not have enough resources to fix them all
Remediation choices
For every vulnerability there are three choices for remediation:
Fix - eliminate vulnerability altogether
Accept - the cost of fixing outweighs the risk
Mitigate - don't outright fix but use additional layers of security to lessen the risk presented by the vulnerability
20.Types of remediation
Manual
Pros - less likely to cause system problems
Cons - does not scale well, time consuming
Automatic remediation
Pros - scales very well
Cons - may cause system problems, may not actually remediate, potential for breaking something is greater
Manual - unique or critical system
Automatic - many similar items
21.Remediation Planning
Plan for remediating all vulnerabilities found in the system
Plan should include:
Whether to fix, mitigate or accept vulnerabilities
Whether to use automatic or manual remediation
Strategy to mitigate any remaining vulnerabilities
Justification for accepting any vulnerability
22.Test remediation on a dev instance before implementing on a production system
Verification
Cooperation required for successful remediation

Don’t forget change management
23. Tools used for Vulnerability Assessment
Acunetix Web Security Scanner
GFI LANguard
Nessus
Share this post
  • Share to Facebook
  • Share to Twitter
  • Share to Google+
  • Share to Stumble Upon
  • Share to Evernote
  • Share to Blogger
  • Share to Email
  • Share to Yahoo Messenger
  • More...

0 comments

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

Labels

.PDF (2) 3D TECHNOLOGY (1) 3G (1) 4G (1) 4G TECHNOLOGY (1) 8085 MICROPROCESSOR (2) A CASE STUDY ON METHOD STUDY (1) ABAP (1) AC SUPPLY SYSTEM (1) ADDRESSING MODE (1) ADITYA CEMENT (1) ADMIXTURES (2) ADO.NET (1) Advance Processor (1) AERODYNAMIC DESIGN (1) AES (1) AGGREGATES (1) AICTE (1) AIR & DRAFT SYSTEM (2) AIR POLLUTION AND ITS LEGISLATIONS (1) Air Traffic Control (1) Airtel Mobile Service (2) AJAX (3) ALCOHOL (1) AMF PANEL (1) ANALOG AND DIGITAL FILTERS (1) ANALOG TO DIGITAL (1) Android (4) ANGLE MODULATION (1) ANIMATION (1) ANTENNA FUNDAMENTALS (1) APPLICATION DEVELOPMENT (1) APPLICATION OF NON CONVENTIONAL AND RENEWABLE ENERGY SOURCES (1) Application Programming Java (1) APPLICATIONS OF ASP.NET (1) Aricent Technologies (1) ARITHMETIC OPERATORS (1) ARM ARCHITECTURE (1) ARM Instruction Sets And Programs (1) ARM Programming (1) ARP And RARP (1) Artificial Intelligence (3) Artificial Neural Networks (1) ASH HANDLING SYSTEM (1) ASP (2) ASP .NET (6) ASP.NET FUNDAMENTALS (1) ASP.NET OVERVIEW (1) ASP.NET WITH C# (1) ASSEMBLY LANGUAGE (1) ASTRA SITE TEST (1) Attendance Management System In ASP.NET (1) AUSTRALIA (1) AUTOCAD (1) AUTOMATED TESTING (1) AUTOMATIC BEVERAGE VENDING MACHINE (1) AUTOMATION (1) AUTOMATION MANUFACTURING (1) Automobile (1) AUTOMOBILE SECTOR OF INDIA (1) Auxiliary Steam System (1) AVR INTRODUCTION (1) AVR Microcontroller Family (1) AVR RISC (1) B-SPLINE (1) B-SPLINE NOTES (1) BAR CODE TECHNOLOGY (1) BARC (1) Barcode Tech. (1) BARCODING FOR BEGINNERS (1) Barriers To Communication (1) BIG DATA (1) BINARY CODES (1) BIOCHIPS (1) BIOFULES (1) BIOLOGICAL DENITRIFICATION (1) Biophotonics (1) BIRLA CEMENT (1) BIRLA CEMENT WORKS (1) BLACK BOX TESTING TECHNIQUES (1) BLACKBERRY DEVELOPMENT (1) BLENDED CEMENTS FOR DURABLE CONCRETE STRUCTURES (1) Blu Ray Disc (1) Blue Eye Technology (1) Bluetooth (1) BOILER (1) BOILER AND AUXILIARIES (1) Boiler Normal Shut Down to Cold (1) BOILERS FUNDAMENTALS (2) Boilers In Indian Industries (1) BOKARO STEEL PLANT (1) BPO (2) BPO/KPO Job (2) BRAIN FINGERPRINTING (1) BROADBAND NETWORK OPERATION SYSTEM (1) Browser RAD Tools (1) BSNL (1) BUGZILLA (1) Bus AMBA (1) C LANGUAGE (2) C# (1) C++ (6) CABLE MODEM (1) CABLES (1) CACHE MEMORY (1) CALIBER MANAGEMENT TOOL (1) CANADA (1) CAPTCHA (1) CARBON CREDITS (1) CARGO TANK ATMOSPHERE (2) Cascading Style Sheets (1) CAT / MAT (1) CCNA (2) CDMA (1) CEERI (2) CELLULOSE (1) CEMENT CONCRETE MIX DESIGN (1) CEMENT PLANTS (1) Chameleon Chips (1) CHAOTIC- MIMO TECHNIQUES (1) CHARGED DEFECTS GETTERING AND CRYSTAL GROWING PROCESSES (1) CHEBYSHEV FILTER (1) CHHABRA THERMAL POWER STATION (1) CHROMATOGRAPHIC (1) CHROMATOGRAPHY (1) CINEMAX (1) CIRCULATING WATER (1) CIVIL AVIATION (1) CIVIL SERVICES (1) CLASSES AND OBJECTS (1) CLIMATE CHANGE FOR BETTER LIVING (2) CLOUD COMPUTING (5) Cluster Analysis (1) Cluster Computing (1) CMOS (1) COAL (1) COAL HANDLING PLANT (1) COAL TRANSPORTATION AND HANDLING (1) COBOL (1) COCA COLA (1) CODA (1) CODE LOCK (1) CODNS REPORT (1) COGNITIVE RADIO (1) COGNITIVE RADIO NETWORKS (1) COGNOS (1) Combinational logic Design (1) COMBUSTION THEORY (2) COMMUNICATION (3) COMMUNICATION SYSTEM (2) COMPUTER (5) COMPUTER CODES (1) COMPUTER DATA (1) COMPUTER FUNDAMENTALS (1) COMPUTER GRAPHICS (1) Computer Hardware (2) COMPUTER MEMORY (1) COMPUTER NETWORK TOPOLOGY (1) Computer Networking (2) COMPUTER NETWORKS (2) COMPUTER NUMBER SYSTEM (1) COMPUTER OPERATING SYSTEM (1) COMPUTER SYSTEMS (1) COMPUTER VIRUSES (2) COMPUTER'S PERIPHERALS (1) COMPUTERS (1) CONDENSER PERFORMANCE (1) CONNECTING DEVICES (1) CONSTITUENTS AND APPLICATIONS IN CONCRETE (1) Control Panels (1) COOLING TOWER (1) COPROMO (1) COQUALMO (1) CORADMO (1) CORE JAVA (1) CORRELATION AND REGRESSION ANALYSIS (1) CORROSION IN METALS (1) COSTAR SOFTWARE (1) CRITICAL PATH METHOD (1) CRM (1) CRUISE CONTROL (1) CRYPTOGRAPHY (2) CRYSTAL STRUCTURE (1) CSS (3) CT UNIT IMPULSE (1) CURIOSITY ROVER (1) CYBER CRIME (2) Cyber Forensic Tools (1) Cyber Terrorism (1) DATA COMMUNICATION (1) DATA FLOW MODEL (1) DATA LINK LAYER (1) DATA MANAGEMENT (1) Data Mining Classification and Prediction (1) Data Mining Concepts and Techniques (1) Data Mining Primitives (1) Data Preprocessing (1) Data Warehouse (1) DATA WAREHOUSING (1) DATABASE AND DATA WARAEHOUSE FUNDAMENTALS (1) Databases And DBMS (1) DATALINK LAYER (1) DB2 (1) DBMS (2) DC Supply System (1) DCCN (1) DCS (1) DEFENCE (1) Delegation Of Powers (1) DELL (1) DHCP (1) DHTML (1) DIFFUSION (1) DIGITAL SIGNATURE (1) Digital Watermarking (1) DIJKSTRA'S ALGORITHM (1) DIRECTIONAL PATTERN ANALYSIS (1) DISCOVERY (1) DISPLAY TECH. (1) Distributed Systems Principles and Paradigms (1) DISTRIBUTION SUBSTATIONS (1) DMAIC (1) DNA (1) DNA COMPUTING (1) DNS (1) DOCUMENT ARCHITECTURE (1) Doordarshan (1) DOS ATTACK (1) DRDO (1) DRUG TRANSPORT MECHANISMS (1) DRUPAL (1) DRY ETCHING (1) DSA (1) DSL (1) DTH (1) DVD TECHNOLOGY (1) DWDM (1) E GAS SEWA (1) E-BIKES (1) E-COMMERCE (2) E-PROCUREMENT SOLUTION IN NHPC (1) EIGRP (1) ELASTICITY (1) ELECTION ALGORITHMS (1) Election Algorithms and Distributed Processing (1) ELECTRIC HEATING (1) ELECTRIC MOTORS (2) ELECTRIC WELDING (1) ELECTRICAL INSTRUMENTS (1) Electrical Protections (1) ELECTRICAL SYSTEM (1) ELECTRICITY GENERATION PROCESS (1) Electromechanical Pulse Energy (1) ELECTRONIC INSTRUMENTATION (1) Electronic Milk Tester (1) ELECTRONIC TOLL COLLECTION SYSTEM (1) Electronics For Animals (1) eLitmus (1) EMAIL SYSTEMS (1) Embedded Linux (2) EMBEDDED SYSTEM (2) EMERGENCY SUPPLY SYSTEM (1) ENERGY CONSERVATION (1) ENERGY EFFICIENCY (1) ENERGY METERS (1) ENGINEERED PROTEIN (1) ENGINEERING CAREER (1) ENGINEERING PROCESSES (1) ENGINEERING REPORTS (1) ENVIRONMENT IMPACT ASSESSMENT (1) Environment Laws For Power Sector (1) ENVIRONMENTAL CONDITIONS (2) Environmental Protection Act-1986 (1) EQUATIONS (1) ERGONOMIC ANALYSIS (1) ERGONOMIC ASPECTS OF NOISE (1) ERGONOMICS (1) ERP (1) ESCORTS (1) ESP (1) ESSAR (1) ETHANOL (1) ETHICAL HACKING (1) EVEN AND ODD SIGNALS (1) EWSD (1) EXCITATION SYSTEM (2) EXTRANET (1) FACE RECOGNITION (2) FACE RECOGNITION TECHNIQUES (2) FAQs DURING AN INTERVIEW (1) FIBER OPTICS (1) Fighter Planes (1) FILE SYSTEM IN OPERATING SYSTEM (1) Fire Fighting Systems In Power Stations (1) FIREWALL (1) Flame Scanners (1) FLUE GAS SYSTEM AIR PRE HEATER (2) FLUIDIZED BED COMBUSTION SYSTEM (2) FLY ASH CONCRETE MIX DESIGN (1) Foster Wheeler Boiler (1) FOUR LEVELS OF INFORMATION SYSTEM (1) FOUR SPECIAL CASES IN SIMPLEX (1) FOURIER SERIES (1) Framework (1) FREE SPACE OPTICS (1) FREQUENCY HOPPING (2) FUEL (1) FUEL OIL SYSTEM (5) FUEL OIL SYSTEM PURPOSE (1) FULL WAVE RECTIFIER (1) FUNDAMENTALS OF MANUFACTURING SYSTEMS (1) FURNACE SAFEGUARD SUPERVISORY SYSTEM (2) FUTURE CAR (1) GAME THEORY (1) GATE (1) GENERATION OF ELECTRICITY (1) GENERATOR PROTECTION (1) GENETIC ALGORITHMS (1) Genetic Engineering (1) GENOMIC IMPRINTING (1) Genomic Library (1) Geophysical Instrumentation (1) GET AND POST METHODS (1) Gi-Fi (2) GLOBAL MANUFACTURING SYSTEM (1) GLOBAL SYSTEM FOR MOBILE COMMUNICATION (1) GMAT (1) GMPLS CONTROL PLANE (1) GOOGLE (1) GOOGLE NEXUS (1) Governing System (1) GOVERNMENT GRANTS (1) Govt. Job (3) GPRS (1) GPS (1) GRAFFITI (1) Graphics Editor (1) GRAVIMETRIC ANALYSIS (1) GRE (1) Green Computation (1) GREEN HOUSE EFFECT (1) GREEN REVOLUTION (1) GREY BOX TESTING (1) GRID COMPUTING (1) GSM (3) GSM ADVANCE TRAINING (1) GSM AIR INTERFACE (1) GSM BSS (1) GSM NETWORK ARCHITECTURE (1) GSM NETWORK INTERFACES (1) GSM RADIO TRANSMISSION (1) GSM TRAFFIC CASES (1) GSM TRAINING (1) GSS (1) HACKING (1) Hadoop (2) Handling And Disposal Of Oily Bilge Water (1) Haptics (1) HARLEY DAVIDSON (1) HEAPSORT (1) HINDUSTAN COPPER LIMITED (1) HINDUSTAN ZINC LIMITED (1) HMT (1) HOLOGRAPHY (1) Host Mobility (1) HOSTING (1) HOW DSL WORKS (1) HP BYPASS (1) HTML (5) HTTP (1) HUMAN ROBOT (1) HUMANOIDS (1) HUTCHISON TELECOM (2) HYDRO SECTOR (1) HYDROGEN ENERGY (1) HYPERTENSION (1) HYPNOSIS (1) HYUNDAI MOTORS (1) I MODE (1) IBM (1) IBM AS/400 (1) IBM INDIA (1) IC ENGINES (1) IC TECHNOLOGY (1) ILLUMINATION ENGINEERING (1) ILLUSTRATOR (1) IMAGE ENCRYPTION ALGORITHM (1) IMAGE FILE FORMATS (1) IMAGE FUSION (1) IMMUNO TECHNOLOGY (1) IMPACT OF ATMOSPHERICS ON QUALITY INFERENCES (1) IMPULSE TURBINE (1) INDUCTANCE (1) Induction Furnace (1) INDUCTION GENERATOR (1) INDUCTION MACHINE (1) Induction Motor (1) INDUCTION MOTOR MODEL (1) INDUCTION MOTOR STARTING (1) Industrial Automation (1) Industrial Design In India (1) Industrial Safety And Accident Prevention (1) Inert Gas System (1) INFORMATION SECURITY (1) INFORMATION SYSTEM FOR MANUFACTURING (1) INFOSYS (1) INFOSYS DRIVEN BY VALUES (1) INQUIRY (1) INSERTION SORTING (1) INSPECTION AND GOOD CONSTRUCTION PRACTICES (1) Integrated Management System (1) INTEGRATED MAUFACTURING SYSTEM (1) Inter Integrated Circuit (1) Internal Combustion Engines (2) Internet (4) Internet Protocol (1) INTERNETWORKING DEVICES (1) INTERRUPT MECHANISM (1) INTERVIEW SKILLS (1) INTRA ASN IEEE802.16e (1) INTRANET (1) INTRODUCTION OF GSM (1) INTRODUCTION OF THERMAL POWER PLANT (1) INTRODUCTION TO C SHARP (3) INVISIBLE BAR CODES (1) IOCL (1) ION EXCHANGE CHROMATOGRAPHY (1) ION IMPLANTATION (1) ION IMPLANTATION PROCESS (1) ION TRACK BASED TUNABLE DEVICES (1) iOS 6 (1) IP Addresses (2) iPHONE (1) iPHONE 5 (1) IS-LM MODEL (1) ISEH FRP V7.0 (1) ISM CODES (1) ISO 9001:2008 (1) ISPS (1) ISRO (1) IT And Communication Infrastructure (1) ITES (1) J2EE (1) JAVA (9) JAVA APPLICATIONS (1) JAVA BEANS (1) JAVA DATABASE CONNECTIVITY (1) JAVASCRIPT (3) JAVASCRIPT DIALOG BOXES (1) JIRO Technology (1) JK Cement (1) JK TYRE (1) Job Fair (3) JOOMLA (1) JSP (1) KRUSKAL'S ALGORITHM (1) L.T CIRCUIT BREAKERS (1) La-Mont boiler (1) LAN (1) Landmine Detection (1) LAPLACE CIRCUIT (1) Laser Security (1) LEACH (1) LIFEBUOY (1) LIGHT MICROSCOPY (1) LINEAR EQUATIONS (1) LINUX (3) Linux Booting Procedure (1) Linux Servers (1) LINUX SYSTEM (2) LITHOGRAPHY (1) LOAD SHARING (1) LOGIC CONTROLLER (1) LOGICS (1) LOGO DESIGN (1) LOW DROPOUT REGULATOR (1) LUBRICATION (1) MACHINING (1) Maglev Trains (1) MAGNETIC FORCES MATERIALS (1) MAHINDRA (1) MAINFRAME (1) MAMMOGRAMS (1) Manage IS Development (1) MANAGEMENT IN MANUFACTURING SYSTEM (1) MANUFACTURING PRESENTATION (1) MANUFACTURING EXCELLENCE (1) MARK I (1) MARK I FPA (1) MARK II FPA (1) MARPOL (1) MARS ROVER (1) MARUTI 800 (1) MASS CONCRETE MIX (1) MATLAB (3) MCA (1) MCITP (1) MEDIUM ACCESS CONTROL SUBLAYER (1) MEMS SWITCH (1) MEMS TECHNOLOGY (1) Meta Search Engines (1) METALLURGICAL TESTING (1) MICRO CANTILEVER ENERGY HARVESTER (1) MICROBIAL GROWTH (1) MICROCALCIFICATIONS (1) MICROCONTROLLER BASED ALARM SYSTEM (1) MICROCONTROLLERS (1) MICROPROCESSOR (2) Microscopic Techniques (1) MICROSOFT (MS) ACCESS (1) MICROSOFT (MS) SQL (1) MICROSOFT EXCEL (1) MICROSOFT OFFICE EXCEL 2003 (1) MICROSOFT OFFICE OVERVIEW (2) MICROSOFT OFFICE WORD 2003 (1) MICROSOFT PROJECT (1) MICROSOFT WORD (1) Microstrip Patch Antenna (1) MICROVIA TECH. (1) MICROWAVE ABSORPTION PROPERTIES OF GRAPHITE FLAKES (1) MICROWAVE COMMUNICATION (1) MICROWAVE LINK DESIGN (1) Microwave Technique (1) Milk Fat Testing (1) MINERALS (1) MIS (1) MOBILE COMPUTING (1) Mobile Number Portability (1) MOBILE SECURITY (1) MOBILE TESTING (1) MODELING AND SIMULATION FOR MANUFACTURING SYSTEM (1) MODELLING TOOLS IN MANUFACTURING (1) MODEMS (2) MODIFIED FUEL LEVEL INDICATOR (1) MODIFIER (1) MOG ANDROID (1) MOSFET (1) MOTION ECONOMY (1) MOTIVATION THEORY (1) Mozilla Firefox (1) MPEG4 (1) MPHASIS (1) MRAM (1) MRT (1) Multi Core Technology (1) MULTICAST ROUTING (1) MULTIMEDIA NETWORKING SYSTEM (1) MULTIMEDIA PROJECTS (1) MULTIMEDIA SKILLS (1) MULTIMEDIA TECHNOLOGIES (1) Multimedia Technology (1) MULTIPLE INTELLIGENCES (1) MULTISENSOR DATA FUSION (1) MYSQL (2) NANOBOTS (1) NANOTECHNOLOGY (2) NASA (1) NASCAR (1) Need Of ERP (1) NETWORK BASICS (1) NETWORK LAYER (2) NETWORK PROTOCOLS (1) Network Security (2) NETWORK SWITCH (1) NETWORKING (5) New Idea Put To Road Test (1) NEWZELAND (1) NHPC (1) NIS And Setting Up Router (1) Nokia Morph Concept (1) NOKIA SIEMENS NETWORKS (1) NON CONVENTIONAL ENERGY SOURCES (1) NONVERBAL COMMUNICATION (1) NTPC (2) NUCLEAR ENERGY (1) NUCLEAR POLLUTION (1) NUMBER SYSTEMS (1) OBJECT ORIENTED (1) OCCUPTIONAL VIBRATION (1) OFDM (1) OIL AND GAS INDUSTRY (1) OLYMPIC PRODUCTS (1) OMEGA ELECTRONICS (1) ONGC (1) ONLINE EDUCATION SERVICES (1) ONLINE MOBILE RECHARGE (1) ONLINE SHOPPING SITE (1) OOPS (1) OPERATING SYSTEM (3) OPERATING SYSTEM SECURITY (1) OPERATIONS DEPARTMENT PROCEDURE (1) Optical Computing (1) OPTICAL LOGIC GATES (1) OPTICAL NETWORK (1) OPTIMIZED ANN (1) ORACLE (4) ORACLE 10G (2) ORACLE 9I (1) Oracle Database (1) ORACLE HUMAN RESOURCES (1) ORGANIZATIONAL STRUCTURE AND DESIGN (1) OSI MODEL (1) OXIDATION (1) OXIDATION TECHNIQUES AND SYSTEMS (1) PACKET LOSS CONCEALMENT USING AUDIO MORPHING (1) Packet Tracer 5.0 (1) PAPER CLIP (1) PARKING MANAGEMENT SYSTEM (1) PARTS OF DESKTOP (1) PATTERN PRINTERS (1) PATTERN TRANSFER (1) PCB (1) PCB ANALYSIS (1) PEDAL POWER HACKSAW (1) Pedal Power Zeolite Refrigeration (1) PEER TO PEER NETWORKS (1) Penetration Testing (1) Performance Management Process (1) PERL (1) PHISHING (1) PHOTOSHOP (1) PHOTOVOLTAIC SYSTEM (1) PHP (4) PHP AND SQL (1) PHP ERROR (1) PHP FILE INCLUSION (1) PHP FILE UPLOADING (1) PHP FILES (1) PHP FUNCTIONS (1) PHP OPERATORS (1) PHP SESSIONS (1) PHP TECHNOLOGY (1) PHYSICAL LAYER (2) Placement Papers (1) PLANT LAYOUT AND CAPACITY PLANNING (1) PLC (2) PLCC (1) Polaris (1) POST TRANSLATIONAL MODIFICATION (1) POWER DISTRIBUTION EQUIPMENT (1) POWER DISTRIBUTION SYSTEM (1) POWER GENERATION IN NTPC (1) POWER GENERATION THROUGH SPEED BREAKERS (1) POWER HOUSE (1) POWER PLANT (2) POWER PLANT EMERGENECIES (1) POWER PLANT OPERATION GENERATOR & AUXILIARIES (1) POWER QUALITY PARAMETERS (1) POWER SCENARIO IN INDIA (1) Prepaid Energy meter (1) PRESENTATION SOFTWARE (1) PREWRITING TECHNIQUES (1) PRINCIPLES OF CONCRETE MIX DESIGN (1) Private Job (1) Procedure For burning Oil (1) PROCESS (1) PROCESS DESCRIPTION (1) PROCESS DESIGN (1) Product Life Cycles And The Boston Matrix (1) PRODUCT STRATEGY (1) PROJECT QUALITY MANAGEMENT (1) Protection System Of Generating Stations (1) PTW SYSTEM (1) PULSE WIDTH MODULATION (1) PUMP (1) PURGING LOGIC (1) QR CODES (1) QUALITY REQUIREMENTS OF CONCRETE - MAKING MATERIALS (1) QUANTUM COMPUTER (2) QUANTUM COMPUTERS (1) QUANTUM COMPUTING (1) Quorum Sensing (1) RADAR (1) RADAR COMMUNICATIONS (1) RADIO CONTROLLED AIRCRAFT (1) RAILWAY (1) RAM (1) RECORDING TECHNIQUES (1) Red Tacton (1) REGENERATIVE SUSPENSION SYSTEM (1) RELAY (1) Remote Control (1) Remote Method Invocation (1) Remote Sensing (1) REMOTE SUSTAINABLE VILLAGES (1) Renewable Energy (4) REQUIREMENT ENGINEERING (1) REQUISITE PRO (1) RESTFUL WEBSERVICES (1) REVEAL.JS (1) RFID (3) Robotics (2) ROCK SLOPE ENGINEERING (1) Role Of Hydrogen In Generator (1) ROM (1) ROUTINE CHECKS BOILER (1) Routine Checks Generator (1) Routine Checks Turbine (1) RSRTC (1) RTLinux (1) RTOS (1) RUBY ON RAILS (1) SAAS AND CLOUD COMPUTING (1) SAMPLE RESUME FOR EXPERIENCED - DOWNLOAD FREE .DOC (1) SAMPLE RESUME FOR FRESHERS - DOWNLOAD FREE .DOC (1) SAMSUNG 3D LED TV (1) SAMSUNG S3 (1) SAP (2) SAP LAP ANALYSIS (1) Satellite Communication (1) SCADA (2) SCADA FUNDAMENTALS (1) SCANNING AND FOOTPRINTING (1) SCHEDULING OF OPERATIONS (1) Secretariat LAN (1) SELF AUTOMATED SAFETY SYSTEM OF TRAIN (1) SELF EMPLOYEMENT In ASP.Net (1) Semantic Web (1) SEMI AUTONOMOUS BIKE (1) SENSORY EVALUATION (1) SENSORY TESTING (2) SEO (1) SEQUENTIAL CIRCUIT (1) Serial Peripheral Interface (1) Servlets (1) Shell Programming (1) SHIFT REGISTERS AND COUNTERS (1) Ship Maneuverability (1) SIGNALS (1) SIGNALS AND SYSTEMS (1) SINGAPORE (1) SIX STROKE ENGINE (1) Sixth Sense Technology (1) SLIDING PRESSURE OPERATION (1) SLIM System (1) Smart Cards (1) SOCIAL ENGINEERING TOOLKIT (1) SOCIAL NETWORKING (1) SOCIAL NETWORKS (1) SOCIAL PROBLEMS (1) SOFT SYSTEM METHODOLOGY (1) SOFTWARE (1) SOFTWARE DESIGN (1) SOFTWARE DEVELOPMENT (1) SOFTWARE ENGINEERING (2) SOFTWARE FOR IMPLEMENTATION OF ATM (1) Software Management Topics (1) SOFTWARE METRICS (1) Software Requirements Specification (1) SOFTWARE RESEARCH EXPRESS (1) Software Testing (2) SOLAR CELL (2) SOLAR PANEL ROAD (2) SOLAR PV (1) SONY ERICSSON (1) SOURCE AND SINK ANALYSIS (1) SPEAKER RECOGNITION (1) SPECTROSCOPY (1) SPEECH RECOGNITION (2) Splines and Bezier Curves (1) SPREAD SHEET (1) Spring Framework (1) SQL (2) SQL INJECTION (1) State Management Techniques (1) Stealth Technology (1) STEAM CIRCULATION SYSTEM (1) Steam Raising (1) STEAM TURBINE (1) STEAM TURBINES FOR SUPERCRITICAL POWER PLANTS (1) STEEL INDUSTRY (1) Steel Plant (1) STEVE JOBS (1) STIRLING ENGINE (1) STORAGE DEVICES (1) STORAGE OVERVIEW AND ARCHITECTURE (1) STRESS (1) STUDY ABROAD (6) SUBNETTING (1) SULZER RT FLEX MARINE DIESEL ENGINE (1) SUMS AND PRODUCTS OF SIGNALS (1) Sun Solaris Os (1) SURATGARH THERMAL PLANT (1) Surface Detection Methods (1) SURFACE MOUNT TECHNOLOGY (2) SUSTAINABLE DEVELOPMENT (1) Swarm Intelligence (1) SWITCHING AND NETWORKS (1) SWITCHING AND ROUTING (1) SWITCHYARD (1) SYMBIAN OS (1) SYSTEM PROGRAMMING (1) TABU SEARCH (1) TABULATION METHOD (1) TATA INDICOM (1) TATA MAGIC (1) TATA MOTERS (1) TATA MOTORS (2) TATA NANO (2) TATA STEEL (1) TATA Tele Services (1) Technical Analysis (1) TELECOM SOFTWARE (1) TELECOMMUNICATION INDUSTRY IN INDIA (1) Teleconferencing (1) TEST CENTER (1) TEST POINT ANALYSIS (1) TESTING (1) Testing And Calibration (1) TESTING LEVELS (1) TEXT (1) The Locus Distributed Operating System (1) THERMAL CUTTING PROCESS (1) THERMAL POWER PLANT (1) THERMAL POWER PLANTS (1) THERMAL POWER STATIONS (1) THERMOGRAPHY (1) THIN FILM TECHNOLOGY (2) THREE PHASE CIRCUITS (1) Tiled Microprocessor (1) TOEFL / IELTS (1) Tools of Internet (1) TOUCH SCREEN TECHNOLOGY (2) TOUCHSCREEN (1) TRADITIONAL DATABASE APPLICATIONS (1) TRAINING AND DEVELOPMENT (1) TRANSACTION PROCESSING (1) TRANSCRIPTION (1) TRANSDUCER MATERIALS (1) TRANSFORMERS (2) TRANSISTOR AGING (1) TRANSMISSION LINE (1) TRANSMISSION MEDIA (1) TRANSMISSION SYSTEM (1) TRANSMISSION SYSTEM AND ITS CONFIGURATION (1) TRANSPORT AND APPLICATION LAYER (1) TURBINE (1) TURBINE CONDENSATE SYSTEM (2) TURBINE FLEET IN NTPC (1) Turbo Generators (1) TWO STROKE FUEL ENGINE (1) TWO-WHEELER INDUSTRY IN INDIA (1) Ubiquitous Computing (1) UK (1) Underground Communication (1) UNIT SHUT DOWN PROCEDURE (1) UNIX (2) UNIX SPECIAL VARIABLES (1) UPS (1) UREA PLANT (1) USA (1) USE OF CHEMICAL AND MINERAL ADMIXTURES IN CONCRETE (1) UWB ECHO SIGNAL (1) VAPOR ABSORPTION REFRIGERATION (1) VARIABLE SPEED DRIVES (1) VERILOG (1) VHDL (1) VHDL AND DIGITAL CIRCUIT DESIGN (1) VIBRATION (1) VIDEO DISPLAY DEVICES (1) VIDEOCON (1) VIKRAM CEMENT (1) VIRTUAL KEYBOARD (1) VIRTUAL ONLINE TUTORING (1) VIRTUAL PROJECTION (1) VIRTUALIZATION (2) Viruses (1) VISIBLE SURFACE DETECTION (1) VISUAL BASIC (3) Visual Studio 2010 (1) VITAL LINK (1) VLAN (1) VLSI (1) VLSI DESIGN (1) VOIP (1) VPN (1) VSB MODULATION (1) VTP (1) Vulnerability Assessment (1) WAFER PREPARATION (1) War Weapons (1) WATER (1) Water pollution And Its Legislation (1) WAVEGUIDE GRATINGS BASED FILTERS (1) WEAPONS DESIGN AND CONTROL SYSTEMS (1) WEATHER RESOURCE SYSTEM (1) WEB DESIGNING (1) WEB ENGINEERING (1) Web OS (1) WEB SECURITY (1) WEB SERVER (1) WEB WAREHOUSING (1) WEBSITE DESIGN AND DEVELOPMENT (1) WELDING (1) WELSPUN CROP LTD (1) WET ETCHING (1) WHAT IS CEMENT (1) WHIRLPOOL (1) WHITE BOX TESTING TECHNIQUES (1) WHOLE NUMBER (1) WI-FI (1) WIBREE (1) WIMAX (2) WIMAX SECURITY (1) WIND ENERGY SYSTEM (1) WIND FARM (1) WINDOWS SERVER (1) Wireless Communication (1) WIRELESS LAN (1) Wireless Mesh Networks (1) WIRELESS SENSOR NETWORKS (2) WIRELESS TECHNOLOGY (1) WLAN CONFIGURATION (1) WORDPRESS (1) Work Environment (1) Workshop For Turbine (1) WORLD WIDE WEB (2) WSN'S (1) XML (2) XTie-RT (1) YAHOO! (1) Yield Curve (1) Z-TRANSFORM (1) ZIGBEE (2) ZINC OXIDE (1)
 
© 2011 ENGINEERS ON WAY
Designed by Ishant Gupta
Posts RSSComments RSS
Back to top